Download
| Alert*
oval:org.secpod.oval:def:1800879
Two path traversal flaws in awstats in awstats 7.6 and earlier, that could be leveraged for unauthenticated remote code execution. oval:org.secpod.oval:def:72103 awstats: powerful and featureful web server log analyzer Several security issues were fixed in AWStats. oval:org.secpod.oval:def:113891 Advanced Web Statistics is a powerful and featureful tool that generates advanced web server graphic statistics. This server log analyzer works from command line or as a CGI and shows you all information your log contains, in graphical web pages. It can analyze a lot of web/wap/proxy servers like Ap ... oval:org.secpod.oval:def:53232 The cPanel Security Team discovered that awstats, a log file analyzer, was vulnerable to path traversal attacks. A remote unauthenticated attacker could leverage that to perform arbitrary code execution. oval:org.secpod.oval:def:113881 Advanced Web Statistics is a powerful and featureful tool that generates advanced web server graphic statistics. This server log analyzer works from command line or as a CGI and shows you all information your log contains, in graphical web pages. It can analyze a lot of web/wap/proxy servers like Ap ... oval:org.secpod.oval:def:51965 awstats: powerful and featureful web server log analyzer AWStats could be made to run programs if it received specially crafted network traffic. oval:org.secpod.oval:def:1800313 Two path traversal flaws in awstats in awstats 7.6 and earlier, that could be leveraged for unauthenticated remote code execution. oval:org.secpod.oval:def:603242 The cPanel Security Team discovered that awstats, a log file analyzer, was vulnerable to path traversal attacks. A remote unauthenticated attacker could leverage that to perform arbitrary code execution. oval:org.secpod.oval:def:706009 awstats: powerful and featureful web server log analyzer Several security issues were fixed in AWStats. oval:org.secpod.oval:def:703935 awstats: powerful and featureful web server log analyzer AWStats could be made to run programs if it received specially crafted network traffic. |