Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
awstats awstats 6.4 1 vulnerabilities and exploits
(subscribe to this query)
5.1
CVSSv2
CVE-2006-2237
The web interface for AWStats 6.4 and 6.5, when statistics updates are enabled, allows remote malicious users to execute arbitrary code via shell metacharacters in the migrate parameter.
Awstats Awstats 6.4
Awstats Awstats 6.5
3 EDB exploits
7.5
CVSSv2
CVE-2010-4367
awstats.cgi in AWStats prior to 7.0 accepts a configdir parameter in the URL, which allows remote malicious users to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server.
Awstats Awstats 6.3
Awstats Awstats 2.2.4
Awstats Awstats 6.5 1
Awstats Awstats 2.2.3
Awstats Awstats 6.0
Awstats Awstats 5.9
Awstats Awstats 5.2
Awstats Awstats 5.1
Awstats Awstats 6.2
Awstats Awstats 3.1
Awstats Awstats 6.5
Awstats Awstats 2.1.
Awstats Awstats 6.7
Awstats Awstats 6.1
Awstats Awstats 5.4
Awstats Awstats 5.3
Awstats Awstats 6.4
Awstats Awstats 6.4 1
Awstats Awstats 6.5 1.857
Awstats Awstats 4.1
Awstats Awstats 1.0
Awstats Awstats 5.8
1 EDB exploit
4
CVSSv2
CVE-2006-2644
AWStats 6.5, and possibly other versions, allows remote authenticated users to execute arbitrary code by using the configdir parameter to awstats.pl to upload a configuration file whose name contains shell metacharacters, then access that file using the LogFile directive.
Awstats Awstats 6.5 1
Awstats Awstats 6.4 1
Awstats Awstats 6.5
5
CVSSv2
CVE-2006-3682
awstats.pl in AWStats 6.5 build 1.857 and previous versions allows remote malicious users to obtain the installation path via the (1) year, (2) pluginmode or (3) month parameters.
Awstats Awstats
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started