diff options
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index dd2f62a79eb5..ec1f3d4726ca 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,41 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="fdad8a87-7f94-11d9-a9e7-0001020eed82"> + <topic>awstats -- multiple vulnerabilities</topic> + <affects> + <package> + <name>awstats</name> + <range><lt>6.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A GHC advisory reports:</p> + <blockquote cite="http://marc.theaimsgroup.com/?l=bugtraq&m=110840530924124"> + <p>Successful exploitation of an input validation + vulnerability in AWStats scripts allows attackers to + execute limited perl directives under the privileges of + the web server, get sensetive information. Some actions + of the attacker can lead to denial of service.</p> + </blockquote> + <p>Some reports indicate that these vulnerabilities can be + used to execute arbitrary commands with the privileges of + the web server awstats is running under.</p> + </body> + </description> + <references> + <bid>12543</bid> + <bid>12545</bid> + <mlist msgid="20050214081040.3370.qmail@www.securityfocus.com">http://marc.theaimsgroup.com/?l=bugtraq&m=110840530924124</mlist> + <url>http://awstats.sourceforge.net/docs/awstats_changelog.txt</url> + </references> + <dates> + <discovery>2005-02-10</discovery> + <entry>2005-02-15</entry> + </dates> + </vuln> + <vuln vid="5a5422fd-7e1a-11d9-a9e7-0001020eed82"> <topic>powerdns -- DoS vulnerability</topic> <affects> |