Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-kspy-ctky-ykav
SummaryOpen redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
Aliases
0
alias CVE-2009-5020
Fixed_packages
0
url pkg:deb/debian/awstats@6.9.5~dfsg-1?distro=trixie
purl pkg:deb/debian/awstats@6.9.5~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@6.9.5~dfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/awstats@6.9.5~dfsg-5
purl pkg:deb/debian/awstats@6.9.5~dfsg-5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6241-45ms-x3ec
1
vulnerability VCID-fxrv-1bju-qkgm
2
vulnerability VCID-kfb9-pts3-dffa
3
vulnerability VCID-qabb-bgqe-afdd
4
vulnerability VCID-s1bj-dpp3-9ubt
5
vulnerability VCID-vqyg-xfyk-h3e5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@6.9.5~dfsg-5
2
url pkg:deb/debian/awstats@7.8-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/awstats@7.8-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@7.8-2%252Bdeb11u1%3Fdistro=trixie
3
url pkg:deb/debian/awstats@7.8-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/awstats@7.8-3%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6241-45ms-x3ec
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@7.8-3%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/awstats@7.9-1?distro=trixie
purl pkg:deb/debian/awstats@7.9-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6241-45ms-x3ec
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@7.9-1%3Fdistro=trixie
5
url pkg:deb/debian/awstats@8.0-4?distro=trixie
purl pkg:deb/debian/awstats@8.0-4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6241-45ms-x3ec
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@8.0-4%3Fdistro=trixie
6
url pkg:deb/debian/awstats@8.0-5?distro=trixie
purl pkg:deb/debian/awstats@8.0-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@8.0-5%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/awstats@4.0-0.woody.2
purl pkg:deb/debian/awstats@4.0-0.woody.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-48cr-bq8t-fqd3
1
vulnerability VCID-4mn4-kwvz-zfdr
2
vulnerability VCID-53p4-ugqm-uyak
3
vulnerability VCID-6241-45ms-x3ec
4
vulnerability VCID-7896-2ufa-kqd1
5
vulnerability VCID-9xag-6wej-6bgk
6
vulnerability VCID-9zcz-5x16-z3hf
7
vulnerability VCID-fxrv-1bju-qkgm
8
vulnerability VCID-gtjm-xaua-5bhm
9
vulnerability VCID-kfb9-pts3-dffa
10
vulnerability VCID-kspy-ctky-ykav
11
vulnerability VCID-mds9-fb3d-9qgt
12
vulnerability VCID-pbfq-fen2-dkhs
13
vulnerability VCID-qabb-bgqe-afdd
14
vulnerability VCID-qk68-2926-uqf4
15
vulnerability VCID-s1bj-dpp3-9ubt
16
vulnerability VCID-sy25-mjxc-47bn
17
vulnerability VCID-tg8y-b43c-mkfr
18
vulnerability VCID-ttd1-gp86-nbdx
19
vulnerability VCID-vqyg-xfyk-h3e5
20
vulnerability VCID-wezb-5vk9-1qdf
21
vulnerability VCID-x787-wfdh-gbd4
22
vulnerability VCID-xwvz-ewcf-x7fm
23
vulnerability VCID-yzfr-525e-1fha
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@4.0-0.woody.2
1
url pkg:deb/debian/awstats@6.4-1sarge3
purl pkg:deb/debian/awstats@6.4-1sarge3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-48cr-bq8t-fqd3
1
vulnerability VCID-4mn4-kwvz-zfdr
2
vulnerability VCID-6241-45ms-x3ec
3
vulnerability VCID-7896-2ufa-kqd1
4
vulnerability VCID-9xag-6wej-6bgk
5
vulnerability VCID-fxrv-1bju-qkgm
6
vulnerability VCID-gtjm-xaua-5bhm
7
vulnerability VCID-kfb9-pts3-dffa
8
vulnerability VCID-kspy-ctky-ykav
9
vulnerability VCID-mds9-fb3d-9qgt
10
vulnerability VCID-pbfq-fen2-dkhs
11
vulnerability VCID-qabb-bgqe-afdd
12
vulnerability VCID-s1bj-dpp3-9ubt
13
vulnerability VCID-sy25-mjxc-47bn
14
vulnerability VCID-vqyg-xfyk-h3e5
15
vulnerability VCID-wezb-5vk9-1qdf
16
vulnerability VCID-xwvz-ewcf-x7fm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@6.4-1sarge3
2
url pkg:deb/debian/awstats@6.5%2Bdfsg-1
purl pkg:deb/debian/awstats@6.5%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4mn4-kwvz-zfdr
1
vulnerability VCID-6241-45ms-x3ec
2
vulnerability VCID-9xag-6wej-6bgk
3
vulnerability VCID-fxrv-1bju-qkgm
4
vulnerability VCID-kfb9-pts3-dffa
5
vulnerability VCID-kspy-ctky-ykav
6
vulnerability VCID-mds9-fb3d-9qgt
7
vulnerability VCID-pbfq-fen2-dkhs
8
vulnerability VCID-qabb-bgqe-afdd
9
vulnerability VCID-s1bj-dpp3-9ubt
10
vulnerability VCID-vqyg-xfyk-h3e5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@6.5%252Bdfsg-1
3
url pkg:deb/debian/awstats@6.5%2Bdfsg-1%2Betch1
purl pkg:deb/debian/awstats@6.5%2Bdfsg-1%2Betch1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4mn4-kwvz-zfdr
1
vulnerability VCID-6241-45ms-x3ec
2
vulnerability VCID-9xag-6wej-6bgk
3
vulnerability VCID-fxrv-1bju-qkgm
4
vulnerability VCID-kfb9-pts3-dffa
5
vulnerability VCID-kspy-ctky-ykav
6
vulnerability VCID-mds9-fb3d-9qgt
7
vulnerability VCID-pbfq-fen2-dkhs
8
vulnerability VCID-qabb-bgqe-afdd
9
vulnerability VCID-s1bj-dpp3-9ubt
10
vulnerability VCID-vqyg-xfyk-h3e5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@6.5%252Bdfsg-1%252Betch1
4
url pkg:deb/debian/awstats@6.7.dfsg-5.1%2Blenny1
purl pkg:deb/debian/awstats@6.7.dfsg-5.1%2Blenny1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6241-45ms-x3ec
1
vulnerability VCID-9xag-6wej-6bgk
2
vulnerability VCID-fxrv-1bju-qkgm
3
vulnerability VCID-kfb9-pts3-dffa
4
vulnerability VCID-kspy-ctky-ykav
5
vulnerability VCID-mds9-fb3d-9qgt
6
vulnerability VCID-qabb-bgqe-afdd
7
vulnerability VCID-s1bj-dpp3-9ubt
8
vulnerability VCID-vqyg-xfyk-h3e5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@6.7.dfsg-5.1%252Blenny1
References
0
reference_url http://awstats.sourceforge.net/docs/awstats_changelog.txt
reference_id
reference_type
scores
url http://awstats.sourceforge.net/docs/awstats_changelog.txt
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-5020
reference_id
reference_type
scores
0
value 0.014
scoring_system epss
scoring_elements 0.80447
published_at 2026-04-16T12:55:00Z
1
value 0.014
scoring_system epss
scoring_elements 0.80367
published_at 2026-04-01T12:55:00Z
2
value 0.014
scoring_system epss
scoring_elements 0.80373
published_at 2026-04-02T12:55:00Z
3
value 0.014
scoring_system epss
scoring_elements 0.80393
published_at 2026-04-04T12:55:00Z
4
value 0.014
scoring_system epss
scoring_elements 0.80382
published_at 2026-04-07T12:55:00Z
5
value 0.014
scoring_system epss
scoring_elements 0.80411
published_at 2026-04-08T12:55:00Z
6
value 0.014
scoring_system epss
scoring_elements 0.80421
published_at 2026-04-09T12:55:00Z
7
value 0.014
scoring_system epss
scoring_elements 0.80439
published_at 2026-04-11T12:55:00Z
8
value 0.014
scoring_system epss
scoring_elements 0.80424
published_at 2026-04-12T12:55:00Z
9
value 0.014
scoring_system epss
scoring_elements 0.80418
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-5020
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5020
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:1.0:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:2.1.:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:2.1.:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:2.1.:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:2.2.3:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:2.2.4:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:3.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:3.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:3.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:4.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:4.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.7:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:6.8:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-5020
reference_id CVE-2009-5020
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-5020
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score5.8 - 5.8
Exploitability0.5
Weighted_severity5.2
Risk_score2.6
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-kspy-ctky-ykav