Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the "config" and "migrate" parameters resulting in unauthenticated remote code execution.
Can anyone explain these flaw on config and migrate?
Is there any particular exploit showing how are these very critical issues, rce but how so?
Can anyone explain these flaw on config and migrate? Is there any particular exploit showing how are these very critical issues, rce but how so?