{
  "modified": "2025-08-09T19:01:28Z",
  "published": "2008-08-19T19:41:00Z",
  "id": "CVE-2008-3714",
  "details": "Cross-site scripting (XSS) vulnerability in awstats.pl in AWStats 6.8 allows remote attackers to inject arbitrary web script or HTML via the query_string, a different vulnerability than CVE-2006-3681 and CVE-2006-1945.",
  "references": [
    {
      "type": "ADVISORY",
      "url": "http://secunia.com/advisories/31519"
    },
    {
      "type": "ADVISORY",
      "url": "http://secunia.com/advisories/31759"
    },
    {
      "type": "ADVISORY",
      "url": "http://secunia.com/advisories/32939"
    },
    {
      "type": "ADVISORY",
      "url": "http://secunia.com/advisories/33002"
    },
    {
      "type": "ADVISORY",
      "url": "http://www.debian.org/security/2008/dsa-1679"
    },
    {
      "type": "ADVISORY",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:203"
    },
    {
      "type": "ADVISORY",
      "url": "http://www.ubuntu.com/usn/usn-686-1"
    },
    {
      "type": "ADVISORY",
      "url": "http://www.vupen.com/english/advisories/2008/2399"
    },
    {
      "type": "WEB",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "type": "WEB",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432"
    },
    {
      "type": "WEB",
      "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=2001151\u0026group_id=13764\u0026atid=113764"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/bid/30730"
    },
    {
      "type": "WEB",
      "url": "http://www.securitytracker.com/id?1020704"
    },
    {
      "type": "WEB",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44504"
    },
    {
      "type": "WEB",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00107.html"
    },
    {
      "type": "WEB",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00355.html"
    }
  ]
}
