Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
awstats awstats 6.4 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-2732
AWStats 6.4, and possibly earlier versions, allows remote malicious users to obtain sensitive information via a file that does not exist in the config parameter, which reveals the path in an error message.
Awstats Awstats
NA
CVE-2005-1527
Eval injection vulnerability in awstats.pl in AWStats 6.4 and previous versions, when a URLPlugin is enabled, allows remote malicious users to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.
Awstats Awstats
Canonical Ubuntu Linux 5.04
Debian Debian Linux 3.1
Debian Debian Linux 3.0
NA
CVE-2005-0435
awstats.pl in AWStats 6.3 and 6.4 allows remote malicious users to read server web logs by setting the loadplugin and pluginmode parameters to rawlog.
Awstats Awstats 6.3
Awstats Awstats 6.4
1 EDB exploit
NA
CVE-2005-0438
awstats.pl in AWStats 6.3 and 6.4 allows remote malicious users to obtain sensitive information by setting the debug parameter.
Awstats Awstats 6.3
Awstats Awstats 6.4
1 EDB exploit
NA
CVE-2005-0437
Directory traversal vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote malicious users to include arbitrary Perl modules via .. (dot dot) sequences in the loadplugin parameter.
Awstats Awstats 6.4
Awstats Awstats 6.3
NA
CVE-2005-0436
Direct code injection vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote malicious users to execute portions of Perl code via the PluginMode parameter.
Awstats Awstats 6.3
Awstats Awstats 6.4
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2