
CVE-2006-3681
https://notcve.org/view.php?id=CVE-2006-3681
18 Jul 2006 — Multiple cross-site scripting (XSS) vulnerabilities in awstats.pl in AWStats 6.5 build 1.857 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) refererpagesfilter, (2) refererpagesfilterex, (3) urlfilterex, (4) urlfilter, (5) hostfilter, or (6) hostfilterex parameters, a different set of vectors than CVE-2006-1945. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en awstats.pl de AWStats 6.5 build 1.857 y anteriores permite a atacantes remotos ... • http://pridels0.blogspot.com/2006/04/awstats-65x-multiple-vuln.html •

CVE-2006-3682 – AWStats 6.4 - 'AWStats.pl' Multiple Full Path Disclosures
https://notcve.org/view.php?id=CVE-2006-3682
18 Jul 2006 — awstats.pl in AWStats 6.5 build 1.857 and earlier allows remote attackers to obtain the installation path via the (1) year, (2) pluginmode or (3) month parameters. awstats.pl en AWStats 6.5 build 1.857 y anteriores permite a atacantes remotos obtener la ruta de instalación a través de los parámetros (1) year, (2) pluginmode o (3) month. • https://www.exploit-db.com/exploits/32870 •

CVE-2006-1945 – AWStats 4.0/5.x/6.x - AWStats.pl Multiple Cross-Site Scripting Vulnerabilities
https://notcve.org/view.php?id=CVE-2006-1945
20 Apr 2006 — Cross-site scripting (XSS) vulnerability in awstats.pl in AWStats 6.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the config parameter. NOTE: this might be the same core issue as CVE-2005-2732. • https://www.exploit-db.com/exploits/27694 •

CVE-2005-2732
https://notcve.org/view.php?id=CVE-2005-2732
29 Aug 2005 — AWStats 6.4, and possibly earlier versions, allows remote attackers to obtain sensitive information via a file that does not exist in the config parameter, which reveals the path in an error message. • http://marc.info/?l=bugtraq&m=112510261425888&w=2 •

CVE-2005-1527
https://notcve.org/view.php?id=CVE-2005-1527
15 Aug 2005 — Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call. • http://secunia.com/advisories/16412 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2005-0435 – AWStats 6.4 - Denial of Service
https://notcve.org/view.php?id=CVE-2005-0435
15 Feb 2005 — awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to read server web logs by setting the loadplugin and pluginmode parameters to rawlog. • https://www.exploit-db.com/exploits/817 •

CVE-2005-0436 – AWStats 6.4 - Denial of Service
https://notcve.org/view.php?id=CVE-2005-0436
15 Feb 2005 — Direct code injection vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to execute portions of Perl code via the PluginMode parameter. • https://www.exploit-db.com/exploits/817 •

CVE-2005-0437
https://notcve.org/view.php?id=CVE-2005-0437
15 Feb 2005 — Directory traversal vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to include arbitrary Perl modules via .. (dot dot) sequences in the loadplugin parameter. • http://secunia.com/advisories/14299 •

CVE-2005-0438 – AWStats 5.7 < 6.2 - Multiple Remote s
https://notcve.org/view.php?id=CVE-2005-0438
15 Feb 2005 — awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to obtain sensitive information by setting the debug parameter. • https://www.exploit-db.com/exploits/853 •

CVE-2005-0362
https://notcve.org/view.php?id=CVE-2005-0362
09 Feb 2005 — awstats.pl in AWStats 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) "pluginmode", (2) "loadplugin", or (3) "noloadplugin" parameters. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488 •