Page 4 of 21 results (0.001 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 2

awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to read server web logs by setting the loadplugin and pluginmode parameters to rawlog. • https://www.exploit-db.com/exploits/817 http://secunia.com/advisories/14299 http://www.securityfocus.com/archive/1/390368 https://exchange.xforce.ibmcloud.com/vulnerabilities/19333 •

CVSS: 5.0EPSS: 12%CPEs: 2EXPL: 1

awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to obtain sensitive information by setting the debug parameter. • https://www.exploit-db.com/exploits/853 http://secunia.com/advisories/14299 http://www.securityfocus.com/archive/1/390368 https://exchange.xforce.ibmcloud.com/vulnerabilities/19477 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 2

Directory traversal vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to include arbitrary Perl modules via .. (dot dot) sequences in the loadplugin parameter. • http://secunia.com/advisories/14299 http://www.securityfocus.com/archive/1/390368 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 2

Direct code injection vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to execute portions of Perl code via the PluginMode parameter. • https://www.exploit-db.com/exploits/817 http://secunia.com/advisories/14299 http://www.osvdb.org/13832 http://www.securityfocus.com/archive/1/390368 https://exchange.xforce.ibmcloud.com/vulnerabilities/19336 •

CVSS: 4.6EPSS: 0%CPEs: 14EXPL: 0

awstats.pl in AWStats 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) "pluginmode", (2) "loadplugin", or (3) "noloadplugin" parameters. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488 http://www.osvdb.org/16089 •