Page 5 of 25 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 2

awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to read server web logs by setting the loadplugin and pluginmode parameters to rawlog. • https://www.exploit-db.com/exploits/817 http://secunia.com/advisories/14299 http://www.securityfocus.com/archive/1/390368 https://exchange.xforce.ibmcloud.com/vulnerabilities/19333 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 2

Direct code injection vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to execute portions of Perl code via the PluginMode parameter. • https://www.exploit-db.com/exploits/817 http://secunia.com/advisories/14299 http://www.osvdb.org/13832 http://www.securityfocus.com/archive/1/390368 https://exchange.xforce.ibmcloud.com/vulnerabilities/19336 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 2

Directory traversal vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to include arbitrary Perl modules via .. (dot dot) sequences in the loadplugin parameter. • http://secunia.com/advisories/14299 http://www.securityfocus.com/archive/1/390368 •

CVSS: 4.6EPSS: 0%CPEs: 14EXPL: 0

awstats.pl in AWStats 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) "pluginmode", (2) "loadplugin", or (3) "noloadplugin" parameters. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488 http://www.osvdb.org/16089 •

CVSS: 7.5EPSS: 97%CPEs: 1EXPL: 6

AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl. • https://www.exploit-db.com/exploits/16905 https://www.exploit-db.com/exploits/9912 https://www.exploit-db.com/exploits/772 https://www.exploit-db.com/exploits/773 http://awstats.sourceforge.net/docs/awstats_changelog.txt http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf http://secunia.com/advisories/13893 http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities&flashstatus=false http://www.kb.cert.org/vuls/id/272296 http://www.osvdb.org/13002 • CWE-20: Improper Input Validation •