{ "schema_version": "1.4.0", "id": "GHSA-7rg7-c2wp-3xxr", "modified": "2024-02-14T18:30:23Z", "published": "2022-05-01T01:59:43Z", "aliases": [ "CVE-2005-1527" ], "details": "Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1527" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21769" }, { "type": "WEB", "url": "https://usn.ubuntu.com/167-1" }, { "type": "WEB", "url": "http://secunia.com/advisories/16412" }, { "type": "WEB", "url": "http://secunia.com/advisories/17463" }, { "type": "WEB", "url": "http://securitytracker.com/id?1014636" }, { "type": "WEB", "url": "http://www.debian.org/security/2005/dsa-892" }, { "type": "WEB", "url": "http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities&flashstatus=false" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html" }, { "type": "WEB", "url": "http://www.osvdb.org/18696" }, { "type": "WEB", "url": "http://www.securiteam.com/unixfocus/5DP0J00GKE.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/14525" } ], "database_specific": { "cwe_ids": [ "CWE-94" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-08-15T04:00:00Z" } }