Unrated severityNVD Advisory· Published Aug 15, 2005· Updated Apr 16, 2026
CVE-2005-1527
CVE-2005-1527
Description
Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.
Affected products
4- cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- secunia.com/advisories/16412nvdBroken LinkPatchVendor Advisory
- securitytracker.com/idnvdBroken LinkPatchThird Party AdvisoryVDB Entry
- www.osvdb.org/18696nvdBroken LinkPatch
- www.debian.org/security/2005/dsa-892nvdMailing ListThird Party Advisory
- www.securiteam.com/unixfocus/5DP0J00GKE.htmlnvdBroken LinkVendor Advisory
- www.securityfocus.com/bid/14525nvdBroken LinkThird Party AdvisoryVDB Entry
- exchange.xforce.ibmcloud.com/vulnerabilities/21769nvdThird Party AdvisoryVDB Entry
- secunia.com/advisories/17463nvdBroken Link
- www.idefense.com/application/poi/displaynvdBroken Link
- www.novell.com/linux/security/advisories/2005_19_sr.htmlnvdBroken Link
- usn.ubuntu.com/167-1/nvdBroken Link
News mentions
0No linked articles in our index yet.