CVE-2005-0363
https://notcve.org/view.php?id=CVE-2005-0363
awstats.pl in AWStats 4.0 and 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the config parameter. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488 http://www.debian.org/security/2005/dsa-682 •
CVE-2005-0362
https://notcve.org/view.php?id=CVE-2005-0362
awstats.pl in AWStats 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) "pluginmode", (2) "loadplugin", or (3) "noloadplugin" parameters. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488 http://www.osvdb.org/16089 •
CVE-2005-0116 – AWStats 6.1 < 6.2 - 'configdir' Remote Command Execution
https://notcve.org/view.php?id=CVE-2005-0116
AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl. • https://www.exploit-db.com/exploits/16905 https://www.exploit-db.com/exploits/9912 https://www.exploit-db.com/exploits/772 https://www.exploit-db.com/exploits/773 http://awstats.sourceforge.net/docs/awstats_changelog.txt http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf http://secunia.com/advisories/13893 http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities&flashstatus=false http://www.kb.cert.org/vuls/id/272296 http://www.osvdb.org/13002 • CWE-20: Improper Input Validation •