Page 5 of 22 results (0.002 seconds)

CVSS: 4.6EPSS: 0%CPEs: 14EXPL: 0

awstats.pl in AWStats 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) "pluginmode", (2) "loadplugin", or (3) "noloadplugin" parameters. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488 http://www.osvdb.org/16089 •

CVSS: 7.5EPSS: 97%CPEs: 1EXPL: 5

AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl. • https://www.exploit-db.com/exploits/16905 https://www.exploit-db.com/exploits/9912 https://www.exploit-db.com/exploits/772 https://www.exploit-db.com/exploits/773 http://awstats.sourceforge.net/docs/awstats_changelog.txt http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf http://secunia.com/advisories/13893 http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities&flashstatus=false http://www.kb.cert.org/vuls/id/272296 http://www.osvdb.org/13002 • CWE-20: Improper Input Validation •