CVE-2005-0436 – AWStats 6.4 - Denial of Service
https://notcve.org/view.php?id=CVE-2005-0436
Direct code injection vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to execute portions of Perl code via the PluginMode parameter. • https://www.exploit-db.com/exploits/817 http://secunia.com/advisories/14299 http://www.osvdb.org/13832 http://www.securityfocus.com/archive/1/390368 https://exchange.xforce.ibmcloud.com/vulnerabilities/19336 •
CVE-2005-0362
https://notcve.org/view.php?id=CVE-2005-0362
awstats.pl in AWStats 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) "pluginmode", (2) "loadplugin", or (3) "noloadplugin" parameters. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488 http://www.osvdb.org/16089 •
CVE-2005-0116 – AWStats 6.1 < 6.2 - 'configdir' Remote Command Execution
https://notcve.org/view.php?id=CVE-2005-0116
AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl. • https://www.exploit-db.com/exploits/16905 https://www.exploit-db.com/exploits/9912 https://www.exploit-db.com/exploits/772 https://www.exploit-db.com/exploits/773 http://awstats.sourceforge.net/docs/awstats_changelog.txt http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf http://secunia.com/advisories/13893 http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities&flashstatus=false http://www.kb.cert.org/vuls/id/272296 http://www.osvdb.org/13002 • CWE-20: Improper Input Validation •