Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-qk68-2926-uqf4
SummaryAWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl.
Aliases
0
alias CVE-2005-0116
Fixed_packages
0
url pkg:deb/debian/awstats@6.2-1.1?distro=trixie
purl pkg:deb/debian/awstats@6.2-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@6.2-1.1%3Fdistro=trixie
1
url pkg:deb/debian/awstats@6.4-1sarge3
purl pkg:deb/debian/awstats@6.4-1sarge3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-48cr-bq8t-fqd3
1
vulnerability VCID-4mn4-kwvz-zfdr
2
vulnerability VCID-6241-45ms-x3ec
3
vulnerability VCID-7896-2ufa-kqd1
4
vulnerability VCID-9xag-6wej-6bgk
5
vulnerability VCID-fxrv-1bju-qkgm
6
vulnerability VCID-gtjm-xaua-5bhm
7
vulnerability VCID-kfb9-pts3-dffa
8
vulnerability VCID-kspy-ctky-ykav
9
vulnerability VCID-mds9-fb3d-9qgt
10
vulnerability VCID-pbfq-fen2-dkhs
11
vulnerability VCID-qabb-bgqe-afdd
12
vulnerability VCID-s1bj-dpp3-9ubt
13
vulnerability VCID-sy25-mjxc-47bn
14
vulnerability VCID-vqyg-xfyk-h3e5
15
vulnerability VCID-wezb-5vk9-1qdf
16
vulnerability VCID-xwvz-ewcf-x7fm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@6.4-1sarge3
2
url pkg:deb/debian/awstats@7.8-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/awstats@7.8-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@7.8-2%252Bdeb11u1%3Fdistro=trixie
3
url pkg:deb/debian/awstats@7.8-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/awstats@7.8-3%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6241-45ms-x3ec
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@7.8-3%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/awstats@7.9-1?distro=trixie
purl pkg:deb/debian/awstats@7.9-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6241-45ms-x3ec
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@7.9-1%3Fdistro=trixie
5
url pkg:deb/debian/awstats@8.0-4?distro=trixie
purl pkg:deb/debian/awstats@8.0-4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6241-45ms-x3ec
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@8.0-4%3Fdistro=trixie
6
url pkg:deb/debian/awstats@8.0-5?distro=trixie
purl pkg:deb/debian/awstats@8.0-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@8.0-5%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/awstats@4.0-0.woody.2
purl pkg:deb/debian/awstats@4.0-0.woody.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-48cr-bq8t-fqd3
1
vulnerability VCID-4mn4-kwvz-zfdr
2
vulnerability VCID-53p4-ugqm-uyak
3
vulnerability VCID-6241-45ms-x3ec
4
vulnerability VCID-7896-2ufa-kqd1
5
vulnerability VCID-9xag-6wej-6bgk
6
vulnerability VCID-9zcz-5x16-z3hf
7
vulnerability VCID-fxrv-1bju-qkgm
8
vulnerability VCID-gtjm-xaua-5bhm
9
vulnerability VCID-kfb9-pts3-dffa
10
vulnerability VCID-kspy-ctky-ykav
11
vulnerability VCID-mds9-fb3d-9qgt
12
vulnerability VCID-pbfq-fen2-dkhs
13
vulnerability VCID-qabb-bgqe-afdd
14
vulnerability VCID-qk68-2926-uqf4
15
vulnerability VCID-s1bj-dpp3-9ubt
16
vulnerability VCID-sy25-mjxc-47bn
17
vulnerability VCID-tg8y-b43c-mkfr
18
vulnerability VCID-ttd1-gp86-nbdx
19
vulnerability VCID-vqyg-xfyk-h3e5
20
vulnerability VCID-wezb-5vk9-1qdf
21
vulnerability VCID-x787-wfdh-gbd4
22
vulnerability VCID-xwvz-ewcf-x7fm
23
vulnerability VCID-yzfr-525e-1fha
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/awstats@4.0-0.woody.2
References
0
reference_url http://awstats.sourceforge.net/docs/awstats_changelog.txt
reference_id
reference_type
scores
url http://awstats.sourceforge.net/docs/awstats_changelog.txt
1
reference_url http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf
reference_id
reference_type
scores
url http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0116
reference_id
reference_type
scores
0
value 0.91976
scoring_system epss
scoring_elements 0.99696
published_at 2026-04-09T12:55:00Z
1
value 0.91976
scoring_system epss
scoring_elements 0.99694
published_at 2026-04-04T12:55:00Z
2
value 0.91976
scoring_system epss
scoring_elements 0.99693
published_at 2026-04-02T12:55:00Z
3
value 0.91976
scoring_system epss
scoring_elements 0.99699
published_at 2026-04-18T12:55:00Z
4
value 0.91976
scoring_system epss
scoring_elements 0.99697
published_at 2026-04-13T12:55:00Z
5
value 0.91976
scoring_system epss
scoring_elements 0.99698
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0116
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0116
4
reference_url http://secunia.com/advisories/13893/
reference_id
reference_type
scores
url http://secunia.com/advisories/13893/
5
reference_url http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities&flashstatus=false
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities&flashstatus=false
6
reference_url http://www.kb.cert.org/vuls/id/272296
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/272296
7
reference_url http://www.osvdb.org/13002
reference_id
reference_type
scores
url http://www.osvdb.org/13002
8
reference_url http://www.securityfocus.com/bid/12298
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12298
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0116
reference_id CVE-2005-0116
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0116
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/16905.rb
reference_id CVE-2005-0116;OSVDB-13002
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/16905.rb
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/9912.rb
reference_id CVE-2005-0116;OSVDB-13002
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/9912.rb
13
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/772.c
reference_id OSVDB-13002;CVE-2005-0116
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/772.c
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/773.pl
reference_id OSVDB-13002;CVE-2005-0116
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/773.pl
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
0
date_added 2005-01-14
description AWStats 6.2 < 6.1 - configdir Command Injection (Metasploit)
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2005-01-15
exploit_type webapps
platform cgi
source_date_updated null
data_source Exploit-DB
source_url
1
date_added null
description
This module exploits an arbitrary command execution vulnerability in the
          AWStats CGI script. iDEFENSE has confirmed that AWStats versions 6.1 and 6.2
          are vulnerable.
required_action null
due_date null
notes
Reliability:
  - unknown-reliability
Stability:
  - unknown-stability
SideEffects:
  - unknown-side-effects
known_ransomware_campaign_use false
source_date_published 2005-01-15
exploit_type null
platform Unix
source_date_updated null
data_source Metasploit
source_url https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/unix/webapp/awstats_configdir_exec.rb
Severity_range_score7.5 - 7.5
Exploitability2.0
Weighted_severity6.8
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-qk68-2926-uqf4