Page 11 of 59 results (0.005 seconds)

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Webmin 0.92, when installed from an RPM, creates /var/webmin with insecure permissions (world readable), which could allow local users to read the root user's cookie-based authentication credentials and possibly hijack the root user's session using the credentials. • http://online.securityfocus.com/archive/1/263181 http://www.securityfocus.com/bid/4328 http://www.webmin.com/changes.html https://exchange.xforce.ibmcloud.com/vulnerabilities/8595 •

CVSS: 9.3EPSS: 4%CPEs: 22EXPL: 2

The RPC module in Webmin 0.21 through 0.99, when installed without root or admin privileges, allows remote attackers to read and write to arbitrary files and execute arbitrary commands via remote_foreign_require and remote_foreign_call requests. • https://www.exploit-db.com/exploits/21765 http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-08/0403.html http://www.iss.net/security_center/static/9983.php http://www.securiteam.com/unixfocus/5CP0R1P80G.html http://www.securityfocus.com/bid/5591 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

Cross-site scripting vulnerability in the authentication page for (1) Webmin 0.96 and (2) Usermin 0.90 allows remote attackers to insert script into an error page and possibly steal cookies. Vulnerabilidad de secuencias de comandos en sitios cruzados en la página de autenticación de: Webmin 0.96 Usermin 0.90 que permite a atacantes remotos la inserción de código en una página de error y posiblemente el robo de cookies. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0040.html http://www.iss.net/security_center/static/9036.php http://www.securityfocus.com/bid/4694 •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 1

(1) Webmin 0.96 and (2) Usermin 0.90 with password timeouts enabled allow local and possibly remote attackers to bypass authentication and gain privileges via certain control characters in the authentication information, which can force Webmin or Usermin to accept arbitrary username/session ID combinations. Webmin 0.96 y Usermin 0.90 con tiempo de espera para contraseñas habilitado, permite a atacantes locales y posiblemente a remotos, evitar la autenticación y obtener privilegios mediante ciertos caracteres de control en la información de autenticación, que podría forzar a Webmin o Usermin a aceptar combinaciones arbitrarias de usuario/sesión (username/session ID). • http://online.securityfocus.com/archive/1/271466 http://www.iss.net/security_center/static/9037.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-033.php http://www.securityfocus.com/bid/4700 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

run.cgi in Webmin 0.80 and 0.88 creates temporary files with world-writable permissions, which allows local users to execute arbitrary commands. • http://archives.neohapsis.com/archives/vulnwatch/2001-q4/0015.html http://www.securiteam.com/unixfocus/6R00M0K2UC.html •