Page 11 of 60 results (0.003 seconds)

CVSS: 3.6EPSS: 0%CPEs: 25EXPL: 2

The web interface for Webmin 0.92 does not properly quote or filter script code in files that are displayed to the interface, which allows local users to execute script and possibly steal cookies by inserting the script into certain files or fields, such as a real user name entry in the passwd file. • https://www.exploit-db.com/exploits/21348 http://online.securityfocus.com/archive/1/263181 http://www.securityfocus.com/bid/4329 https://exchange.xforce.ibmcloud.com/vulnerabilities/8596 •

CVSS: 10.0EPSS: 7%CPEs: 1EXPL: 0

The Printer Administration module for Webmin 0.990 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the printer name. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:05.asc http://www.iss.net/security_center/static/10052.php http://www.webmin.com/updates.html •

CVSS: 9.3EPSS: 4%CPEs: 22EXPL: 2

The RPC module in Webmin 0.21 through 0.99, when installed without root or admin privileges, allows remote attackers to read and write to arbitrary files and execute arbitrary commands via remote_foreign_require and remote_foreign_call requests. • https://www.exploit-db.com/exploits/21765 http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-08/0403.html http://www.iss.net/security_center/static/9983.php http://www.securiteam.com/unixfocus/5CP0R1P80G.html http://www.securityfocus.com/bid/5591 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

Cross-site scripting vulnerability in the authentication page for (1) Webmin 0.96 and (2) Usermin 0.90 allows remote attackers to insert script into an error page and possibly steal cookies. Vulnerabilidad de secuencias de comandos en sitios cruzados en la página de autenticación de: Webmin 0.96 Usermin 0.90 que permite a atacantes remotos la inserción de código en una página de error y posiblemente el robo de cookies. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0040.html http://www.iss.net/security_center/static/9036.php http://www.securityfocus.com/bid/4694 •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 1

(1) Webmin 0.96 and (2) Usermin 0.90 with password timeouts enabled allow local and possibly remote attackers to bypass authentication and gain privileges via certain control characters in the authentication information, which can force Webmin or Usermin to accept arbitrary username/session ID combinations. Webmin 0.96 y Usermin 0.90 con tiempo de espera para contraseñas habilitado, permite a atacantes locales y posiblemente a remotos, evitar la autenticación y obtener privilegios mediante ciertos caracteres de control en la información de autenticación, que podría forzar a Webmin o Usermin a aceptar combinaciones arbitrarias de usuario/sesión (username/session ID). • http://online.securityfocus.com/archive/1/271466 http://www.iss.net/security_center/static/9037.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-033.php http://www.securityfocus.com/bid/4700 •