Page 12 of 59 results (0.012 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 2

Directory traversal vulnerability in edit_action.cgi of Webmin Directory 0.91 allows attackers to gain privileges via a '..' (dot dot) in the argument. Una vulnerabilidad de atravesamiento de directorios en edit_action.cgi de Webmin Directory 0.91 permite a atacantes remotos, la obtención de privilegios mediante el uso de '..' (punto punto) en el argumento. • https://www.exploit-db.com/exploits/21183 http://marc.info/?l=webmin-l&m=100865390306103&w=2 http://www.iss.net/security_center/static/7711.php http://www.securityfocus.com/archive/1/245980 http://www.securityfocus.com/bid/3698 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 1

Webmin 0.84 and earlier does not properly clear the HTTP_AUTHORIZATION environment variable when the web server is restarted, which makes authentication information available to all CGI programs and allows local users to gain privileges. • http://archives.neohapsis.com/archives/bugtraq/2001-05/0262.html http://www.calderasystems.com/support/security/advisories/CSSA-2001-019.1.txt http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-059.php3 http://www.securityfocus.com/bid/2795 https://exchange.xforce.ibmcloud.com/vulnerabilities/6627 •

CVSS: 1.2EPSS: 0%CPEs: 1EXPL: 0

webmin 0.84 and earlier allows local users to overwrite and create arbitrary files via a symlink attack. • http://www.calderasystems.com/support/security/advisories/CSSA-2001-004.0.txt http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-016.php3 https://exchange.xforce.ibmcloud.com/vulnerabilities/6011 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Webmin before 0.5 does not restrict the number of invalid passwords that are entered for a valid username, which could allow remote attackers to gain privileges via brute force password cracking. • http://www.securityfocus.com/archive/1/9138 http://www.securityfocus.com/bid/98 http://www.webmin.com/webmin/changes.html •