Page 2 of 18 results (0.005 seconds)

CVSS: 6.8EPSS: 1%CPEs: 92EXPL: 0

05 Sep 2006 — Webmin before 1.296 and Usermin before 1.226 do not properly handle a URL with a null ("%00") character, which allows remote attackers to conduct cross-site scripting (XSS), read CGI program source code, list directories, and possibly execute programs. Webmin anterior a 1.296 y Usermin anterior a 1.226 no dirigidas adecuadamente una URL con un caracter nulo ("%00"), lo cual permite a un atacante remoto dirigir una secuencia de comandos de sitios cruzados (XSS), leer el código fuente del programa CGI, lista ... • http://jvn.jp/jp/JVN%2399776858/index.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 71%CPEs: 2EXPL: 11

06 Jul 2006 — Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274. Las aplicaciones Webmin antes de su versión 1.290 y Usermin antes de la 1.220 llaman a la función simplify_path antes de decodificar HTML, lo que permite a atacan... • https://packetstorm.news/files/id/180803 •

CVSS: 10.0EPSS: 0%CPEs: 60EXPL: 0

19 Apr 2005 — Unknown vulnerability in (1) Webmin and (2) Usermin before 1.200 causes Webmin to change permissions and ownership of configuration files, with unknown impact. • http://securitytracker.com/id?1013723 •

CVSS: 9.8EPSS: 4%CPEs: 22EXPL: 1

31 Dec 2004 — The web mail functionality in Usermin 1.x and Webmin 1.x allows remote attackers to execute arbitrary commands via shell metacharacters in an e-mail message. • http://secunia.com/advisories/12488 •

CVSS: 5.5EPSS: 0%CPEs: 28EXPL: 0

24 Sep 2004 — The maketemp.pl script in Usermin 1.070 and 1.080 allows local users to overwrite arbitrary files at install time via a symlink attack on the /tmp/.usermin directory. El script maketemp.pl en Usermin 1.070 y 1.080 permite a usuarios locales sobreescribir ficheros de su elección durante la instalación mediante un ataque de enlaces simbólicos en el directorio /tmp/.usermin • http://secunia.com/advisories/12488 •

CVSS: 10.0EPSS: 15%CPEs: 18EXPL: 1

26 Feb 2003 — miniserv.pl in (1) Webmin before 1.070 and (2) Usermin before 1.000 does not properly handle metacharacters such as line feeds and carriage returns (CRLF) in Base-64 encoded strings during Basic authentication, which allows remote attackers to spoof a session ID and gain root privileges. miniserv.pl en Webmin anterior a 1.070 y Usermin antes de 1.000 no maneja adecuadamente metacaractéres como avance de línea y retorno de carro (CRLF) en cadenas codificadas en Base-64 durante la autenticación básica, lo que... • https://www.exploit-db.com/exploits/22275 •

CVSS: 7.5EPSS: 1%CPEs: 10EXPL: 0

26 Jul 2002 — Cross-site scripting vulnerability in the authentication page for (1) Webmin 0.96 and (2) Usermin 0.90 allows remote attackers to insert script into an error page and possibly steal cookies. Vulnerabilidad de secuencias de comandos en sitios cruzados en la página de autenticación de: Webmin 0.96 Usermin 0.90 que permite a atacantes remotos la inserción de código en una página de error y posiblemente el robo de cookies. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0040.html •

CVSS: 9.8EPSS: 0%CPEs: 10EXPL: 1

26 Jul 2002 — (1) Webmin 0.96 and (2) Usermin 0.90 with password timeouts enabled allow local and possibly remote attackers to bypass authentication and gain privileges via certain control characters in the authentication information, which can force Webmin or Usermin to accept arbitrary username/session ID combinations. Webmin 0.96 y Usermin 0.90 con tiempo de espera para contraseñas habilitado, permite a atacantes locales y posiblemente a remotos, evitar la autenticación y obtener privilegios mediante ciertos caractere... • http://online.securityfocus.com/archive/1/271466 •