
CVE-2003-0101 – Webmin 0.9x / Usermin 0.9x/1.0 - Access Session ID Spoofing
https://notcve.org/view.php?id=CVE-2003-0101
26 Feb 2003 — miniserv.pl in (1) Webmin before 1.070 and (2) Usermin before 1.000 does not properly handle metacharacters such as line feeds and carriage returns (CRLF) in Base-64 encoded strings during Basic authentication, which allows remote attackers to spoof a session ID and gain root privileges. miniserv.pl en Webmin anterior a 1.070 y Usermin antes de 1.000 no maneja adecuadamente metacaractéres como avance de línea y retorno de carro (CRLF) en cadenas codificadas en Base-64 durante la autenticación básica, lo que... • https://www.exploit-db.com/exploits/22275 •

CVE-2002-2360 – Webmin 0.x - 'RPC' Privilege Escalation
https://notcve.org/view.php?id=CVE-2002-2360
31 Dec 2002 — The RPC module in Webmin 0.21 through 0.99, when installed without root or admin privileges, allows remote attackers to read and write to arbitrary files and execute arbitrary commands via remote_foreign_require and remote_foreign_call requests. • https://www.exploit-db.com/exploits/21765 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2002-2201
https://notcve.org/view.php?id=CVE-2002-2201
31 Dec 2002 — The Printer Administration module for Webmin 0.990 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the printer name. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:05.asc •

CVE-2002-1673 – Webmin 0.x - Code Input Validation
https://notcve.org/view.php?id=CVE-2002-1673
31 Dec 2002 — The web interface for Webmin 0.92 does not properly quote or filter script code in files that are displayed to the interface, which allows local users to execute script and possibly steal cookies by inserting the script into certain files or fields, such as a real user name entry in the passwd file. • https://www.exploit-db.com/exploits/21348 •

CVE-2002-1672
https://notcve.org/view.php?id=CVE-2002-1672
31 Dec 2002 — Webmin 0.92, when installed from an RPM, creates /var/webmin with insecure permissions (world readable), which could allow local users to read the root user's cookie-based authentication credentials and possibly hijack the root user's session using the credentials. • http://online.securityfocus.com/archive/1/263181 •

CVE-2002-1947
https://notcve.org/view.php?id=CVE-2002-1947
31 Dec 2002 — Webmin 0.21 through 1.0 uses the same built-in SSL key for all installations, which allows remote attackers to eavesdrop or highjack the SSL session. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02%3A06.asc •

CVE-2002-0757
https://notcve.org/view.php?id=CVE-2002-0757
26 Jul 2002 — (1) Webmin 0.96 and (2) Usermin 0.90 with password timeouts enabled allow local and possibly remote attackers to bypass authentication and gain privileges via certain control characters in the authentication information, which can force Webmin or Usermin to accept arbitrary username/session ID combinations. Webmin 0.96 y Usermin 0.90 con tiempo de espera para contraseñas habilitado, permite a atacantes locales y posiblemente a remotos, evitar la autenticación y obtener privilegios mediante ciertos caractere... • http://online.securityfocus.com/archive/1/271466 •

CVE-2002-0756
https://notcve.org/view.php?id=CVE-2002-0756
26 Jul 2002 — Cross-site scripting vulnerability in the authentication page for (1) Webmin 0.96 and (2) Usermin 0.90 allows remote attackers to insert script into an error page and possibly steal cookies. Vulnerabilidad de secuencias de comandos en sitios cruzados en la página de autenticación de: Webmin 0.96 Usermin 0.90 que permite a atacantes remotos la inserción de código en una página de error y posiblemente el robo de cookies. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0040.html •

CVE-2001-1530
https://notcve.org/view.php?id=CVE-2001-1530
31 Dec 2001 — run.cgi in Webmin 0.80 and 0.88 creates temporary files with world-writable permissions, which allows local users to execute arbitrary commands. • http://archives.neohapsis.com/archives/vulnwatch/2001-q4/0015.html •

CVE-2001-1196 – webmin 0.91 - Directory Traversal
https://notcve.org/view.php?id=CVE-2001-1196
17 Dec 2001 — Directory traversal vulnerability in edit_action.cgi of Webmin Directory 0.91 allows attackers to gain privileges via a '..' (dot dot) in the argument. Una vulnerabilidad de atravesamiento de directorios en edit_action.cgi de Webmin Directory 0.91 permite a atacantes remotos, la obtención de privilegios mediante el uso de '..' (punto punto) en el argumento. • https://www.exploit-db.com/exploits/21183 •