Page 8 of 56 results (0.006 seconds)

CVSS: 5.0EPSS: 95%CPEs: 2EXPL: 8

Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274. Las aplicaciones Webmin antes de su versión 1.290 y Usermin antes de la 1.220 llaman a la función simplify_path antes de decodificar HTML, lo que permite a atacantes remotos leer ficheros arbitrarios, como se ha demostrado utilizando secuencias "..% 01", evitando de esta manera la supresión del nombre de fichero de las secuencias "../" anteriores a octetos del estilo de "%01". NOTA: Se trata de una vulnerabilidad diferente a CVE-2006-3274. • https://www.exploit-db.com/exploits/2017 https://www.exploit-db.com/exploits/1997 https://github.com/IvanGlinkin/CVE-2006-3392 https://github.com/MrEmpy/CVE-2006-3392 https://github.com/g1vi/CVE-2006-3392 https://github.com/Adel-kaka-dz/CVE-2006-3392 https://github.com/0xtz/CVE-2006-3392 https://github.com/kernel-cyber/CVE-2006-3392 http://attrition.org/pipermail/vim/2006-July/000923.html http://attrition.org/pipermail/vim/2006-June/000912.html http:/ •

CVSS: 5.0EPSS: 1%CPEs: 5EXPL: 0

Directory traversal vulnerability in Webmin before 1.280, when run on Windows, allows remote attackers to read arbitrary files via \ (backslash) characters in the URL to certain directories under the web root, such as the image directory. Vulnerabilidad de salto de directorio en versiones de Webmin anteriores a la v1.280, cuando se ejecuta en Windows, permite a atacantes remotos leer ficheros arbitrarios a través del carácter \ (barra invertida) en la URL a determinados directorios bajo la raíz Web, tales como el directorio de imagenes. • http://jvn.jp/jp/JVN%2367974490/index.html http://secunia.com/advisories/20777 http://securityreason.com/securityalert/1161 http://securitytracker.com/id?1016375 http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/88_e.html http://www.securityfocus.com/archive/1/438149/100/0/threaded http://www.securityfocus.com/bid/18613 http://www.vupen.com/english/advisories/2006/2493 http://www.webmin.com/changes.html https://exchange.xforce.ibmcloud.com/vulnerabilities/27366 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return). • http://archives.neohapsis.com/archives/bugtraq/2005-09/0257.html http://jvn.jp/jp/JVN%2340940493/index.html http://secunia.com/advisories/16858 http://secunia.com/advisories/17282 http://securityreason.com/securityalert/17 http://www.gentoo.org/security/en/glsa/glsa-200509-17.xml http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html http://www.mandriva.com/security/advisories?name=MDKSA-2005:176 http://www.novell.com/linux/security/advisories/2005_24_sr. •

CVSS: 10.0EPSS: 0%CPEs: 60EXPL: 0

Unknown vulnerability in (1) Webmin and (2) Usermin before 1.200 causes Webmin to change permissions and ownership of configuration files, with unknown impact. • http://securitytracker.com/id?1013723 http://www.webmin.com/changes.html http://www.webmin.com/uchanges.html https://exchange.xforce.ibmcloud.com/vulnerabilities/20607 •

CVSS: 7.5EPSS: 1%CPEs: 22EXPL: 1

The web mail functionality in Usermin 1.x and Webmin 1.x allows remote attackers to execute arbitrary commands via shell metacharacters in an e-mail message. • http://secunia.com/advisories/12488 http://www.gentoo.org/security/en/glsa/glsa-200409-15.xml http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/77_e.html http://www.securityfocus.com/bid/11122 https://exchange.xforce.ibmcloud.com/vulnerabilities/17293 •