Page 9 of 43 results (0.005 seconds)

CVSS: 9.3EPSS: 4%CPEs: 22EXPL: 2

The RPC module in Webmin 0.21 through 0.99, when installed without root or admin privileges, allows remote attackers to read and write to arbitrary files and execute arbitrary commands via remote_foreign_require and remote_foreign_call requests. • https://www.exploit-db.com/exploits/21765 http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-08/0403.html http://www.iss.net/security_center/static/9983.php http://www.securiteam.com/unixfocus/5CP0R1P80G.html http://www.securityfocus.com/bid/5591 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 1

Webmin 0.84 and earlier does not properly clear the HTTP_AUTHORIZATION environment variable when the web server is restarted, which makes authentication information available to all CGI programs and allows local users to gain privileges. • http://archives.neohapsis.com/archives/bugtraq/2001-05/0262.html http://www.calderasystems.com/support/security/advisories/CSSA-2001-019.1.txt http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-059.php3 http://www.securityfocus.com/bid/2795 https://exchange.xforce.ibmcloud.com/vulnerabilities/6627 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Webmin before 0.5 does not restrict the number of invalid passwords that are entered for a valid username, which could allow remote attackers to gain privileges via brute force password cracking. • http://www.securityfocus.com/archive/1/9138 http://www.securityfocus.com/bid/98 http://www.webmin.com/webmin/changes.html •