Filtered by vendor Webmin
Subscriptions
Total
106 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2001-0222 | 1 Webmin | 1 Webmin | 2025-04-03 | N/A |
webmin 0.84 and earlier allows local users to overwrite and create arbitrary files via a symlink attack. | ||||
CVE-2002-2360 | 1 Webmin | 1 Webmin | 2025-04-03 | N/A |
The RPC module in Webmin 0.21 through 0.99, when installed without root or admin privileges, allows remote attackers to read and write to arbitrary files and execute arbitrary commands via remote_foreign_require and remote_foreign_call requests. | ||||
CVE-2006-3392 | 2 Usermin, Webmin | 2 Usermin, Webmin | 2025-04-03 | N/A |
Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274. | ||||
CVE-2002-2201 | 1 Webmin | 1 Webmin | 2025-04-03 | N/A |
The Printer Administration module for Webmin 0.990 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the printer name. | ||||
CVE-2001-1530 | 1 Webmin | 1 Webmin | 2025-04-03 | N/A |
run.cgi in Webmin 0.80 and 0.88 creates temporary files with world-writable permissions, which allows local users to execute arbitrary commands. | ||||
CVE-2005-1177 | 2 Usermin, Webmin | 2 Usermin, Webmin | 2025-04-03 | N/A |
Unknown vulnerability in (1) Webmin and (2) Usermin before 1.200 causes Webmin to change permissions and ownership of configuration files, with unknown impact. | ||||
CVE-2004-0559 | 3 Mandrakesoft, Usermin, Webmin | 4 Mandrake Linux, Mandrake Linux Corporate Server, Usermin and 1 more | 2025-04-03 | N/A |
The maketemp.pl script in Usermin 1.070 and 1.080 allows local users to overwrite arbitrary files at install time via a symlink attack on the /tmp/.usermin directory. | ||||
CVE-2002-0757 | 2 Usermin, Webmin | 2 Usermin, Webmin | 2025-04-03 | N/A |
(1) Webmin 0.96 and (2) Usermin 0.90 with password timeouts enabled allow local and possibly remote attackers to bypass authentication and gain privileges via certain control characters in the authentication information, which can force Webmin or Usermin to accept arbitrary username/session ID combinations. | ||||
CVE-2002-1673 | 1 Webmin | 1 Webmin | 2025-04-03 | N/A |
The web interface for Webmin 0.92 does not properly quote or filter script code in files that are displayed to the interface, which allows local users to execute script and possibly steal cookies by inserting the script into certain files or fields, such as a real user name entry in the passwd file. | ||||
CVE-2024-36450 | 1 Webmin | 1 Webmin | 2025-03-13 | 5.4 Medium |
Cross-site scripting vulnerability exists in sysinfo.cgi of Webmin versions prior to 1.910. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a session ID may be obtained, a webpage may be altered, or a server may be halted. | ||||
CVE-2023-43309 | 1 Webmin | 1 Webmin | 2024-11-21 | 4.8 Medium |
There is a stored cross-site scripting (XSS) vulnerability in Webmin 2.002 and below via the Cluster Cron Job tab Input field, which allows attackers to run malicious scripts by injecting a specially crafted payload. | ||||
CVE-2023-41163 | 1 Webmin | 1 Webmin | 2024-11-21 | 6.1 Medium |
A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the replace in results field while replacing the results under the tools drop down. | ||||
CVE-2023-41162 | 1 Webmin | 1 Usermin | 2024-11-21 | 6.1 Medium |
A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the file mask field while searching under the tools drop down. | ||||
CVE-2023-41161 | 1 Webmin | 1 Usermin | 2024-11-21 | 5.4 Medium |
Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the key comment to different pages such as public key details, Export key, sign key, send to key server page, and fetch from key server page tab. | ||||
CVE-2023-41160 | 1 Webmin | 1 Usermin | 2024-11-21 | 5.4 Medium |
A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the key name field while adding an authorized key. | ||||
CVE-2023-41159 | 1 Webmin | 1 Usermin | 2024-11-21 | 5.4 Medium |
A Stored Cross-Site Scripting (XSS) vulnerability while editing the autoreply file page in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML by editing the forward file manually. | ||||
CVE-2023-41158 | 1 Webmin | 1 Usermin | 2024-11-21 | 5.4 Medium |
A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the description field while creating a new MIME type program. | ||||
CVE-2023-41157 | 1 Webmin | 1 Usermin | 2024-11-21 | 5.4 Medium |
Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the folder name parameter while creating the folder to manage the folder tab, filter tab, and forward mail tab. | ||||
CVE-2023-41156 | 1 Webmin | 1 Usermin | 2024-11-21 | 5.4 Medium |
A Stored Cross-Site Scripting (XSS) vulnerability in the filter and forward mail tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the save to new folder named field while creating a new filter. | ||||
CVE-2023-41155 | 1 Webmin | 2 Usermin, Webmin | 2024-11-21 | 5.4 Medium |
A Stored Cross-Site Scripting (XSS) vulnerability in the mail forwarding and replies tab in Webmin and Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the forward to field while creating a mail forwarding rule. |