All the vulnerabilites related to webmin - usermin
Vulnerability from fkie_nvd
Published
2023-09-14 21:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability while editing the autoreply file page in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML by editing the forward file manually.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*", "matchCriteriaId": "ED13897E-B6FB-4976-9037-2136FDFE1A50", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability while editing the autoreply file page in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML by editing the forward file manually." }, { "lang": "es", "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado al editar la p\u00e1gina del archivo de respuesta autom\u00e1tica en Usermin 2.000 permite a atacantes remotos inyectar script web o HTML de su elecci\u00f3n editando el archivo de reenv\u00edo manualmente." } ], "id": "CVE-2023-41159", "lastModified": "2024-11-21T08:20:41.660", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-14T21:15:10.690", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41159" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-07 22:15
Modified
2024-11-21 08:20
Severity ?
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the key comment to different pages such as public key details, Export key, sign key, send to key server page, and fetch from key server page tab.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*", "matchCriteriaId": "ED13897E-B6FB-4976-9037-2136FDFE1A50", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the key comment to different pages such as public key details, Export key, sign key, send to key server page, and fetch from key server page tab." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de Cross-Site Scripting (XSS) almacenadas en Usermin 2.000 permite a atacantes remotos inyectar script web o HTML arbitrarios mediante a trav\u00e9s del comentario de la clave a diferentes p\u00e1ginas, como detalles de la clave p\u00fablica, Exportar clave, Firmar clave, Enviar a la p\u00e1gina del servidor de claves y Obtener de la pesta\u00f1a de la p\u00e1gina del servidor de claves." } ], "id": "CVE-2023-41161", "lastModified": "2024-11-21T08:20:41.970", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-07T22:15:07.793", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41161" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-14 21:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the filter and forward mail tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the save to new folder named field while creating a new filter.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:2.001:*:*:*:*:*:*:*", "matchCriteriaId": "9CE9B3CB-9D26-492D-9584-317C5BE061EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the filter and forward mail tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the save to new folder named field while creating a new filter." }, { "lang": "es", "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pesta\u00f1a de filtro y reenv\u00edo de correo en Usermin 2.001 permite a atacantes remotos inyectar script web o HTML de su elecci\u00f3n a trav\u00e9s del campo llamado \"guardar en nueva carpeta\" mientras crean un nuevo filtro." } ], "id": "CVE-2023-41156", "lastModified": "2024-11-21T08:20:41.177", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-14T21:15:10.630", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41156" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41156" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-14 21:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the key name field while adding an authorized key.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41160 | Exploit, Third Party Advisory | |
cve@mitre.org | https://webmin.com/tags/webmin-changelog/ | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41160 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://webmin.com/tags/webmin-changelog/ | Release Notes |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:2.001:*:*:*:*:*:*:*", "matchCriteriaId": "9CE9B3CB-9D26-492D-9584-317C5BE061EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the key name field while adding an authorized key." }, { "lang": "es", "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pesta\u00f1a de configuraci\u00f3n SSH en Usermin 2.001 permite a los atacantes remotos inyectar scripts web arbitrarios o HTML a trav\u00e9s del campo de nombre de clave mientras agregan una clave autorizada." } ], "id": "CVE-2023-41160", "lastModified": "2024-11-21T08:20:41.823", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-14T21:15:10.750", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41160" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41160" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-06-21 15:55
Modified
2024-11-21 02:09
Severity ?
Summary
Usermin before 1.600 allows remote attackers to execute arbitrary operating-system commands via unspecified vectors related to a user action.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*", "matchCriteriaId": "928167DF-5E72-4775-99C3-735068AFD05F", "versionEndIncluding": "1.590", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3046F962-BD9C-4E67-B2A8-9664440317A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "A83F4A87-03D8-461B-B64A-81E171C88119", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E777B661-B6A5-4033-85BA-4B17A7FDF905", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "866EC157-2F84-4382-B081-AB7BF9D5B649", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.80:*:*:*:*:*:*:*", "matchCriteriaId": "7F001647-DBB0-4B2A-AAF0-44DB043FB6DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.90:*:*:*:*:*:*:*", "matchCriteriaId": "9A424E19-4946-4F66-8198-25380B073631", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.910:*:*:*:*:*:*:*", "matchCriteriaId": "88950B52-9163-42CA-B693-E451C5EFF0AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.929:*:*:*:*:*:*:*", "matchCriteriaId": "50397E8C-F4B4-48EA-9305-AEA7D946A222", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.930:*:*:*:*:*:*:*", "matchCriteriaId": "9A6C9C87-DDA3-4F9F-BC5F-D23BBF866DCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.940:*:*:*:*:*:*:*", "matchCriteriaId": "2F88DA6C-2018-4332-B8B9-2DE8C84AFF0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.950:*:*:*:*:*:*:*", "matchCriteriaId": "1EFE6FC5-4B9D-4270-8847-4A8CD016B861", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.960:*:*:*:*:*:*:*", "matchCriteriaId": "7AB5C8A8-3DC9-4DE7-9A69-E61F9BA481AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.970:*:*:*:*:*:*:*", "matchCriteriaId": "51C3396E-17DD-4096-B165-62C95D9EB349", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.980:*:*:*:*:*:*:*", "matchCriteriaId": "DFDF2AE3-69D9-4BAC-895A-2E916A8247DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.990:*:*:*:*:*:*:*", "matchCriteriaId": "2AF11C33-F62D-4486-920C-9528E519107B", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "973363CE-6A66-4BAF-8C11-D9B4911BF9A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.010:*:*:*:*:*:*:*", "matchCriteriaId": "20B5FDD4-AD31-4985-97E2-179C0F6A6525", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.020:*:*:*:*:*:*:*", "matchCriteriaId": "0C3551D4-9B28-4A29-9C30-D91C5D81F195", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.030:*:*:*:*:*:*:*", "matchCriteriaId": "8EEF1E3D-F633-4594-8E65-6AB0B941E95A", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.040:*:*:*:*:*:*:*", "matchCriteriaId": "D32B0E0C-B72B-4F3D-ABAC-BBA5A6E242ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.050:*:*:*:*:*:*:*", "matchCriteriaId": "66BDC46A-832F-4DE9-848E-898F99798D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.051:*:*:*:*:*:*:*", "matchCriteriaId": "70AC0911-928C-4087-9EA8-BF0CB25BDD56", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.060:*:*:*:*:*:*:*", "matchCriteriaId": "35B34A95-A9D1-454D-AE3A-A68AE11A60AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.070:*:*:*:*:*:*:*", "matchCriteriaId": "EDE9ABF8-331F-4268-8D2A-692BEC8F98DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.080:*:*:*:*:*:*:*", "matchCriteriaId": "8BD93C56-DE08-4CAC-A345-7C40C2CB0598", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.090:*:*:*:*:*:*:*", "matchCriteriaId": "F540CEF3-C21D-48E5-84AD-81CF7C62A948", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.100:*:*:*:*:*:*:*", "matchCriteriaId": "E554657F-DF48-41F9-A2F6-4C311C2AC99A", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.110:*:*:*:*:*:*:*", "matchCriteriaId": "CA039A97-F28A-4216-B909-79EEBD8A6FC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.120:*:*:*:*:*:*:*", "matchCriteriaId": "75B0C24B-7A62-4157-8CA8-5FA800F67C33", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.130:*:*:*:*:*:*:*", "matchCriteriaId": "F3652F8E-A163-4337-BAE0-210757FC421D", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.140:*:*:*:*:*:*:*", "matchCriteriaId": "87E84FE0-ACF0-43D9-ACC2-D662D5488B8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.150:*:*:*:*:*:*:*", "matchCriteriaId": "83419D0A-7C03-4F3E-9A95-25BA299D5961", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.160:*:*:*:*:*:*:*", "matchCriteriaId": "77075C79-35BF-4841-8103-A372A67ECF45", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.170:*:*:*:*:*:*:*", "matchCriteriaId": "6FDF692C-13F5-4E42-A5DF-2116080462F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.180:*:*:*:*:*:*:*", "matchCriteriaId": "8D31D014-CB91-436C-A114-3C33D95E8D73", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.190:*:*:*:*:*:*:*", "matchCriteriaId": "3FBA2FDA-D70D-4850-A7E7-4A3C25B0C1C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.200:*:*:*:*:*:*:*", "matchCriteriaId": "1A4AC88F-C70C-4184-8605-5A4BC95D83DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.210:*:*:*:*:*:*:*", "matchCriteriaId": "72D4AAAF-A284-4FD9-B011-C822ED2DBAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.220:*:*:*:*:*:*:*", "matchCriteriaId": "490DBC72-DADD-491E-AC18-4D4C178ABECD", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.230:*:*:*:*:*:*:*", "matchCriteriaId": "A455B1DC-03F9-4338-9BD5-9184434F7AA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.240:*:*:*:*:*:*:*", "matchCriteriaId": "36C87163-EBC2-47DC-9865-9455CF066DB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.250:*:*:*:*:*:*:*", "matchCriteriaId": "EDBED527-4698-44DC-8DFE-E107702C2D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.260:*:*:*:*:*:*:*", "matchCriteriaId": "15CFE78E-22EB-47B1-9BD3-0A093645304A", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.270:*:*:*:*:*:*:*", "matchCriteriaId": "D8CAB5C2-2F68-46F6-BF7D-12AEEB03BF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.280:*:*:*:*:*:*:*", "matchCriteriaId": "A5E20E3B-AC6A-4059-9C49-9AF4FADDFF30", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.290:*:*:*:*:*:*:*", "matchCriteriaId": "B0B775C5-8A6F-4D08-9776-709029E918D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.300:*:*:*:*:*:*:*", "matchCriteriaId": "D0235C6D-7EC8-4D89-8AE5-04B5628EDB74", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.310:*:*:*:*:*:*:*", "matchCriteriaId": "3686B12E-EE12-4FDF-98BE-C7D24ADD6C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.320:*:*:*:*:*:*:*", "matchCriteriaId": "F0BED163-D9FF-45C9-90D5-1B167ADD423C", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.330:*:*:*:*:*:*:*", "matchCriteriaId": "93488E00-C176-4C66-85D5-172F33E3DECD", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.340:*:*:*:*:*:*:*", "matchCriteriaId": "3DF6456E-E2F2-4777-BACC-9422B759F7F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.350:*:*:*:*:*:*:*", "matchCriteriaId": "793F6997-0CCB-4074-97E3-E343D8508A48", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.360:*:*:*:*:*:*:*", "matchCriteriaId": "A957BD3B-6074-48CD-9A13-14125E0E5D07", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.370:*:*:*:*:*:*:*", "matchCriteriaId": "4B6BB3FC-61B6-42DF-9229-99C16BA41720", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.380:*:*:*:*:*:*:*", "matchCriteriaId": "EFCB8560-8CEF-4CC4-B7C7-275C86F1A03C", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.390:*:*:*:*:*:*:*", "matchCriteriaId": "9DFC35F7-DB28-49AB-ADFE-1068C751D49C", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.400:*:*:*:*:*:*:*", "matchCriteriaId": "4508D9EF-6917-40D9-9443-96AA96A924DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.410:*:*:*:*:*:*:*", "matchCriteriaId": "6D741056-8345-4C59-BD22-546D01DE5F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.420:*:*:*:*:*:*:*", "matchCriteriaId": "0FCA449A-5DF9-418D-B6D9-F4A73DBC3C65", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.430:*:*:*:*:*:*:*", "matchCriteriaId": "8E129FDD-A404-465E-9A04-00A2090F7EDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.440:*:*:*:*:*:*:*", "matchCriteriaId": "1841FFC1-25BA-4301-9515-381DAFBBCF6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.450:*:*:*:*:*:*:*", "matchCriteriaId": "5038DD1D-793B-4117-B59D-9E1B520A1C76", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.460:*:*:*:*:*:*:*", "matchCriteriaId": "06E9E986-E4A7-4BFA-91D8-5E47D31F4EBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.470:*:*:*:*:*:*:*", "matchCriteriaId": "80B1D2D5-315B-4432-A9E6-41E9ABB329A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.480:*:*:*:*:*:*:*", "matchCriteriaId": "9810CFF4-6321-4016-9A10-A7C3D90CB000", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.490:*:*:*:*:*:*:*", "matchCriteriaId": "2E26A472-555C-4081-8FBD-054761B4FE87", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.500:*:*:*:*:*:*:*", "matchCriteriaId": "13519AED-F310-49BA-B0E2-F52F8233F6A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.510:*:*:*:*:*:*:*", "matchCriteriaId": "125CF39D-EBBA-418B-A9DC-207E5A510A45", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.520:*:*:*:*:*:*:*", "matchCriteriaId": "CE280A31-AC7F-4A48-8F71-F9C2AB8EC7EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.530:*:*:*:*:*:*:*", "matchCriteriaId": "FFABB6DD-E9C7-424C-8938-61A6617E2E27", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.540:*:*:*:*:*:*:*", "matchCriteriaId": "2DD1A23C-FB0C-4899-AC34-8BD0BC7E4038", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.550:*:*:*:*:*:*:*", "matchCriteriaId": "7EE09F26-2068-4E74-8B9A-5E1A1F5EDD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.560:*:*:*:*:*:*:*", "matchCriteriaId": "9DBB07F9-A3EB-485C-9116-1885F673BB7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.570:*:*:*:*:*:*:*", "matchCriteriaId": "E4146A93-C7E4-4A38-8E38-E051D4D54BDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.580:*:*:*:*:*:*:*", "matchCriteriaId": "7EA40B6F-4D0C-44A6-854A-B4DBCCBFD8BA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Usermin before 1.600 allows remote attackers to execute arbitrary operating-system commands via unspecified vectors related to a user action." }, { "lang": "es", "value": "Usermin anterior a 1.600 permite a atacantes remotos ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de vectores no especificados relacionados con una acci\u00f3n del usuario." } ], "id": "CVE-2014-3883", "lastModified": "2024-11-21T02:09:03.393", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-06-21T15:55:05.103", "references": [ { "source": "vultures@jpcert.or.jp", "url": "http://jvn.jp/en/jp/JVN48805624/index.html" }, { "source": "vultures@jpcert.or.jp", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057" }, { "source": "vultures@jpcert.or.jp", "url": "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN48805624/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-02-12 02:00
Modified
2024-11-21 00:42
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Webmin 1.370 and 1.390 and Usermin 1.300 and 1.320 allows remote attackers to inject arbitrary web script or HTML via the search parameter to webmin_search.cgi (aka the search section), and possibly other components accessed through a "search box" or "open file box." NOTE: some of these details are obtained from third party information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "74E28AB1-D60A-4CFC-9133-552B7AA12D8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.32:*:*:*:*:*:*:*", "matchCriteriaId": "06EBBDAA-05C2-4CFD-AC36-A24E5A768B09", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.370:*:*:*:*:*:*:*", "matchCriteriaId": "E948F223-D365-4D5B-9C2B-FB064F8DC00B", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.390:*:*:*:*:*:*:*", "matchCriteriaId": "2B767E9C-D321-4972-BF7A-B5E62956D6CD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Webmin 1.370 and 1.390 and Usermin 1.300 and 1.320 allows remote attackers to inject arbitrary web script or HTML via the search parameter to webmin_search.cgi (aka the search section), and possibly other components accessed through a \"search box\" or \"open file box.\" NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Webmin 1.370 y 1.390 y Usermin 1.300 y 1.320. Permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro de b\u00fasqueda a webmin_search.cgi (tambi\u00e9n conocido como la secci\u00f3n de b\u00fasqueda) y posiblemente otros componentes accedidos a trav\u00e9s de una \"caja de b\u00fasqueda\" o \"caja de archivo abierto\". NOTA: algunos de estos detalles se han obtenido de informaci\u00f3n de terceros." } ], "id": "CVE-2008-0720", "lastModified": "2024-11-21T00:42:45.267", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-02-12T02:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://forum.aria-security.net/showthread.php?t=511" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28827" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/487656/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/487678/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/27662" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://forum.aria-security.net/showthread.php?t=511" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28827" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/487656/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/487678/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/27662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0450" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-01-05 19:00
Modified
2024-11-21 01:09
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Webmin before 1.500 and Usermin before 1.430 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3175C6B-A8BC-478B-A86B-D67DF656777C", "versionEndIncluding": "1.32", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3046F962-BD9C-4E67-B2A8-9664440317A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "A83F4A87-03D8-461B-B64A-81E171C88119", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E777B661-B6A5-4033-85BA-4B17A7FDF905", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "866EC157-2F84-4382-B081-AB7BF9D5B649", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E4DB1944-7DD9-480E-9479-69DC284F8A1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "842A041C-7252-49BF-AF8C-57CD61D875C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.91:*:*:*:*:*:*:*", "matchCriteriaId": "BACD9446-5C6C-486F-AA95-C89435BD24B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.92:*:*:*:*:*:*:*", "matchCriteriaId": "DBF2E55D-D1A5-4CB0-99AB-3FBAA16E79B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.93:*:*:*:*:*:*:*", "matchCriteriaId": "D1EA5D74-C150-479E-8A8B-4E1251A04895", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.94:*:*:*:*:*:*:*", "matchCriteriaId": "5783CE2F-D0AD-4871-BD4E-31DE40887F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.95:*:*:*:*:*:*:*", "matchCriteriaId": "94611B8F-EFD0-47DD-8F96-37A74FFA7E00", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.96:*:*:*:*:*:*:*", "matchCriteriaId": "A8AB5C49-4D3E-4A71-82CC-6866D7113671", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.97:*:*:*:*:*:*:*", "matchCriteriaId": "A9F3973E-03E5-416F-9B88-61CDB51B9E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.98:*:*:*:*:*:*:*", "matchCriteriaId": "560E8A6D-93B8-4252-ACE2-7BA9AE97A97F", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.99:*:*:*:*:*:*:*", "matchCriteriaId": "3A282895-E367-4445-84B9-07BF204B5100", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "973363CE-6A66-4BAF-8C11-D9B4911BF9A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "74E28AB1-D60A-4CFC-9133-552B7AA12D8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.010:*:*:*:*:*:*:*", "matchCriteriaId": "20B5FDD4-AD31-4985-97E2-179C0F6A6525", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.020:*:*:*:*:*:*:*", "matchCriteriaId": "0C3551D4-9B28-4A29-9C30-D91C5D81F195", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.030:*:*:*:*:*:*:*", "matchCriteriaId": "8EEF1E3D-F633-4594-8E65-6AB0B941E95A", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.040:*:*:*:*:*:*:*", "matchCriteriaId": "D32B0E0C-B72B-4F3D-ABAC-BBA5A6E242ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.051:*:*:*:*:*:*:*", "matchCriteriaId": "70AC0911-928C-4087-9EA8-BF0CB25BDD56", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.060:*:*:*:*:*:*:*", "matchCriteriaId": "35B34A95-A9D1-454D-AE3A-A68AE11A60AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.070:*:*:*:*:*:*:*", "matchCriteriaId": "EDE9ABF8-331F-4268-8D2A-692BEC8F98DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.080:*:*:*:*:*:*:*", "matchCriteriaId": "8BD93C56-DE08-4CAC-A345-7C40C2CB0598", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.090:*:*:*:*:*:*:*", "matchCriteriaId": "F540CEF3-C21D-48E5-84AD-81CF7C62A948", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.100:*:*:*:*:*:*:*", "matchCriteriaId": "E554657F-DF48-41F9-A2F6-4C311C2AC99A", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.110:*:*:*:*:*:*:*", "matchCriteriaId": "CA039A97-F28A-4216-B909-79EEBD8A6FC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.120:*:*:*:*:*:*:*", "matchCriteriaId": "75B0C24B-7A62-4157-8CA8-5FA800F67C33", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.130:*:*:*:*:*:*:*", "matchCriteriaId": "F3652F8E-A163-4337-BAE0-210757FC421D", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.140:*:*:*:*:*:*:*", "matchCriteriaId": "87E84FE0-ACF0-43D9-ACC2-D662D5488B8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.150:*:*:*:*:*:*:*", "matchCriteriaId": "83419D0A-7C03-4F3E-9A95-25BA299D5961", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.210:*:*:*:*:*:*:*", "matchCriteriaId": "72D4AAAF-A284-4FD9-B011-C822ED2DBAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.220:*:*:*:*:*:*:*", "matchCriteriaId": "490DBC72-DADD-491E-AC18-4D4C178ABECD", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.230:*:*:*:*:*:*:*", "matchCriteriaId": "A455B1DC-03F9-4338-9BD5-9184434F7AA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.240:*:*:*:*:*:*:*", "matchCriteriaId": "36C87163-EBC2-47DC-9865-9455CF066DB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.250:*:*:*:*:*:*:*", "matchCriteriaId": "EDBED527-4698-44DC-8DFE-E107702C2D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.260:*:*:*:*:*:*:*", "matchCriteriaId": "15CFE78E-22EB-47B1-9BD3-0A093645304A", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.270:*:*:*:*:*:*:*", "matchCriteriaId": "D8CAB5C2-2F68-46F6-BF7D-12AEEB03BF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.280:*:*:*:*:*:*:*", "matchCriteriaId": "A5E20E3B-AC6A-4059-9C49-9AF4FADDFF30", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7664DA2-5AC8-4A10-A7E9-4EA9AF5ABAEF", "versionEndIncluding": "1.390", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "30E3CF12-D0B7-4C7F-96C8-36A3FAFA8EDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C808C470-F0A1-4338-A988-3968EABE78E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C16685C0-94E9-4AE6-8221-1D32112808F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "EDACA626-1687-4192-A2E8-C74823B715A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "A9641C23-B30A-4CB2-A348-BD708F68F90A", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "0852A462-22ED-422D-A454-0A6E026D9AD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "97FEF73D-767D-4BF2-AA12-67268719A404", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.21:*:*:*:*:*:*:*", "matchCriteriaId": "84B5A02C-96AB-46FD-A958-86AC0DFD1F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.22:*:*:*:*:*:*:*", "matchCriteriaId": "BB1B8073-C512-4ACA-8E3F-92D46D63FBCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.31:*:*:*:*:*:*:*", "matchCriteriaId": "B368FAD0-39A7-4115-9327-1D32BECF2F7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.41:*:*:*:*:*:*:*", "matchCriteriaId": "2B3D7B7A-0426-4176-A759-E96024DC492D", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.42:*:*:*:*:*:*:*", "matchCriteriaId": "1E3EFDEE-A99B-4D0E-B6A7-E7C285A5DFBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.51:*:*:*:*:*:*:*", "matchCriteriaId": "50C3D4D4-246A-4287-AA42-CFDD0C1AE22A", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.76:*:*:*:*:*:*:*", "matchCriteriaId": "F05CF0BA-0606-42E5-A631-D302FF1D59F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.77:*:*:*:*:*:*:*", "matchCriteriaId": "6A79B7B3-708A-42E4-B4EF-7746F6292DB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.78:*:*:*:*:*:*:*", "matchCriteriaId": "E2F06BC0-0418-4A1C-BD4A-B7429A6CEA39", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.79:*:*:*:*:*:*:*", "matchCriteriaId": "1817FDA9-31F4-4D4A-A867-386D2F1CDB1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.80:*:*:*:*:*:*:*", "matchCriteriaId": "23522A64-FD03-4C5B-9A8A-5E7CDDC65CEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.83:*:*:*:*:*:*:*", "matchCriteriaId": "DFD94AA9-CABA-4FC8-8367-D5D9D8B4F623", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.84:*:*:*:*:*:*:*", "matchCriteriaId": "35B136CA-47BF-46DE-885A-9E74EBDE5306", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.85:*:*:*:*:*:*:*", "matchCriteriaId": "E9A3F522-6E6D-446C-8694-7AE91F19F1C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.88:*:*:*:*:*:*:*", "matchCriteriaId": "DBB86BC7-4A99-4C5B-9460-CDDA7C4E4041", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.90:*:*:*:*:*:*:*", "matchCriteriaId": "957C7CA1-DD36-409C-B7E5-01B719B4695E", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.91:*:*:*:*:*:*:*", "matchCriteriaId": "0B0813F3-1886-481E-8822-4BD199C4934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.92:*:*:*:*:*:*:*", "matchCriteriaId": "6D25A7CA-ED9D-4562-8965-D4906D1BE5FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.92.1:*:*:*:*:*:*:*", "matchCriteriaId": "C5C38C77-246F-41A9-A3D5-99C2DDA1DAE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.93:*:*:*:*:*:*:*", "matchCriteriaId": "C1F2D028-F2F9-4CE0-A24B-7DB44D488D4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.94:*:*:*:*:*:*:*", "matchCriteriaId": "82EE7A9B-5688-4933-95B9-476873D44A65", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.95:*:*:*:*:*:*:*", "matchCriteriaId": "30A57D7A-B989-4D82-B667-029A245AA6D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.96:*:*:*:*:*:*:*", "matchCriteriaId": "C664186B-DD40-490B-B2DE-4279B00102F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.97:*:*:*:*:*:*:*", "matchCriteriaId": "88E1D6C5-20FE-4514-B618-312BB19E5F6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.98:*:*:*:*:*:*:*", "matchCriteriaId": "B5017EA5-7188-4293-9FDF-5D23DCB40B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.99:*:*:*:*:*:*:*", "matchCriteriaId": "FF6C5F07-330D-46C5-8A8B-8DF734F4640F", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.950:*:*:*:*:*:*:*", "matchCriteriaId": "08068E84-9EE5-4742-B70A-567CD4199604", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.960:*:*:*:*:*:*:*", "matchCriteriaId": "5C6D5F6A-B34F-4134-959F-C31FC84EBCF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.970:*:*:*:*:*:*:*", "matchCriteriaId": "DB4FEC51-DD03-418D-8E55-CEE696BE2D74", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.980:*:*:*:*:*:*:*", "matchCriteriaId": "4B9F8F43-F9EC-4BC0-BDF6-EC3EDF5A71F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:0.990:*:*:*:*:*:*:*", "matchCriteriaId": "DB6865E9-F244-4019-AA4C-3DB1655A6AA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C644D728-1DD4-48E0-9E42-35E836006F41", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "D9425C1F-5E6A-489A-9A8B-9156E79FEAA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "8B8347DA-13F8-40E9-B9EA-2703C049AFA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.0.40:*:*:*:*:*:*:*", "matchCriteriaId": "BD9C3443-526E-4D68-9C7E-F3432BECE6C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "C968FBE9-191A-40B1-9A69-BF24511E40B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "FC77E1B6-E368-4ECD-8459-69C718CE5409", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "D89047FD-39F0-4614-B1EC-D13BAF57405E", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.0.70:*:*:*:*:*:*:*", "matchCriteriaId": "6CDF2120-F341-4C2E-88C1-A6C76626BFF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.0.80:*:*:*:*:*:*:*", "matchCriteriaId": "01DFC15C-3513-4E94-B46D-94FEA0D627FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "F4E068D3-F6B5-4102-B9FA-949E2FAA33D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.1.00:*:*:*:*:*:*:*", "matchCriteriaId": "7E6BD551-EC6A-4C77-B9E7-B9CF3DC21021", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "01B0FE2D-02BC-4081-B172-64A74389C5F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "43433ECE-8225-43EE-9F5E-FBB170B60CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "1615ACA2-32CC-48B7-AB5A-0BB0FDA7F190", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "F5ABAE43-0EEF-44D5-AB36-44DA54290122", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "AD33CE40-DFC9-4BDC-BF4F-9E0B268B8503", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "8608F5A2-B6FA-43C6-9862-43DBAF01EB1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "53663534-8617-47D7-B4B7-A6C0D6168E86", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "E815171B-B054-450F-A9B3-2D522161DD02", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "CD941A62-A41E-41CB-80C0-8B780AC39FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.2.40:*:*:*:*:*:*:*", "matchCriteriaId": "786287DD-2565-4931-BBA0-2CACD7671352", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.2.50:*:*:*:*:*:*:*", "matchCriteriaId": "4784DC04-D2C5-46C6-831F-23D69B4B0513", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.2.60:*:*:*:*:*:*:*", "matchCriteriaId": "9C219DAB-C13C-4232-8B98-2D7A9ED16E30", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.2.70:*:*:*:*:*:*:*", "matchCriteriaId": "F88507A8-6143-4FB7-8027-EFB0C981ED8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.2.80:*:*:*:*:*:*:*", "matchCriteriaId": "E35C0772-8265-415F-A390-530640DB9599", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.2.90:*:*:*:*:*:*:*", "matchCriteriaId": "BFA35DAA-1DC2-41D2-ADC7-F922FA658CAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "4C02919F-4201-4D1E-8395-04C6A7193077", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.3.30:*:*:*:*:*:*:*", "matchCriteriaId": "727B060B-7600-4AD4-B66E-1A559B6EDA2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.335:*:*:*:*:*:*:*", "matchCriteriaId": "7E3FF2E4-F2EF-43E7-911A-7744C4206216", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.336:*:*:*:*:*:*:*", "matchCriteriaId": "09557B9C-3813-4466-995C-9FE3DC86B284", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.337:*:*:*:*:*:*:*", "matchCriteriaId": "215FE3BC-30AB-40DD-A9F9-13E8F1F25CC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.340:*:*:*:*:*:*:*", "matchCriteriaId": "85A8F9EA-7A8D-4BA9-9732-DE93388800A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.343:*:*:*:*:*:*:*", "matchCriteriaId": "4272E132-D632-4E88-BB68-BBA15FA68546", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.360:*:*:*:*:*:*:*", "matchCriteriaId": "080FCFDE-557E-4D35-8701-96AC28381ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.370:*:*:*:*:*:*:*", "matchCriteriaId": "E948F223-D365-4D5B-9C2B-FB064F8DC00B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Webmin before 1.500 and Usermin before 1.430 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Webmin anterior a 1.500 y Usermin anterior a 1.430, permite a atacantes remotos inyectar secuencias de comandos Web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2009-4568", "lastModified": "2024-11-21T01:09:56.447", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-01-05T19:00:00.340", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37648" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:036" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/37259" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3457" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.webmin.com/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/37259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3457" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.webmin.com/security.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-07-20 11:12
Modified
2024-11-21 02:09
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Usermin before 1.600 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this might overlap CVE-2014-3924.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN92737498/index.html | Vendor Advisory | |
vultures@jpcert.or.jp | http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN92737498/index.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*", "matchCriteriaId": "928167DF-5E72-4775-99C3-735068AFD05F", "versionEndIncluding": "1.590", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3046F962-BD9C-4E67-B2A8-9664440317A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "A83F4A87-03D8-461B-B64A-81E171C88119", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E777B661-B6A5-4033-85BA-4B17A7FDF905", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "866EC157-2F84-4382-B081-AB7BF9D5B649", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.80:*:*:*:*:*:*:*", "matchCriteriaId": "7F001647-DBB0-4B2A-AAF0-44DB043FB6DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.90:*:*:*:*:*:*:*", "matchCriteriaId": "9A424E19-4946-4F66-8198-25380B073631", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.910:*:*:*:*:*:*:*", "matchCriteriaId": "88950B52-9163-42CA-B693-E451C5EFF0AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.929:*:*:*:*:*:*:*", "matchCriteriaId": "50397E8C-F4B4-48EA-9305-AEA7D946A222", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.930:*:*:*:*:*:*:*", "matchCriteriaId": "9A6C9C87-DDA3-4F9F-BC5F-D23BBF866DCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.940:*:*:*:*:*:*:*", "matchCriteriaId": "2F88DA6C-2018-4332-B8B9-2DE8C84AFF0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.950:*:*:*:*:*:*:*", "matchCriteriaId": "1EFE6FC5-4B9D-4270-8847-4A8CD016B861", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.960:*:*:*:*:*:*:*", "matchCriteriaId": "7AB5C8A8-3DC9-4DE7-9A69-E61F9BA481AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.970:*:*:*:*:*:*:*", "matchCriteriaId": "51C3396E-17DD-4096-B165-62C95D9EB349", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.980:*:*:*:*:*:*:*", "matchCriteriaId": "DFDF2AE3-69D9-4BAC-895A-2E916A8247DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:0.990:*:*:*:*:*:*:*", "matchCriteriaId": "2AF11C33-F62D-4486-920C-9528E519107B", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.000:*:*:*:*:*:*:*", "matchCriteriaId": "973363CE-6A66-4BAF-8C11-D9B4911BF9A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.010:*:*:*:*:*:*:*", "matchCriteriaId": "20B5FDD4-AD31-4985-97E2-179C0F6A6525", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.020:*:*:*:*:*:*:*", "matchCriteriaId": "0C3551D4-9B28-4A29-9C30-D91C5D81F195", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.030:*:*:*:*:*:*:*", "matchCriteriaId": "8EEF1E3D-F633-4594-8E65-6AB0B941E95A", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.040:*:*:*:*:*:*:*", "matchCriteriaId": "D32B0E0C-B72B-4F3D-ABAC-BBA5A6E242ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.050:*:*:*:*:*:*:*", "matchCriteriaId": "66BDC46A-832F-4DE9-848E-898F99798D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.051:*:*:*:*:*:*:*", "matchCriteriaId": "70AC0911-928C-4087-9EA8-BF0CB25BDD56", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.060:*:*:*:*:*:*:*", "matchCriteriaId": "35B34A95-A9D1-454D-AE3A-A68AE11A60AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.070:*:*:*:*:*:*:*", "matchCriteriaId": "EDE9ABF8-331F-4268-8D2A-692BEC8F98DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.080:*:*:*:*:*:*:*", "matchCriteriaId": "8BD93C56-DE08-4CAC-A345-7C40C2CB0598", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.090:*:*:*:*:*:*:*", "matchCriteriaId": "F540CEF3-C21D-48E5-84AD-81CF7C62A948", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.100:*:*:*:*:*:*:*", "matchCriteriaId": "E554657F-DF48-41F9-A2F6-4C311C2AC99A", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.110:*:*:*:*:*:*:*", "matchCriteriaId": "CA039A97-F28A-4216-B909-79EEBD8A6FC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.120:*:*:*:*:*:*:*", "matchCriteriaId": "75B0C24B-7A62-4157-8CA8-5FA800F67C33", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.130:*:*:*:*:*:*:*", "matchCriteriaId": "F3652F8E-A163-4337-BAE0-210757FC421D", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.140:*:*:*:*:*:*:*", "matchCriteriaId": "87E84FE0-ACF0-43D9-ACC2-D662D5488B8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.150:*:*:*:*:*:*:*", "matchCriteriaId": "83419D0A-7C03-4F3E-9A95-25BA299D5961", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.160:*:*:*:*:*:*:*", "matchCriteriaId": "77075C79-35BF-4841-8103-A372A67ECF45", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.170:*:*:*:*:*:*:*", "matchCriteriaId": "6FDF692C-13F5-4E42-A5DF-2116080462F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.180:*:*:*:*:*:*:*", "matchCriteriaId": "8D31D014-CB91-436C-A114-3C33D95E8D73", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.190:*:*:*:*:*:*:*", "matchCriteriaId": "3FBA2FDA-D70D-4850-A7E7-4A3C25B0C1C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.200:*:*:*:*:*:*:*", "matchCriteriaId": "1A4AC88F-C70C-4184-8605-5A4BC95D83DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.210:*:*:*:*:*:*:*", "matchCriteriaId": "72D4AAAF-A284-4FD9-B011-C822ED2DBAC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.220:*:*:*:*:*:*:*", "matchCriteriaId": "490DBC72-DADD-491E-AC18-4D4C178ABECD", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.230:*:*:*:*:*:*:*", "matchCriteriaId": "A455B1DC-03F9-4338-9BD5-9184434F7AA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.240:*:*:*:*:*:*:*", "matchCriteriaId": "36C87163-EBC2-47DC-9865-9455CF066DB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.250:*:*:*:*:*:*:*", "matchCriteriaId": "EDBED527-4698-44DC-8DFE-E107702C2D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.260:*:*:*:*:*:*:*", "matchCriteriaId": "15CFE78E-22EB-47B1-9BD3-0A093645304A", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.270:*:*:*:*:*:*:*", "matchCriteriaId": "D8CAB5C2-2F68-46F6-BF7D-12AEEB03BF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.280:*:*:*:*:*:*:*", "matchCriteriaId": "A5E20E3B-AC6A-4059-9C49-9AF4FADDFF30", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.290:*:*:*:*:*:*:*", "matchCriteriaId": "B0B775C5-8A6F-4D08-9776-709029E918D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.300:*:*:*:*:*:*:*", "matchCriteriaId": "D0235C6D-7EC8-4D89-8AE5-04B5628EDB74", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.310:*:*:*:*:*:*:*", "matchCriteriaId": "3686B12E-EE12-4FDF-98BE-C7D24ADD6C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.320:*:*:*:*:*:*:*", "matchCriteriaId": "F0BED163-D9FF-45C9-90D5-1B167ADD423C", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.330:*:*:*:*:*:*:*", "matchCriteriaId": "93488E00-C176-4C66-85D5-172F33E3DECD", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.340:*:*:*:*:*:*:*", "matchCriteriaId": "3DF6456E-E2F2-4777-BACC-9422B759F7F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.350:*:*:*:*:*:*:*", "matchCriteriaId": "793F6997-0CCB-4074-97E3-E343D8508A48", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.360:*:*:*:*:*:*:*", "matchCriteriaId": "A957BD3B-6074-48CD-9A13-14125E0E5D07", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.370:*:*:*:*:*:*:*", "matchCriteriaId": "4B6BB3FC-61B6-42DF-9229-99C16BA41720", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.380:*:*:*:*:*:*:*", "matchCriteriaId": "EFCB8560-8CEF-4CC4-B7C7-275C86F1A03C", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.390:*:*:*:*:*:*:*", "matchCriteriaId": "9DFC35F7-DB28-49AB-ADFE-1068C751D49C", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.400:*:*:*:*:*:*:*", "matchCriteriaId": "4508D9EF-6917-40D9-9443-96AA96A924DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.410:*:*:*:*:*:*:*", "matchCriteriaId": "6D741056-8345-4C59-BD22-546D01DE5F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.420:*:*:*:*:*:*:*", "matchCriteriaId": "0FCA449A-5DF9-418D-B6D9-F4A73DBC3C65", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.430:*:*:*:*:*:*:*", "matchCriteriaId": "8E129FDD-A404-465E-9A04-00A2090F7EDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.440:*:*:*:*:*:*:*", "matchCriteriaId": "1841FFC1-25BA-4301-9515-381DAFBBCF6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.450:*:*:*:*:*:*:*", "matchCriteriaId": "5038DD1D-793B-4117-B59D-9E1B520A1C76", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.460:*:*:*:*:*:*:*", "matchCriteriaId": "06E9E986-E4A7-4BFA-91D8-5E47D31F4EBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.470:*:*:*:*:*:*:*", "matchCriteriaId": "80B1D2D5-315B-4432-A9E6-41E9ABB329A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.480:*:*:*:*:*:*:*", "matchCriteriaId": "9810CFF4-6321-4016-9A10-A7C3D90CB000", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.490:*:*:*:*:*:*:*", "matchCriteriaId": "2E26A472-555C-4081-8FBD-054761B4FE87", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.500:*:*:*:*:*:*:*", "matchCriteriaId": "13519AED-F310-49BA-B0E2-F52F8233F6A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.510:*:*:*:*:*:*:*", "matchCriteriaId": "125CF39D-EBBA-418B-A9DC-207E5A510A45", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.520:*:*:*:*:*:*:*", "matchCriteriaId": "CE280A31-AC7F-4A48-8F71-F9C2AB8EC7EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.530:*:*:*:*:*:*:*", "matchCriteriaId": "FFABB6DD-E9C7-424C-8938-61A6617E2E27", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.540:*:*:*:*:*:*:*", "matchCriteriaId": "2DD1A23C-FB0C-4899-AC34-8BD0BC7E4038", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.550:*:*:*:*:*:*:*", "matchCriteriaId": "7EE09F26-2068-4E74-8B9A-5E1A1F5EDD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.560:*:*:*:*:*:*:*", "matchCriteriaId": "9DBB07F9-A3EB-485C-9116-1885F673BB7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.570:*:*:*:*:*:*:*", "matchCriteriaId": "E4146A93-C7E4-4A38-8E38-E051D4D54BDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:usermin:1.580:*:*:*:*:*:*:*", "matchCriteriaId": "7EA40B6F-4D0C-44A6-854A-B4DBCCBFD8BA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Usermin before 1.600 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this might overlap CVE-2014-3924." }, { "lang": "es", "value": "Vulnerabilidad de XSS en Usermin anterior a 1.600 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores no especificados. NOTA: esto podr\u00eda solarse con CVE-2014-3924." } ], "id": "CVE-2014-3884", "lastModified": "2024-11-21T02:09:03.527", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-07-20T11:12:50.433", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN92737498/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN92737498/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-25 17:15
Modified
2024-11-21 07:10
Severity ?
Summary
Usermin through 1.850 allows a remote authenticated user to execute OS commands via command injection in a filename for the GPG module.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/ly1g3/webmin-usermin-vulnerabilities | Exploit, Third Party Advisory | |
cve@mitre.org | https://webmin.com/uchanges.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/ly1g3/webmin-usermin-vulnerabilities | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://webmin.com/uchanges.html | Release Notes, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*", "matchCriteriaId": "24AEB62A-F2B3-442F-8FE7-B649173A0236", "versionEndIncluding": "1.850", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Usermin through 1.850 allows a remote authenticated user to execute OS commands via command injection in a filename for the GPG module." }, { "lang": "es", "value": "Usermin versiones hasta 1.850, permite a un usuario remoto autenticado ejecutar comandos del Sistema Operativo por medio de una inyecci\u00f3n de comandos en un nombre de archivo del m\u00f3dulo GPG" } ], "id": "CVE-2022-35132", "lastModified": "2024-11-21T07:10:47.803", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-25T17:15:53.727", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ly1g3/webmin-usermin-vulnerabilities" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://webmin.com/uchanges.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ly1g3/webmin-usermin-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://webmin.com/uchanges.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-13 22:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the scheduled cron jobs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the value field parameter while creating a new environment variable.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*", "matchCriteriaId": "ED13897E-B6FB-4976-9037-2136FDFE1A50", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the scheduled cron jobs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the value field parameter while creating a new environment variable." }, { "lang": "es", "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pesta\u00f1a de trabajos cron programados en Usermin 2.000 permite a atacantes remotos inyectar scripts web o HTML de su elecci\u00f3n a trav\u00e9s del par\u00e1metro de campo de valor mientras crean una nueva variable de entorno." } ], "id": "CVE-2023-41154", "lastModified": "2024-11-21T08:20:40.870", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-13T22:15:08.623", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41154" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41154" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-12 22:59
Modified
2024-11-21 02:53
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi in Usermin before 1.690.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN32504719/index.html | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | http://www.securityfocus.com/bid/93477 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN32504719/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/93477 | Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*", "matchCriteriaId": "40B4E312-6082-49F1-9B40-A603221570A2", "versionEndIncluding": "1.680", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi in Usermin before 1.690." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades (XSS) en (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi en Usermin en versiones anteriores a 1.690." } ], "id": "CVE-2016-4897", "lastModified": "2024-11-21T02:53:12.063", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-12T22:59:00.600", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN32504719/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93477" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN32504719/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93477" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-06-11 22:30
Modified
2024-11-21 00:32
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in pam_login.cgi in Webmin before 1.350 and Usermin before 1.280 allow remote attackers to inject arbitrary web script or HTML via the (1) cid, (2) message, or (3) question parameter. NOTE: some of these details are obtained from third party information.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD9A726E-9D24-40A5-A82A-B7D1B4EE3677", "versionEndIncluding": "1.280", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*", "matchCriteriaId": "E60E962F-8A39-481D-B272-BEA4A2E02A99", "versionEndIncluding": "1.340", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in pam_login.cgi in Webmin before 1.350 and Usermin before 1.280 allow remote attackers to inject arbitrary web script or HTML via the (1) cid, (2) message, or (3) question parameter. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de tipo cross-site scripting (XSS) en el archivo pam_login.cgi en webmin versiones anteriores a 1.350 y Usermin versiones anteriores a 1.280, permiten a atacantes remotos inyectar script web o HTML arbitrario por medio del par\u00e1metro (1) cid, (2) message o (3) question. NOTA: algunos de estos datos son obtenidos a partir de la informaci\u00f3n de terceros." } ], "id": "CVE-2007-3156", "lastModified": "2024-11-21T00:32:32.250", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-06-11T22:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/36932" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/25580" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25785" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25956" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200707-05.xml" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:135" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/24381" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/2117" }, { "source": "cve@mitre.org", "url": "http://www.webmin.com/changes-1.350.html" }, { "source": "cve@mitre.org", "url": "http://www.webmin.com/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/25580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25956" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200707-05.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/24381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/2117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.webmin.com/changes-1.350.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.webmin.com/security.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-13 22:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the description field while creating a new MIME type program.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*", "matchCriteriaId": "ED13897E-B6FB-4976-9037-2136FDFE1A50", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the description field while creating a new MIME type program." }, { "lang": "es", "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pesta\u00f1a de programas de tipo MIME en Usermin 2.000 permite a atacantes remotos inyectar scripts web o HTML de su elecci\u00f3n a trav\u00e9s del campo de descripci\u00f3n mientras crean un nuevo programa de tipo MIME." } ], "id": "CVE-2023-41158", "lastModified": "2024-11-21T08:20:41.503", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-13T22:15:08.887", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41158" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41158" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-13 22:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the handle program field while creating a new MIME type program.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*", "matchCriteriaId": "ED13897E-B6FB-4976-9037-2136FDFE1A50", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the handle program field while creating a new MIME type program." }, { "lang": "es", "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pesta\u00f1a de programas de tipo MIME en Usermin 2.000 permite a atacantes remotos inyectar scripts web o HTML arbitrarias a trav\u00e9s del campo de programa de manejo mientras crean un nuevo programa de tipo MIME." } ], "id": "CVE-2023-41152", "lastModified": "2024-11-21T08:20:40.553", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-13T22:15:08.490", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41152" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41152" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-13 22:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the file mask field while searching under the tools drop down.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*", "matchCriteriaId": "ED13897E-B6FB-4976-9037-2136FDFE1A50", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the file mask field while searching under the tools drop down." }, { "lang": "es", "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) Reflejada en la pesta\u00f1a del administrador de archivos en Usermin 2.000 permite a atacantes remotos inyectar scripts web o HTML arbitrarias a trav\u00e9s del campo de m\u00e1scara de archivos mientras buscan en el men\u00fa desplegable de herramientas." } ], "id": "CVE-2023-41162", "lastModified": "2024-11-21T08:20:42.123", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-13T22:15:09.017", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41162" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-13 22:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the mail forwarding and replies tab in Webmin and Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the forward to field while creating a mail forwarding rule.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*", "matchCriteriaId": "ED13897E-B6FB-4976-9037-2136FDFE1A50", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:2.000:*:*:*:*:*:*:*", "matchCriteriaId": "32C6CF7F-1287-4AB2-B4C0-801AC1EC3CB5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the mail forwarding and replies tab in Webmin and Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the forward to field while creating a mail forwarding rule." }, { "lang": "es", "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pesta\u00f1a de reenv\u00edo de correo y respuestas en Webmin y Usermin 2.000 permite a atacantes remotos inyectar scripts web o HTML de su elecci\u00f3n a trav\u00e9s del campo reenviar a mientras crean una regla de reenv\u00edo de correo." } ], "id": "CVE-2023-41155", "lastModified": "2024-11-21T08:20:41.027", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-13T22:15:08.747", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41155" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-16 06:15
Modified
2024-11-21 08:20
Severity ?
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the folder name parameter while creating the folder to manage the folder tab, filter tab, and forward mail tab.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*", "matchCriteriaId": "ED13897E-B6FB-4976-9037-2136FDFE1A50", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the folder name parameter while creating the folder to manage the folder tab, filter tab, and forward mail tab." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de Cross-Site Scripting (XSS) almacenado en Usermin 2.000 permiten a atacantes remotos inyectar scripts web o HTML arbitrarias a trav\u00e9s del par\u00e1metro de \"nombre de carpeta\" mientras crean la carpeta para administrar la pesta\u00f1a de carpeta, la pesta\u00f1a de filtro y la pesta\u00f1a de reenv\u00edo de correo." } ], "id": "CVE-2023-41157", "lastModified": "2024-11-21T08:20:41.337", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-16T06:15:07.627", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41157" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-29 22:15
Modified
2024-11-21 08:20
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via options for the host value while editing the host options.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:2.001:*:*:*:*:*:*:*", "matchCriteriaId": "9CE9B3CB-9D26-492D-9584-317C5BE061EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via options for the host value while editing the host options." } ], "id": "CVE-2023-41153", "lastModified": "2024-11-21T08:20:40.710", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-29T22:15:09.217", "references": [ { "source": "cve@mitre.org", "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41153" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41153" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://webmin.com/tags/webmin-changelog/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-07-27 04:15
Modified
2024-11-21 07:13
Severity ?
Summary
The Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.webmin.com/security.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.webmin.com/security.html | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*", "matchCriteriaId": "24AEB62A-F2B3-442F-8FE7-B649173A0236", "versionEndIncluding": "1.850", "vulnerable": true }, { "criteria": "cpe:2.3:a:webmin:webmin:1.995:*:*:*:*:*:*:*", "matchCriteriaId": "720EE395-A946-4F86-892D-EFB3D3A4A0AB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message." }, { "lang": "es", "value": "El m\u00f3dulo Read Mail de Webmin 1.995 y Usermin hasta 1.850 permite un ataque de tipo XSS por medio de un mensaje de correo electr\u00f3nico HTML dise\u00f1ado" } ], "id": "CVE-2022-36880", "lastModified": "2024-11-21T07:13:58.237", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-27T04:15:10.837", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.webmin.com/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.webmin.com/security.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2022-36880
Vulnerability from cvelistv5
Published
2022-07-27 03:32
Modified
2024-08-03 10:14
Severity ?
EPSS score ?
Summary
The Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message.
References
▼ | URL | Tags |
---|---|---|
https://www.webmin.com/security.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:14:29.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.webmin.com/security.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-27T03:32:30", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.webmin.com/security.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-36880", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.webmin.com/security.html", "refsource": "MISC", "url": "https://www.webmin.com/security.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-36880", "datePublished": "2022-07-27T03:32:30", "dateReserved": "2022-07-27T00:00:00", "dateUpdated": "2024-08-03T10:14:29.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-4897
Vulnerability from cvelistv5
Published
2017-04-12 22:00
Modified
2024-08-06 00:46
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi in Usermin before 1.690.
References
▼ | URL | Tags |
---|---|---|
http://jvn.jp/en/jp/JVN32504719/index.html | third-party-advisory, x_refsource_JVN | |
http://www.securityfocus.com/bid/93477 | vdb-entry, x_refsource_BID | |
http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html | third-party-advisory, x_refsource_JVNDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:46:39.250Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVN#32504719", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN32504719/index.html" }, { "name": "93477", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93477" }, { "name": "JVNDB-2016-000202", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-10-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi in Usermin before 1.690." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-12T21:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVN#32504719", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN32504719/index.html" }, { "name": "93477", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93477" }, { "name": "JVNDB-2016-000202", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2016-4897", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi in Usermin before 1.690." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "JVN#32504719", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN32504719/index.html" }, { "name": "93477", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93477" }, { "name": "JVNDB-2016-000202", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2016-4897", "datePublished": "2017-04-12T22:00:00", "dateReserved": "2016-05-17T00:00:00", "dateUpdated": "2024-08-06T00:46:39.250Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41155
Vulnerability from cvelistv5
Published
2023-09-13 00:00
Modified
2024-09-25 20:39
Severity ?
EPSS score ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the mail forwarding and replies tab in Webmin and Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the forward to field while creating a mail forwarding rule.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.491Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41155" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41155", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T20:39:47.299305Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T20:39:56.424Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the mail forwarding and replies tab in Webmin and Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the forward to field while creating a mail forwarding rule." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-13T21:41:29.263678", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://webmin.com/tags/webmin-changelog/" }, { "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41155" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-41155", "datePublished": "2023-09-13T00:00:00", "dateReserved": "2023-08-24T00:00:00", "dateUpdated": "2024-09-25T20:39:56.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41157
Vulnerability from cvelistv5
Published
2023-09-16 00:00
Modified
2024-09-25 18:47
Severity ?
EPSS score ?
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the folder name parameter while creating the folder to manage the folder tab, filter tab, and forward mail tab.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.431Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41157" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41157", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T18:47:17.367385Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T18:47:25.652Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the folder name parameter while creating the folder to manage the folder tab, filter tab, and forward mail tab." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-16T05:10:09.828159", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://webmin.com/tags/webmin-changelog/" }, { "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41157" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-41157", "datePublished": "2023-09-16T00:00:00", "dateReserved": "2023-08-24T00:00:00", "dateUpdated": "2024-09-25T18:47:25.652Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-35132
Vulnerability from cvelistv5
Published
2022-10-25 00:00
Modified
2024-08-03 09:29
Severity ?
EPSS score ?
Summary
Usermin through 1.850 allows a remote authenticated user to execute OS commands via command injection in a filename for the GPG module.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:29:17.314Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/ly1g3/webmin-usermin-vulnerabilities" }, { "tags": [ "x_transferred" ], "url": "https://webmin.com/uchanges.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Usermin through 1.850 allows a remote authenticated user to execute OS commands via command injection in a filename for the GPG module." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-25T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/ly1g3/webmin-usermin-vulnerabilities" }, { "url": "https://webmin.com/uchanges.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-35132", "datePublished": "2022-10-25T00:00:00", "dateReserved": "2022-07-04T00:00:00", "dateUpdated": "2024-08-03T09:29:17.314Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41162
Vulnerability from cvelistv5
Published
2023-09-13 00:00
Modified
2024-09-25 20:34
Severity ?
EPSS score ?
Summary
A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the file mask field while searching under the tools drop down.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:03.501Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41162" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41162", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T20:34:15.287690Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T20:34:26.746Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the file mask field while searching under the tools drop down." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-13T21:51:18.238302", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://webmin.com/tags/webmin-changelog/" }, { "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41162" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-41162", "datePublished": "2023-09-13T00:00:00", "dateReserved": "2023-08-24T00:00:00", "dateUpdated": "2024-09-25T20:34:26.746Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41153
Vulnerability from cvelistv5
Published
2023-08-29 00:00
Modified
2024-10-02 13:19
Severity ?
EPSS score ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via options for the host value while editing the host options.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:03.538Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41153" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41153", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T13:18:57.084182Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T13:19:05.953Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via options for the host value while editing the host options." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T22:02:24.740092", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://webmin.com/tags/webmin-changelog/" }, { "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41153" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-41153", "datePublished": "2023-08-29T00:00:00", "dateReserved": "2023-08-24T00:00:00", "dateUpdated": "2024-10-02T13:19:05.953Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41156
Vulnerability from cvelistv5
Published
2023-09-14 00:00
Modified
2024-09-25 19:33
Severity ?
EPSS score ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the filter and forward mail tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the save to new folder named field while creating a new filter.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:03.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41156" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41156", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T19:32:59.314276Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T19:33:15.580Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the filter and forward mail tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the save to new folder named field while creating a new filter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-14T20:46:17.664013", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://webmin.com/tags/webmin-changelog/" }, { "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41156" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-41156", "datePublished": "2023-09-14T00:00:00", "dateReserved": "2023-08-24T00:00:00", "dateUpdated": "2024-09-25T19:33:15.580Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36453
Vulnerability from cvelistv5
Published
2024-07-10 07:02
Modified
2024-11-06 21:34
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability exists in session_login.cgi of Webmin versions prior to 1.970 and Usermin versions prior to 1.820. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a webpage may be altered or sensitive information such as a credential may be disclosed.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-36453", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-10T14:03:38.998862Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-06T21:34:36.873Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.102Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://webmin.com/" }, { "tags": [ "x_transferred" ], "url": "https://webmin.com/usermin/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN81442045/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Webmin", "vendor": "Webmin", "versions": [ { "status": "affected", "version": "versions prior to 1.970" } ] }, { "product": "Usermin", "vendor": "Webmin", "versions": [ { "status": "affected", "version": "versions prior to 1.820" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in session_login.cgi of Webmin versions prior to 1.970 and Usermin versions prior to 1.820. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a webpage may be altered or sensitive information such as a credential may be disclosed." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-10T07:02:17.776Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://webmin.com/" }, { "url": "https://webmin.com/usermin/" }, { "url": "https://jvn.jp/en/jp/JVN81442045/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-36453", "datePublished": "2024-07-10T07:02:17.776Z", "dateReserved": "2024-05-28T05:38:38.739Z", "dateUpdated": "2024-11-06T21:34:36.873Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41152
Vulnerability from cvelistv5
Published
2023-09-13 00:00
Modified
2024-09-26 13:19
Severity ?
EPSS score ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the handle program field while creating a new MIME type program.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:03.732Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41152" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41152", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T13:19:25.826234Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T13:19:38.230Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the handle program field while creating a new MIME type program." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-13T21:10:43.110819", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://webmin.com/tags/webmin-changelog/" }, { "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41152" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-41152", "datePublished": "2023-09-13T00:00:00", "dateReserved": "2023-08-24T00:00:00", "dateUpdated": "2024-09-26T13:19:38.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41160
Vulnerability from cvelistv5
Published
2023-09-14 00:00
Modified
2024-09-25 19:22
Severity ?
EPSS score ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the key name field while adding an authorized key.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:03.552Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41160" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41160", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T19:22:34.362404Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T19:22:51.517Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the key name field while adding an authorized key." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-14T20:40:46.472788", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://webmin.com/tags/webmin-changelog/" }, { "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41160" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-41160", "datePublished": "2023-09-14T00:00:00", "dateReserved": "2023-08-24T00:00:00", "dateUpdated": "2024-09-25T19:22:51.517Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41159
Vulnerability from cvelistv5
Published
2023-09-14 00:00
Modified
2024-09-25 19:30
Severity ?
EPSS score ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability while editing the autoreply file page in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML by editing the forward file manually.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:03.956Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41159" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41159", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T19:30:16.854586Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T19:30:29.942Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability while editing the autoreply file page in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML by editing the forward file manually." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-14T20:58:25.091676", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://webmin.com/tags/webmin-changelog/" }, { "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41159" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-41159", "datePublished": "2023-09-14T00:00:00", "dateReserved": "2023-08-24T00:00:00", "dateUpdated": "2024-09-25T19:30:29.942Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-4568
Vulnerability from cvelistv5
Published
2010-01-05 18:31
Modified
2024-08-07 07:08
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Webmin before 1.500 and Usermin before 1.430 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.webmin.com/security.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/37259 | vdb-entry, x_refsource_BID | |
http://www.mandriva.com/security/advisories?name=MDVSA-2010:036 | vendor-advisory, x_refsource_MANDRIVA | |
http://secunia.com/advisories/37648 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2009/3457 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:08:38.108Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.webmin.com/security.html" }, { "name": "37259", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37259" }, { "name": "MDVSA-2010:036", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:036" }, { "name": "37648", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37648" }, { "name": "ADV-2009-3457", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3457" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-12-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Webmin before 1.500 and Usermin before 1.430 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-02-24T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.webmin.com/security.html" }, { "name": "37259", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37259" }, { "name": "MDVSA-2010:036", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:036" }, { "name": "37648", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37648" }, { "name": "ADV-2009-3457", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3457" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-4568", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Webmin before 1.500 and Usermin before 1.430 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.webmin.com/security.html", "refsource": "CONFIRM", "url": "http://www.webmin.com/security.html" }, { "name": "37259", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37259" }, { "name": "MDVSA-2010:036", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:036" }, { "name": "37648", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37648" }, { "name": "ADV-2009-3457", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3457" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-4568", "datePublished": "2010-01-05T18:31:00", "dateReserved": "2010-01-05T00:00:00", "dateUpdated": "2024-08-07T07:08:38.108Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41161
Vulnerability from cvelistv5
Published
2023-09-07 00:00
Modified
2024-09-26 19:03
Severity ?
EPSS score ?
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the key comment to different pages such as public key details, Export key, sign key, send to key server page, and fetch from key server page tab.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41161" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41161", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T19:02:48.923529Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T19:03:09.539Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the key comment to different pages such as public key details, Export key, sign key, send to key server page, and fetch from key server page tab." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-07T21:09:40.326249", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://webmin.com/tags/webmin-changelog/" }, { "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41161" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-41161", "datePublished": "2023-09-07T00:00:00", "dateReserved": "2023-08-24T00:00:00", "dateUpdated": "2024-09-26T19:03:09.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-3156
Vulnerability from cvelistv5
Published
2007-06-11 22:00
Modified
2024-08-07 14:05
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in pam_login.cgi in Webmin before 1.350 and Usermin before 1.280 allow remote attackers to inject arbitrary web script or HTML via the (1) cid, (2) message, or (3) question parameter. NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://www.webmin.com/security.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/25785 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2007/2117 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/24381 | vdb-entry, x_refsource_BID | |
http://www.webmin.com/changes-1.350.html | x_refsource_CONFIRM | |
http://security.gentoo.org/glsa/glsa-200707-05.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/25580 | third-party-advisory, x_refsource_SECUNIA | |
http://osvdb.org/36932 | vdb-entry, x_refsource_OSVDB | |
http://www.mandriva.com/security/advisories?name=MDKSA-2007:135 | vendor-advisory, x_refsource_MANDRIVA | |
http://secunia.com/advisories/25956 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:05:29.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.webmin.com/security.html" }, { "name": "25785", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25785" }, { "name": "ADV-2007-2117", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2117" }, { "name": "24381", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24381" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.webmin.com/changes-1.350.html" }, { "name": "GLSA-200707-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200707-05.xml" }, { "name": "25580", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25580" }, { "name": "36932", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36932" }, { "name": "MDKSA-2007:135", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:135" }, { "name": "25956", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25956" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-06-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in pam_login.cgi in Webmin before 1.350 and Usermin before 1.280 allow remote attackers to inject arbitrary web script or HTML via the (1) cid, (2) message, or (3) question parameter. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-06-27T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.webmin.com/security.html" }, { "name": "25785", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25785" }, { "name": "ADV-2007-2117", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2117" }, { "name": "24381", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24381" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.webmin.com/changes-1.350.html" }, { "name": "GLSA-200707-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200707-05.xml" }, { "name": "25580", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25580" }, { "name": "36932", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36932" }, { "name": "MDKSA-2007:135", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:135" }, { "name": "25956", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25956" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3156", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in pam_login.cgi in Webmin before 1.350 and Usermin before 1.280 allow remote attackers to inject arbitrary web script or HTML via the (1) cid, (2) message, or (3) question parameter. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.webmin.com/security.html", "refsource": "CONFIRM", "url": "http://www.webmin.com/security.html" }, { "name": "25785", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25785" }, { "name": "ADV-2007-2117", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2117" }, { "name": "24381", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24381" }, { "name": "http://www.webmin.com/changes-1.350.html", "refsource": "CONFIRM", "url": "http://www.webmin.com/changes-1.350.html" }, { "name": "GLSA-200707-05", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200707-05.xml" }, { "name": "25580", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25580" }, { "name": "36932", "refsource": "OSVDB", "url": "http://osvdb.org/36932" }, { "name": "MDKSA-2007:135", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:135" }, { "name": "25956", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25956" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3156", "datePublished": "2007-06-11T22:00:00", "dateReserved": "2007-06-11T00:00:00", "dateUpdated": "2024-08-07T14:05:29.294Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3883
Vulnerability from cvelistv5
Published
2014-06-21 15:00
Modified
2024-08-06 10:57
Severity ?
EPSS score ?
Summary
Usermin before 1.600 allows remote attackers to execute arbitrary operating-system commands via unspecified vectors related to a user action.
References
▼ | URL | Tags |
---|---|---|
https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html | x_refsource_MISC | |
http://jvn.jp/en/jp/JVN48805624/index.html | third-party-advisory, x_refsource_JVN | |
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057 | third-party-advisory, x_refsource_JVNDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:57:17.891Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html" }, { "name": "JVN#48805624", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN48805624/index.html" }, { "name": "JVNDB-2014-000057", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-06-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Usermin before 1.600 allows remote attackers to execute arbitrary operating-system commands via unspecified vectors related to a user action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-06-21T15:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html" }, { "name": "JVN#48805624", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN48805624/index.html" }, { "name": "JVNDB-2014-000057", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2014-3883", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Usermin before 1.600 allows remote attackers to execute arbitrary operating-system commands via unspecified vectors related to a user action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html", "refsource": "MISC", "url": "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html" }, { "name": "JVN#48805624", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN48805624/index.html" }, { "name": "JVNDB-2014-000057", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2014-3883", "datePublished": "2014-06-21T15:00:00", "dateReserved": "2014-05-27T00:00:00", "dateUpdated": "2024-08-06T10:57:17.891Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3884
Vulnerability from cvelistv5
Published
2014-07-20 10:00
Modified
2024-08-06 10:57
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Usermin before 1.600 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this might overlap CVE-2014-3924.
References
▼ | URL | Tags |
---|---|---|
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058 | third-party-advisory, x_refsource_JVNDB | |
http://jvn.jp/en/jp/JVN92737498/index.html | third-party-advisory, x_refsource_JVN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:57:17.939Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVNDB-2014-000058", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058" }, { "name": "JVN#92737498", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN92737498/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-06-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Usermin before 1.600 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this might overlap CVE-2014-3924." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-07-20T06:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVNDB-2014-000058", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058" }, { "name": "JVN#92737498", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN92737498/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2014-3884", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Usermin before 1.600 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this might overlap CVE-2014-3924." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "JVNDB-2014-000058", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058" }, { "name": "JVN#92737498", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN92737498/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2014-3884", "datePublished": "2014-07-20T10:00:00", "dateReserved": "2014-05-27T00:00:00", "dateUpdated": "2024-08-06T10:57:17.939Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41154
Vulnerability from cvelistv5
Published
2023-09-13 00:00
Modified
2024-09-26 13:15
Severity ?
EPSS score ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the scheduled cron jobs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the value field parameter while creating a new environment variable.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:03.475Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41154" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41154", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T13:15:29.354992Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T13:15:37.164Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the scheduled cron jobs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the value field parameter while creating a new environment variable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-13T21:08:07.076190", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://webmin.com/tags/webmin-changelog/" }, { "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41154" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-41154", "datePublished": "2023-09-13T00:00:00", "dateReserved": "2023-08-24T00:00:00", "dateUpdated": "2024-09-26T13:15:37.164Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41158
Vulnerability from cvelistv5
Published
2023-09-13 00:00
Modified
2024-09-25 20:36
Severity ?
EPSS score ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the description field while creating a new MIME type program.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.336Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://webmin.com/tags/webmin-changelog/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41158", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T20:35:50.024676Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T20:36:19.802Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the description field while creating a new MIME type program." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-13T21:19:06.949646", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://webmin.com/tags/webmin-changelog/" }, { "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41158" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-41158", "datePublished": "2023-09-13T00:00:00", "dateReserved": "2023-08-24T00:00:00", "dateUpdated": "2024-09-25T20:36:19.802Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-0720
Vulnerability from cvelistv5
Published
2008-02-12 01:00
Modified
2024-08-07 07:54
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Webmin 1.370 and 1.390 and Usermin 1.300 and 1.320 allows remote attackers to inject arbitrary web script or HTML via the search parameter to webmin_search.cgi (aka the search section), and possibly other components accessed through a "search box" or "open file box." NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/487678/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/28827 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/27662 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/487656/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2008/0450 | vdb-entry, x_refsource_VUPEN | |
http://forum.aria-security.net/showthread.php?t=511 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:54:23.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20080206 Re: Tested on Webmin 1.390", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487678/100/0/threaded" }, { "name": "28827", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28827" }, { "name": "27662", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27662" }, { "name": "20080206 Tested on Webmin 1.390", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487656/100/0/threaded" }, { "name": "ADV-2008-0450", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0450" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://forum.aria-security.net/showthread.php?t=511" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Webmin 1.370 and 1.390 and Usermin 1.300 and 1.320 allows remote attackers to inject arbitrary web script or HTML via the search parameter to webmin_search.cgi (aka the search section), and possibly other components accessed through a \"search box\" or \"open file box.\" NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20080206 Re: Tested on Webmin 1.390", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487678/100/0/threaded" }, { "name": "28827", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28827" }, { "name": "27662", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27662" }, { "name": "20080206 Tested on Webmin 1.390", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487656/100/0/threaded" }, { "name": "ADV-2008-0450", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0450" }, { "tags": [ "x_refsource_MISC" ], "url": "http://forum.aria-security.net/showthread.php?t=511" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0720", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Webmin 1.370 and 1.390 and Usermin 1.300 and 1.320 allows remote attackers to inject arbitrary web script or HTML via the search parameter to webmin_search.cgi (aka the search section), and possibly other components accessed through a \"search box\" or \"open file box.\" NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20080206 Re: Tested on Webmin 1.390", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487678/100/0/threaded" }, { "name": "28827", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28827" }, { "name": "27662", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27662" }, { "name": "20080206 Tested on Webmin 1.390", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487656/100/0/threaded" }, { "name": "ADV-2008-0450", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0450" }, { "name": "http://forum.aria-security.net/showthread.php?t=511", "refsource": "MISC", "url": "http://forum.aria-security.net/showthread.php?t=511" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0720", "datePublished": "2008-02-12T01:00:00", "dateReserved": "2008-02-11T00:00:00", "dateUpdated": "2024-08-07T07:54:23.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }