All the vulnerabilites related to webmin - usermin
Vulnerability from fkie_nvd
Published
2023-09-14 21:15
Modified
2024-11-21 08:20
Summary
A Stored Cross-Site Scripting (XSS) vulnerability while editing the autoreply file page in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML by editing the forward file manually.
Impacted products
Vendor Product Version
webmin usermin 2.000



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED13897E-B6FB-4976-9037-2136FDFE1A50",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Stored Cross-Site Scripting (XSS) vulnerability while editing the autoreply file page in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML by editing the forward file manually."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado al editar la p\u00e1gina del archivo de respuesta autom\u00e1tica en Usermin 2.000 permite a atacantes remotos inyectar script web o HTML de su elecci\u00f3n editando el archivo de reenv\u00edo manualmente."
    }
  ],
  "id": "CVE-2023-41159",
  "lastModified": "2024-11-21T08:20:41.660",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-14T21:15:10.690",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41159"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41159"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-07 22:15
Modified
2024-11-21 08:20
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the key comment to different pages such as public key details, Export key, sign key, send to key server page, and fetch from key server page tab.
Impacted products
Vendor Product Version
webmin usermin 2.000



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED13897E-B6FB-4976-9037-2136FDFE1A50",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the key comment to different pages such as public key details, Export key, sign key, send to key server page, and fetch from key server page tab."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de Cross-Site Scripting (XSS) almacenadas en Usermin 2.000 permite a atacantes remotos inyectar script web o HTML arbitrarios mediante a trav\u00e9s del comentario de la clave a diferentes p\u00e1ginas, como detalles de la clave p\u00fablica, Exportar clave, Firmar clave, Enviar a la p\u00e1gina del servidor de claves y Obtener de la pesta\u00f1a de la p\u00e1gina del servidor de claves."
    }
  ],
  "id": "CVE-2023-41161",
  "lastModified": "2024-11-21T08:20:41.970",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-07T22:15:07.793",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41161"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41161"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-14 21:15
Modified
2024-11-21 08:20
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the filter and forward mail tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the save to new folder named field while creating a new filter.
Impacted products
Vendor Product Version
webmin usermin 2.001



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:2.001:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CE9B3CB-9D26-492D-9584-317C5BE061EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the filter and forward mail tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the save to new folder named field while creating a new filter."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pesta\u00f1a de filtro y reenv\u00edo de correo en Usermin 2.001 permite a atacantes remotos inyectar script web o HTML de su elecci\u00f3n a trav\u00e9s del campo llamado \"guardar en nueva carpeta\" mientras crean un nuevo filtro."
    }
  ],
  "id": "CVE-2023-41156",
  "lastModified": "2024-11-21T08:20:41.177",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-14T21:15:10.630",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41156"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41156"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-14 21:15
Modified
2024-11-21 08:20
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the key name field while adding an authorized key.
Impacted products
Vendor Product Version
webmin usermin 2.001



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:2.001:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CE9B3CB-9D26-492D-9584-317C5BE061EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the key name field while adding an authorized key."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pesta\u00f1a de configuraci\u00f3n SSH en Usermin 2.001 permite a los atacantes remotos inyectar scripts web arbitrarios o HTML a trav\u00e9s del campo de nombre de clave mientras agregan una clave autorizada."
    }
  ],
  "id": "CVE-2023-41160",
  "lastModified": "2024-11-21T08:20:41.823",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-14T21:15:10.750",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41160"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41160"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-06-21 15:55
Modified
2024-11-21 02:09
Severity ?
Summary
Usermin before 1.600 allows remote attackers to execute arbitrary operating-system commands via unspecified vectors related to a user action.
Impacted products
Vendor Product Version
webmin usermin *
webmin usermin 0.4
webmin usermin 0.5
webmin usermin 0.6
webmin usermin 0.7
webmin usermin 0.80
webmin usermin 0.90
webmin usermin 0.910
webmin usermin 0.929
webmin usermin 0.930
webmin usermin 0.940
webmin usermin 0.950
webmin usermin 0.960
webmin usermin 0.970
webmin usermin 0.980
webmin usermin 0.990
webmin usermin 1.000
webmin usermin 1.010
webmin usermin 1.020
webmin usermin 1.030
webmin usermin 1.040
webmin usermin 1.050
webmin usermin 1.051
webmin usermin 1.060
webmin usermin 1.070
webmin usermin 1.080
webmin usermin 1.090
webmin usermin 1.100
webmin usermin 1.110
webmin usermin 1.120
webmin usermin 1.130
webmin usermin 1.140
webmin usermin 1.150
webmin usermin 1.160
webmin usermin 1.170
webmin usermin 1.180
webmin usermin 1.190
webmin usermin 1.200
webmin usermin 1.210
webmin usermin 1.220
webmin usermin 1.230
webmin usermin 1.240
webmin usermin 1.250
webmin usermin 1.260
webmin usermin 1.270
webmin usermin 1.280
webmin usermin 1.290
webmin usermin 1.300
webmin usermin 1.310
webmin usermin 1.320
webmin usermin 1.330
webmin usermin 1.340
webmin usermin 1.350
webmin usermin 1.360
webmin usermin 1.370
webmin usermin 1.380
webmin usermin 1.390
webmin usermin 1.400
webmin usermin 1.410
webmin usermin 1.420
webmin usermin 1.430
webmin usermin 1.440
webmin usermin 1.450
webmin usermin 1.460
webmin usermin 1.470
webmin usermin 1.480
webmin usermin 1.490
webmin usermin 1.500
webmin usermin 1.510
webmin usermin 1.520
webmin usermin 1.530
webmin usermin 1.540
webmin usermin 1.550
webmin usermin 1.560
webmin usermin 1.570
webmin usermin 1.580



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "928167DF-5E72-4775-99C3-735068AFD05F",
              "versionEndIncluding": "1.590",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3046F962-BD9C-4E67-B2A8-9664440317A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A83F4A87-03D8-461B-B64A-81E171C88119",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E777B661-B6A5-4033-85BA-4B17A7FDF905",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "866EC157-2F84-4382-B081-AB7BF9D5B649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F001647-DBB0-4B2A-AAF0-44DB043FB6DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A424E19-4946-4F66-8198-25380B073631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.910:*:*:*:*:*:*:*",
              "matchCriteriaId": "88950B52-9163-42CA-B693-E451C5EFF0AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.929:*:*:*:*:*:*:*",
              "matchCriteriaId": "50397E8C-F4B4-48EA-9305-AEA7D946A222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.930:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A6C9C87-DDA3-4F9F-BC5F-D23BBF866DCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.940:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F88DA6C-2018-4332-B8B9-2DE8C84AFF0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.950:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EFE6FC5-4B9D-4270-8847-4A8CD016B861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.960:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AB5C8A8-3DC9-4DE7-9A69-E61F9BA481AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.970:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C3396E-17DD-4096-B165-62C95D9EB349",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.980:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFDF2AE3-69D9-4BAC-895A-2E916A8247DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.990:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF11C33-F62D-4486-920C-9528E519107B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "973363CE-6A66-4BAF-8C11-D9B4911BF9A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.010:*:*:*:*:*:*:*",
              "matchCriteriaId": "20B5FDD4-AD31-4985-97E2-179C0F6A6525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.020:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3551D4-9B28-4A29-9C30-D91C5D81F195",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.030:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EEF1E3D-F633-4594-8E65-6AB0B941E95A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.040:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32B0E0C-B72B-4F3D-ABAC-BBA5A6E242ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.050:*:*:*:*:*:*:*",
              "matchCriteriaId": "66BDC46A-832F-4DE9-848E-898F99798D0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.051:*:*:*:*:*:*:*",
              "matchCriteriaId": "70AC0911-928C-4087-9EA8-BF0CB25BDD56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.060:*:*:*:*:*:*:*",
              "matchCriteriaId": "35B34A95-A9D1-454D-AE3A-A68AE11A60AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.070:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDE9ABF8-331F-4268-8D2A-692BEC8F98DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.080:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BD93C56-DE08-4CAC-A345-7C40C2CB0598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.090:*:*:*:*:*:*:*",
              "matchCriteriaId": "F540CEF3-C21D-48E5-84AD-81CF7C62A948",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.100:*:*:*:*:*:*:*",
              "matchCriteriaId": "E554657F-DF48-41F9-A2F6-4C311C2AC99A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.110:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA039A97-F28A-4216-B909-79EEBD8A6FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.120:*:*:*:*:*:*:*",
              "matchCriteriaId": "75B0C24B-7A62-4157-8CA8-5FA800F67C33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.130:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3652F8E-A163-4337-BAE0-210757FC421D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.140:*:*:*:*:*:*:*",
              "matchCriteriaId": "87E84FE0-ACF0-43D9-ACC2-D662D5488B8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.150:*:*:*:*:*:*:*",
              "matchCriteriaId": "83419D0A-7C03-4F3E-9A95-25BA299D5961",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.160:*:*:*:*:*:*:*",
              "matchCriteriaId": "77075C79-35BF-4841-8103-A372A67ECF45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.170:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FDF692C-13F5-4E42-A5DF-2116080462F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.180:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D31D014-CB91-436C-A114-3C33D95E8D73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.190:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBA2FDA-D70D-4850-A7E7-4A3C25B0C1C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.200:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A4AC88F-C70C-4184-8605-5A4BC95D83DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.210:*:*:*:*:*:*:*",
              "matchCriteriaId": "72D4AAAF-A284-4FD9-B011-C822ED2DBAC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.220:*:*:*:*:*:*:*",
              "matchCriteriaId": "490DBC72-DADD-491E-AC18-4D4C178ABECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.230:*:*:*:*:*:*:*",
              "matchCriteriaId": "A455B1DC-03F9-4338-9BD5-9184434F7AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.240:*:*:*:*:*:*:*",
              "matchCriteriaId": "36C87163-EBC2-47DC-9865-9455CF066DB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.250:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDBED527-4698-44DC-8DFE-E107702C2D9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.260:*:*:*:*:*:*:*",
              "matchCriteriaId": "15CFE78E-22EB-47B1-9BD3-0A093645304A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.270:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8CAB5C2-2F68-46F6-BF7D-12AEEB03BF66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.280:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5E20E3B-AC6A-4059-9C49-9AF4FADDFF30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.290:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0B775C5-8A6F-4D08-9776-709029E918D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.300:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0235C6D-7EC8-4D89-8AE5-04B5628EDB74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.310:*:*:*:*:*:*:*",
              "matchCriteriaId": "3686B12E-EE12-4FDF-98BE-C7D24ADD6C86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0BED163-D9FF-45C9-90D5-1B167ADD423C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.330:*:*:*:*:*:*:*",
              "matchCriteriaId": "93488E00-C176-4C66-85D5-172F33E3DECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.340:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DF6456E-E2F2-4777-BACC-9422B759F7F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.350:*:*:*:*:*:*:*",
              "matchCriteriaId": "793F6997-0CCB-4074-97E3-E343D8508A48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.360:*:*:*:*:*:*:*",
              "matchCriteriaId": "A957BD3B-6074-48CD-9A13-14125E0E5D07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.370:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B6BB3FC-61B6-42DF-9229-99C16BA41720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.380:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCB8560-8CEF-4CC4-B7C7-275C86F1A03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.390:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DFC35F7-DB28-49AB-ADFE-1068C751D49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.400:*:*:*:*:*:*:*",
              "matchCriteriaId": "4508D9EF-6917-40D9-9443-96AA96A924DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.410:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D741056-8345-4C59-BD22-546D01DE5F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.420:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FCA449A-5DF9-418D-B6D9-F4A73DBC3C65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.430:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E129FDD-A404-465E-9A04-00A2090F7EDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.440:*:*:*:*:*:*:*",
              "matchCriteriaId": "1841FFC1-25BA-4301-9515-381DAFBBCF6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.450:*:*:*:*:*:*:*",
              "matchCriteriaId": "5038DD1D-793B-4117-B59D-9E1B520A1C76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.460:*:*:*:*:*:*:*",
              "matchCriteriaId": "06E9E986-E4A7-4BFA-91D8-5E47D31F4EBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.470:*:*:*:*:*:*:*",
              "matchCriteriaId": "80B1D2D5-315B-4432-A9E6-41E9ABB329A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.480:*:*:*:*:*:*:*",
              "matchCriteriaId": "9810CFF4-6321-4016-9A10-A7C3D90CB000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.490:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E26A472-555C-4081-8FBD-054761B4FE87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.500:*:*:*:*:*:*:*",
              "matchCriteriaId": "13519AED-F310-49BA-B0E2-F52F8233F6A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.510:*:*:*:*:*:*:*",
              "matchCriteriaId": "125CF39D-EBBA-418B-A9DC-207E5A510A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.520:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE280A31-AC7F-4A48-8F71-F9C2AB8EC7EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.530:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFABB6DD-E9C7-424C-8938-61A6617E2E27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.540:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD1A23C-FB0C-4899-AC34-8BD0BC7E4038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.550:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EE09F26-2068-4E74-8B9A-5E1A1F5EDD0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.560:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DBB07F9-A3EB-485C-9116-1885F673BB7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.570:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4146A93-C7E4-4A38-8E38-E051D4D54BDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.580:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EA40B6F-4D0C-44A6-854A-B4DBCCBFD8BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Usermin before 1.600 allows remote attackers to execute arbitrary operating-system commands via unspecified vectors related to a user action."
    },
    {
      "lang": "es",
      "value": "Usermin anterior a 1.600 permite a atacantes remotos ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de vectores no especificados relacionados con una acci\u00f3n del usuario."
    }
  ],
  "id": "CVE-2014-3883",
  "lastModified": "2024-11-21T02:09:03.393",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-06-21T15:55:05.103",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN48805624/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN48805624/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-02-12 02:00
Modified
2024-11-21 00:42
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Webmin 1.370 and 1.390 and Usermin 1.300 and 1.320 allows remote attackers to inject arbitrary web script or HTML via the search parameter to webmin_search.cgi (aka the search section), and possibly other components accessed through a "search box" or "open file box." NOTE: some of these details are obtained from third party information.
Impacted products
Vendor Product Version
webmin usermin 1.3
webmin usermin 1.32
webmin webmin 1.370
webmin webmin 1.390



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "74E28AB1-D60A-4CFC-9133-552B7AA12D8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "06EBBDAA-05C2-4CFD-AC36-A24E5A768B09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.370:*:*:*:*:*:*:*",
              "matchCriteriaId": "E948F223-D365-4D5B-9C2B-FB064F8DC00B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.390:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B767E9C-D321-4972-BF7A-B5E62956D6CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Webmin 1.370 and 1.390 and Usermin 1.300 and 1.320 allows remote attackers to inject arbitrary web script or HTML via the search parameter to webmin_search.cgi (aka the search section), and possibly other components accessed through a \"search box\" or \"open file box.\" NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Webmin 1.370 y 1.390 y Usermin 1.300 y 1.320. Permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro de b\u00fasqueda a webmin_search.cgi (tambi\u00e9n conocido como la secci\u00f3n de b\u00fasqueda) y posiblemente otros componentes accedidos a trav\u00e9s de una \"caja de b\u00fasqueda\" o \"caja de archivo abierto\". NOTA: algunos de estos detalles se han obtenido de informaci\u00f3n de terceros."
    }
  ],
  "id": "CVE-2008-0720",
  "lastModified": "2024-11-21T00:42:45.267",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-02-12T02:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://forum.aria-security.net/showthread.php?t=511"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28827"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/487656/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/487678/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/27662"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0450"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://forum.aria-security.net/showthread.php?t=511"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28827"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/487656/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/487678/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/27662"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0450"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-01-05 19:00
Modified
2024-11-21 01:09
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Webmin before 1.500 and Usermin before 1.430 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Impacted products
Vendor Product Version
webmin usermin *
webmin usermin 0.4
webmin usermin 0.5
webmin usermin 0.6
webmin usermin 0.7
webmin usermin 0.8
webmin usermin 0.9
webmin usermin 0.91
webmin usermin 0.92
webmin usermin 0.93
webmin usermin 0.94
webmin usermin 0.95
webmin usermin 0.96
webmin usermin 0.97
webmin usermin 0.98
webmin usermin 0.99
webmin usermin 1.000
webmin usermin 1.3
webmin usermin 1.010
webmin usermin 1.020
webmin usermin 1.030
webmin usermin 1.040
webmin usermin 1.051
webmin usermin 1.060
webmin usermin 1.070
webmin usermin 1.080
webmin usermin 1.090
webmin usermin 1.100
webmin usermin 1.110
webmin usermin 1.120
webmin usermin 1.130
webmin usermin 1.140
webmin usermin 1.150
webmin usermin 1.210
webmin usermin 1.220
webmin usermin 1.230
webmin usermin 1.240
webmin usermin 1.250
webmin usermin 1.260
webmin usermin 1.270
webmin usermin 1.280
webmin webmin *
webmin webmin 0.1
webmin webmin 0.2
webmin webmin 0.3
webmin webmin 0.4
webmin webmin 0.5
webmin webmin 0.6
webmin webmin 0.7
webmin webmin 0.21
webmin webmin 0.22
webmin webmin 0.31
webmin webmin 0.41
webmin webmin 0.42
webmin webmin 0.51
webmin webmin 0.76
webmin webmin 0.77
webmin webmin 0.78
webmin webmin 0.79
webmin webmin 0.80
webmin webmin 0.83
webmin webmin 0.84
webmin webmin 0.85
webmin webmin 0.88
webmin webmin 0.90
webmin webmin 0.91
webmin webmin 0.92
webmin webmin 0.92.1
webmin webmin 0.93
webmin webmin 0.94
webmin webmin 0.95
webmin webmin 0.96
webmin webmin 0.97
webmin webmin 0.98
webmin webmin 0.99
webmin webmin 0.950
webmin webmin 0.960
webmin webmin 0.970
webmin webmin 0.980
webmin webmin 0.990
webmin webmin 1.0.10
webmin webmin 1.0.20
webmin webmin 1.0.30
webmin webmin 1.0.40
webmin webmin 1.0.50
webmin webmin 1.0.51
webmin webmin 1.0.60
webmin webmin 1.0.70
webmin webmin 1.0.80
webmin webmin 1.0.90
webmin webmin 1.1.00
webmin webmin 1.1.10
webmin webmin 1.1.20
webmin webmin 1.1.21
webmin webmin 1.1.30
webmin webmin 1.1.40
webmin webmin 1.1.50
webmin webmin 1.1.60
webmin webmin 1.2.20
webmin webmin 1.2.30
webmin webmin 1.2.40
webmin webmin 1.2.50
webmin webmin 1.2.60
webmin webmin 1.2.70
webmin webmin 1.2.80
webmin webmin 1.2.90
webmin webmin 1.3.20
webmin webmin 1.3.30
webmin webmin 1.335
webmin webmin 1.336
webmin webmin 1.337
webmin webmin 1.340
webmin webmin 1.343
webmin webmin 1.360
webmin webmin 1.370



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3175C6B-A8BC-478B-A86B-D67DF656777C",
              "versionEndIncluding": "1.32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3046F962-BD9C-4E67-B2A8-9664440317A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A83F4A87-03D8-461B-B64A-81E171C88119",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E777B661-B6A5-4033-85BA-4B17A7FDF905",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "866EC157-2F84-4382-B081-AB7BF9D5B649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4DB1944-7DD9-480E-9479-69DC284F8A1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "842A041C-7252-49BF-AF8C-57CD61D875C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "BACD9446-5C6C-486F-AA95-C89435BD24B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF2E55D-D1A5-4CB0-99AB-3FBAA16E79B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1EA5D74-C150-479E-8A8B-4E1251A04895",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "5783CE2F-D0AD-4871-BD4E-31DE40887F56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "94611B8F-EFD0-47DD-8F96-37A74FFA7E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.96:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8AB5C49-4D3E-4A71-82CC-6866D7113671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.97:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F3973E-03E5-416F-9B88-61CDB51B9E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.98:*:*:*:*:*:*:*",
              "matchCriteriaId": "560E8A6D-93B8-4252-ACE2-7BA9AE97A97F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A282895-E367-4445-84B9-07BF204B5100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "973363CE-6A66-4BAF-8C11-D9B4911BF9A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "74E28AB1-D60A-4CFC-9133-552B7AA12D8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.010:*:*:*:*:*:*:*",
              "matchCriteriaId": "20B5FDD4-AD31-4985-97E2-179C0F6A6525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.020:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3551D4-9B28-4A29-9C30-D91C5D81F195",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.030:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EEF1E3D-F633-4594-8E65-6AB0B941E95A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.040:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32B0E0C-B72B-4F3D-ABAC-BBA5A6E242ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.051:*:*:*:*:*:*:*",
              "matchCriteriaId": "70AC0911-928C-4087-9EA8-BF0CB25BDD56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.060:*:*:*:*:*:*:*",
              "matchCriteriaId": "35B34A95-A9D1-454D-AE3A-A68AE11A60AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.070:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDE9ABF8-331F-4268-8D2A-692BEC8F98DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.080:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BD93C56-DE08-4CAC-A345-7C40C2CB0598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.090:*:*:*:*:*:*:*",
              "matchCriteriaId": "F540CEF3-C21D-48E5-84AD-81CF7C62A948",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.100:*:*:*:*:*:*:*",
              "matchCriteriaId": "E554657F-DF48-41F9-A2F6-4C311C2AC99A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.110:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA039A97-F28A-4216-B909-79EEBD8A6FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.120:*:*:*:*:*:*:*",
              "matchCriteriaId": "75B0C24B-7A62-4157-8CA8-5FA800F67C33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.130:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3652F8E-A163-4337-BAE0-210757FC421D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.140:*:*:*:*:*:*:*",
              "matchCriteriaId": "87E84FE0-ACF0-43D9-ACC2-D662D5488B8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.150:*:*:*:*:*:*:*",
              "matchCriteriaId": "83419D0A-7C03-4F3E-9A95-25BA299D5961",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.210:*:*:*:*:*:*:*",
              "matchCriteriaId": "72D4AAAF-A284-4FD9-B011-C822ED2DBAC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.220:*:*:*:*:*:*:*",
              "matchCriteriaId": "490DBC72-DADD-491E-AC18-4D4C178ABECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.230:*:*:*:*:*:*:*",
              "matchCriteriaId": "A455B1DC-03F9-4338-9BD5-9184434F7AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.240:*:*:*:*:*:*:*",
              "matchCriteriaId": "36C87163-EBC2-47DC-9865-9455CF066DB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.250:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDBED527-4698-44DC-8DFE-E107702C2D9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.260:*:*:*:*:*:*:*",
              "matchCriteriaId": "15CFE78E-22EB-47B1-9BD3-0A093645304A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.270:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8CAB5C2-2F68-46F6-BF7D-12AEEB03BF66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.280:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5E20E3B-AC6A-4059-9C49-9AF4FADDFF30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7664DA2-5AC8-4A10-A7E9-4EA9AF5ABAEF",
              "versionEndIncluding": "1.390",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E3CF12-D0B7-4C7F-96C8-36A3FAFA8EDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C808C470-F0A1-4338-A988-3968EABE78E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C16685C0-94E9-4AE6-8221-1D32112808F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDACA626-1687-4192-A2E8-C74823B715A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9641C23-B30A-4CB2-A348-BD708F68F90A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0852A462-22ED-422D-A454-0A6E026D9AD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "97FEF73D-767D-4BF2-AA12-67268719A404",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "84B5A02C-96AB-46FD-A958-86AC0DFD1F2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1B8073-C512-4ACA-8E3F-92D46D63FBCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "B368FAD0-39A7-4115-9327-1D32BECF2F7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3D7B7A-0426-4176-A759-E96024DC492D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E3EFDEE-A99B-4D0E-B6A7-E7C285A5DFBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C3D4D4-246A-4287-AA42-CFDD0C1AE22A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "F05CF0BA-0606-42E5-A631-D302FF1D59F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A79B7B3-708A-42E4-B4EF-7746F6292DB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.78:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2F06BC0-0418-4A1C-BD4A-B7429A6CEA39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "1817FDA9-31F4-4D4A-A867-386D2F1CDB1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "23522A64-FD03-4C5B-9A8A-5E7CDDC65CEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFD94AA9-CABA-4FC8-8367-D5D9D8B4F623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "35B136CA-47BF-46DE-885A-9E74EBDE5306",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9A3F522-6E6D-446C-8694-7AE91F19F1C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB86BC7-4A99-4C5B-9460-CDDA7C4E4041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "957C7CA1-DD36-409C-B7E5-01B719B4695E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B0813F3-1886-481E-8822-4BD199C4934F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D25A7CA-ED9D-4562-8965-D4906D1BE5FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.92.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5C38C77-246F-41A9-A3D5-99C2DDA1DAE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1F2D028-F2F9-4CE0-A24B-7DB44D488D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "82EE7A9B-5688-4933-95B9-476873D44A65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "30A57D7A-B989-4D82-B667-029A245AA6D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.96:*:*:*:*:*:*:*",
              "matchCriteriaId": "C664186B-DD40-490B-B2DE-4279B00102F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.97:*:*:*:*:*:*:*",
              "matchCriteriaId": "88E1D6C5-20FE-4514-B618-312BB19E5F6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.98:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5017EA5-7188-4293-9FDF-5D23DCB40B12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF6C5F07-330D-46C5-8A8B-8DF734F4640F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.950:*:*:*:*:*:*:*",
              "matchCriteriaId": "08068E84-9EE5-4742-B70A-567CD4199604",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.960:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6D5F6A-B34F-4134-959F-C31FC84EBCF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.970:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4FEC51-DD03-418D-8E55-CEE696BE2D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.980:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9F8F43-F9EC-4BC0-BDF6-EC3EDF5A71F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:0.990:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6865E9-F244-4019-AA4C-3DB1655A6AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C644D728-1DD4-48E0-9E42-35E836006F41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9425C1F-5E6A-489A-9A8B-9156E79FEAA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B8347DA-13F8-40E9-B9EA-2703C049AFA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.0.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD9C3443-526E-4D68-9C7E-F3432BECE6C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "C968FBE9-191A-40B1-9A69-BF24511E40B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC77E1B6-E368-4ECD-8459-69C718CE5409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "D89047FD-39F0-4614-B1EC-D13BAF57405E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.0.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CDF2120-F341-4C2E-88C1-A6C76626BFF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.0.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "01DFC15C-3513-4E94-B46D-94FEA0D627FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E068D3-F6B5-4102-B9FA-949E2FAA33D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E6BD551-EC6A-4C77-B9E7-B9CF3DC21021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B0FE2D-02BC-4081-B172-64A74389C5F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "43433ECE-8225-43EE-9F5E-FBB170B60CFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "1615ACA2-32CC-48B7-AB5A-0BB0FDA7F190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5ABAE43-0EEF-44D5-AB36-44DA54290122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD33CE40-DFC9-4BDC-BF4F-9E0B268B8503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "8608F5A2-B6FA-43C6-9862-43DBAF01EB1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "53663534-8617-47D7-B4B7-A6C0D6168E86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E815171B-B054-450F-A9B3-2D522161DD02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD941A62-A41E-41CB-80C0-8B780AC39FB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "786287DD-2565-4931-BBA0-2CACD7671352",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "4784DC04-D2C5-46C6-831F-23D69B4B0513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C219DAB-C13C-4232-8B98-2D7A9ED16E30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "F88507A8-6143-4FB7-8027-EFB0C981ED8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.2.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "E35C0772-8265-415F-A390-530640DB9599",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.2.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFA35DAA-1DC2-41D2-ADC7-F922FA658CAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C02919F-4201-4D1E-8395-04C6A7193077",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.3.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "727B060B-7600-4AD4-B66E-1A559B6EDA2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.335:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E3FF2E4-F2EF-43E7-911A-7744C4206216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.336:*:*:*:*:*:*:*",
              "matchCriteriaId": "09557B9C-3813-4466-995C-9FE3DC86B284",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.337:*:*:*:*:*:*:*",
              "matchCriteriaId": "215FE3BC-30AB-40DD-A9F9-13E8F1F25CC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.340:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A8F9EA-7A8D-4BA9-9732-DE93388800A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.343:*:*:*:*:*:*:*",
              "matchCriteriaId": "4272E132-D632-4E88-BB68-BBA15FA68546",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.360:*:*:*:*:*:*:*",
              "matchCriteriaId": "080FCFDE-557E-4D35-8701-96AC28381ADF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.370:*:*:*:*:*:*:*",
              "matchCriteriaId": "E948F223-D365-4D5B-9C2B-FB064F8DC00B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Webmin before 1.500 and Usermin before 1.430 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Webmin anterior a 1.500 y Usermin anterior a 1.430, permite a atacantes remotos inyectar secuencias de comandos Web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2009-4568",
  "lastModified": "2024-11-21T01:09:56.447",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2010-01-05T19:00:00.340",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37648"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:036"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/37259"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3457"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.webmin.com/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37648"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:036"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/37259"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3457"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.webmin.com/security.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-07-20 11:12
Modified
2024-11-21 02:09
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Usermin before 1.600 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this might overlap CVE-2014-3924.
Impacted products
Vendor Product Version
webmin usermin *
webmin usermin 0.4
webmin usermin 0.5
webmin usermin 0.6
webmin usermin 0.7
webmin usermin 0.80
webmin usermin 0.90
webmin usermin 0.910
webmin usermin 0.929
webmin usermin 0.930
webmin usermin 0.940
webmin usermin 0.950
webmin usermin 0.960
webmin usermin 0.970
webmin usermin 0.980
webmin usermin 0.990
webmin usermin 1.000
webmin usermin 1.010
webmin usermin 1.020
webmin usermin 1.030
webmin usermin 1.040
webmin usermin 1.050
webmin usermin 1.051
webmin usermin 1.060
webmin usermin 1.070
webmin usermin 1.080
webmin usermin 1.090
webmin usermin 1.100
webmin usermin 1.110
webmin usermin 1.120
webmin usermin 1.130
webmin usermin 1.140
webmin usermin 1.150
webmin usermin 1.160
webmin usermin 1.170
webmin usermin 1.180
webmin usermin 1.190
webmin usermin 1.200
webmin usermin 1.210
webmin usermin 1.220
webmin usermin 1.230
webmin usermin 1.240
webmin usermin 1.250
webmin usermin 1.260
webmin usermin 1.270
webmin usermin 1.280
webmin usermin 1.290
webmin usermin 1.300
webmin usermin 1.310
webmin usermin 1.320
webmin usermin 1.330
webmin usermin 1.340
webmin usermin 1.350
webmin usermin 1.360
webmin usermin 1.370
webmin usermin 1.380
webmin usermin 1.390
webmin usermin 1.400
webmin usermin 1.410
webmin usermin 1.420
webmin usermin 1.430
webmin usermin 1.440
webmin usermin 1.450
webmin usermin 1.460
webmin usermin 1.470
webmin usermin 1.480
webmin usermin 1.490
webmin usermin 1.500
webmin usermin 1.510
webmin usermin 1.520
webmin usermin 1.530
webmin usermin 1.540
webmin usermin 1.550
webmin usermin 1.560
webmin usermin 1.570
webmin usermin 1.580



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "928167DF-5E72-4775-99C3-735068AFD05F",
              "versionEndIncluding": "1.590",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3046F962-BD9C-4E67-B2A8-9664440317A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A83F4A87-03D8-461B-B64A-81E171C88119",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E777B661-B6A5-4033-85BA-4B17A7FDF905",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "866EC157-2F84-4382-B081-AB7BF9D5B649",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F001647-DBB0-4B2A-AAF0-44DB043FB6DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A424E19-4946-4F66-8198-25380B073631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.910:*:*:*:*:*:*:*",
              "matchCriteriaId": "88950B52-9163-42CA-B693-E451C5EFF0AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.929:*:*:*:*:*:*:*",
              "matchCriteriaId": "50397E8C-F4B4-48EA-9305-AEA7D946A222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.930:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A6C9C87-DDA3-4F9F-BC5F-D23BBF866DCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.940:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F88DA6C-2018-4332-B8B9-2DE8C84AFF0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.950:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EFE6FC5-4B9D-4270-8847-4A8CD016B861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.960:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AB5C8A8-3DC9-4DE7-9A69-E61F9BA481AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.970:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C3396E-17DD-4096-B165-62C95D9EB349",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.980:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFDF2AE3-69D9-4BAC-895A-2E916A8247DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:0.990:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF11C33-F62D-4486-920C-9528E519107B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "973363CE-6A66-4BAF-8C11-D9B4911BF9A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.010:*:*:*:*:*:*:*",
              "matchCriteriaId": "20B5FDD4-AD31-4985-97E2-179C0F6A6525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.020:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3551D4-9B28-4A29-9C30-D91C5D81F195",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.030:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EEF1E3D-F633-4594-8E65-6AB0B941E95A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.040:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32B0E0C-B72B-4F3D-ABAC-BBA5A6E242ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.050:*:*:*:*:*:*:*",
              "matchCriteriaId": "66BDC46A-832F-4DE9-848E-898F99798D0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.051:*:*:*:*:*:*:*",
              "matchCriteriaId": "70AC0911-928C-4087-9EA8-BF0CB25BDD56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.060:*:*:*:*:*:*:*",
              "matchCriteriaId": "35B34A95-A9D1-454D-AE3A-A68AE11A60AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.070:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDE9ABF8-331F-4268-8D2A-692BEC8F98DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.080:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BD93C56-DE08-4CAC-A345-7C40C2CB0598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.090:*:*:*:*:*:*:*",
              "matchCriteriaId": "F540CEF3-C21D-48E5-84AD-81CF7C62A948",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.100:*:*:*:*:*:*:*",
              "matchCriteriaId": "E554657F-DF48-41F9-A2F6-4C311C2AC99A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.110:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA039A97-F28A-4216-B909-79EEBD8A6FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.120:*:*:*:*:*:*:*",
              "matchCriteriaId": "75B0C24B-7A62-4157-8CA8-5FA800F67C33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.130:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3652F8E-A163-4337-BAE0-210757FC421D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.140:*:*:*:*:*:*:*",
              "matchCriteriaId": "87E84FE0-ACF0-43D9-ACC2-D662D5488B8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.150:*:*:*:*:*:*:*",
              "matchCriteriaId": "83419D0A-7C03-4F3E-9A95-25BA299D5961",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.160:*:*:*:*:*:*:*",
              "matchCriteriaId": "77075C79-35BF-4841-8103-A372A67ECF45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.170:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FDF692C-13F5-4E42-A5DF-2116080462F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.180:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D31D014-CB91-436C-A114-3C33D95E8D73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.190:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBA2FDA-D70D-4850-A7E7-4A3C25B0C1C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.200:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A4AC88F-C70C-4184-8605-5A4BC95D83DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.210:*:*:*:*:*:*:*",
              "matchCriteriaId": "72D4AAAF-A284-4FD9-B011-C822ED2DBAC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.220:*:*:*:*:*:*:*",
              "matchCriteriaId": "490DBC72-DADD-491E-AC18-4D4C178ABECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.230:*:*:*:*:*:*:*",
              "matchCriteriaId": "A455B1DC-03F9-4338-9BD5-9184434F7AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.240:*:*:*:*:*:*:*",
              "matchCriteriaId": "36C87163-EBC2-47DC-9865-9455CF066DB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.250:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDBED527-4698-44DC-8DFE-E107702C2D9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.260:*:*:*:*:*:*:*",
              "matchCriteriaId": "15CFE78E-22EB-47B1-9BD3-0A093645304A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.270:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8CAB5C2-2F68-46F6-BF7D-12AEEB03BF66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.280:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5E20E3B-AC6A-4059-9C49-9AF4FADDFF30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.290:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0B775C5-8A6F-4D08-9776-709029E918D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.300:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0235C6D-7EC8-4D89-8AE5-04B5628EDB74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.310:*:*:*:*:*:*:*",
              "matchCriteriaId": "3686B12E-EE12-4FDF-98BE-C7D24ADD6C86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.320:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0BED163-D9FF-45C9-90D5-1B167ADD423C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.330:*:*:*:*:*:*:*",
              "matchCriteriaId": "93488E00-C176-4C66-85D5-172F33E3DECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.340:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DF6456E-E2F2-4777-BACC-9422B759F7F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.350:*:*:*:*:*:*:*",
              "matchCriteriaId": "793F6997-0CCB-4074-97E3-E343D8508A48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.360:*:*:*:*:*:*:*",
              "matchCriteriaId": "A957BD3B-6074-48CD-9A13-14125E0E5D07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.370:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B6BB3FC-61B6-42DF-9229-99C16BA41720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.380:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCB8560-8CEF-4CC4-B7C7-275C86F1A03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.390:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DFC35F7-DB28-49AB-ADFE-1068C751D49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.400:*:*:*:*:*:*:*",
              "matchCriteriaId": "4508D9EF-6917-40D9-9443-96AA96A924DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.410:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D741056-8345-4C59-BD22-546D01DE5F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.420:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FCA449A-5DF9-418D-B6D9-F4A73DBC3C65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.430:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E129FDD-A404-465E-9A04-00A2090F7EDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.440:*:*:*:*:*:*:*",
              "matchCriteriaId": "1841FFC1-25BA-4301-9515-381DAFBBCF6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.450:*:*:*:*:*:*:*",
              "matchCriteriaId": "5038DD1D-793B-4117-B59D-9E1B520A1C76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.460:*:*:*:*:*:*:*",
              "matchCriteriaId": "06E9E986-E4A7-4BFA-91D8-5E47D31F4EBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.470:*:*:*:*:*:*:*",
              "matchCriteriaId": "80B1D2D5-315B-4432-A9E6-41E9ABB329A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.480:*:*:*:*:*:*:*",
              "matchCriteriaId": "9810CFF4-6321-4016-9A10-A7C3D90CB000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.490:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E26A472-555C-4081-8FBD-054761B4FE87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.500:*:*:*:*:*:*:*",
              "matchCriteriaId": "13519AED-F310-49BA-B0E2-F52F8233F6A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.510:*:*:*:*:*:*:*",
              "matchCriteriaId": "125CF39D-EBBA-418B-A9DC-207E5A510A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.520:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE280A31-AC7F-4A48-8F71-F9C2AB8EC7EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.530:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFABB6DD-E9C7-424C-8938-61A6617E2E27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.540:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD1A23C-FB0C-4899-AC34-8BD0BC7E4038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.550:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EE09F26-2068-4E74-8B9A-5E1A1F5EDD0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.560:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DBB07F9-A3EB-485C-9116-1885F673BB7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.570:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4146A93-C7E4-4A38-8E38-E051D4D54BDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:usermin:1.580:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EA40B6F-4D0C-44A6-854A-B4DBCCBFD8BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Usermin before 1.600 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.  NOTE: this might overlap CVE-2014-3924."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de XSS en Usermin anterior a 1.600 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores no especificados. NOTA: esto podr\u00eda solarse con CVE-2014-3924."
    }
  ],
  "id": "CVE-2014-3884",
  "lastModified": "2024-11-21T02:09:03.527",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2014-07-20T11:12:50.433",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN92737498/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN92737498/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-10-25 17:15
Modified
2024-11-21 07:10
Summary
Usermin through 1.850 allows a remote authenticated user to execute OS commands via command injection in a filename for the GPG module.
Impacted products
Vendor Product Version
webmin usermin *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24AEB62A-F2B3-442F-8FE7-B649173A0236",
              "versionEndIncluding": "1.850",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Usermin through 1.850 allows a remote authenticated user to execute OS commands via command injection in a filename for the GPG module."
    },
    {
      "lang": "es",
      "value": "Usermin versiones hasta 1.850, permite a un usuario remoto autenticado ejecutar comandos del Sistema Operativo por medio de una inyecci\u00f3n de comandos en un nombre de archivo del m\u00f3dulo GPG"
    }
  ],
  "id": "CVE-2022-35132",
  "lastModified": "2024-11-21T07:10:47.803",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-10-25T17:15:53.727",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/ly1g3/webmin-usermin-vulnerabilities"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://webmin.com/uchanges.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/ly1g3/webmin-usermin-vulnerabilities"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://webmin.com/uchanges.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-13 22:15
Modified
2024-11-21 08:20
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the scheduled cron jobs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the value field parameter while creating a new environment variable.
Impacted products
Vendor Product Version
webmin usermin 2.000



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED13897E-B6FB-4976-9037-2136FDFE1A50",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the scheduled cron jobs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the value field parameter while creating a new environment variable."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pesta\u00f1a de trabajos cron programados en Usermin 2.000 permite a atacantes remotos inyectar scripts web o HTML de su elecci\u00f3n a trav\u00e9s del par\u00e1metro de campo de valor mientras crean una nueva variable de entorno."
    }
  ],
  "id": "CVE-2023-41154",
  "lastModified": "2024-11-21T08:20:40.870",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-13T22:15:08.623",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41154"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41154"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-04-12 22:59
Modified
2024-11-21 02:53
Summary
Multiple cross-site scripting (XSS) vulnerabilities in (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi in Usermin before 1.690.
Impacted products
Vendor Product Version
webmin usermin *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "40B4E312-6082-49F1-9B40-A603221570A2",
              "versionEndIncluding": "1.680",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi in Usermin before 1.690."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades (XSS) en (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi en Usermin en versiones anteriores a 1.690."
    }
  ],
  "id": "CVE-2016-4897",
  "lastModified": "2024-11-21T02:53:12.063",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-04-12T22:59:00.600",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN32504719/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/93477"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN32504719/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/93477"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-06-11 22:30
Modified
2024-11-21 00:32
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in pam_login.cgi in Webmin before 1.350 and Usermin before 1.280 allow remote attackers to inject arbitrary web script or HTML via the (1) cid, (2) message, or (3) question parameter. NOTE: some of these details are obtained from third party information.
Impacted products
Vendor Product Version
webmin usermin *
webmin webmin *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9A726E-9D24-40A5-A82A-B7D1B4EE3677",
              "versionEndIncluding": "1.280",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E60E962F-8A39-481D-B272-BEA4A2E02A99",
              "versionEndIncluding": "1.340",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in pam_login.cgi in Webmin before 1.350 and Usermin before 1.280 allow remote attackers to inject arbitrary web script or HTML via the (1) cid, (2) message, or (3) question parameter.  NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de tipo cross-site scripting (XSS) en el archivo pam_login.cgi en webmin versiones anteriores a 1.350 y Usermin versiones anteriores a 1.280, permiten a atacantes remotos inyectar script web o HTML arbitrario por medio del par\u00e1metro (1) cid, (2) message o (3) question. NOTA: algunos de estos datos son obtenidos a partir de la informaci\u00f3n de terceros."
    }
  ],
  "id": "CVE-2007-3156",
  "lastModified": "2024-11-21T00:32:32.250",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-06-11T22:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/36932"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25580"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25785"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25956"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200707-05.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:135"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/24381"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/2117"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.webmin.com/changes-1.350.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.webmin.com/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/36932"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25580"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25785"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25956"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200707-05.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:135"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/24381"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/2117"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.webmin.com/changes-1.350.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.webmin.com/security.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-13 22:15
Modified
2024-11-21 08:20
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the description field while creating a new MIME type program.
Impacted products
Vendor Product Version
webmin usermin 2.000



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED13897E-B6FB-4976-9037-2136FDFE1A50",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the description field while creating a new MIME type program."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pesta\u00f1a de programas de tipo MIME en Usermin 2.000 permite a atacantes remotos inyectar scripts web o HTML de su elecci\u00f3n a trav\u00e9s del campo de descripci\u00f3n mientras crean un nuevo programa de tipo MIME."
    }
  ],
  "id": "CVE-2023-41158",
  "lastModified": "2024-11-21T08:20:41.503",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-13T22:15:08.887",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41158"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41158"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-13 22:15
Modified
2024-11-21 08:20
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the handle program field while creating a new MIME type program.
Impacted products
Vendor Product Version
webmin usermin 2.000



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED13897E-B6FB-4976-9037-2136FDFE1A50",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the handle program field while creating a new MIME type program."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pesta\u00f1a de programas de tipo MIME en Usermin 2.000 permite a atacantes remotos inyectar scripts web o HTML arbitrarias a trav\u00e9s del campo de programa de manejo mientras crean un nuevo programa de tipo MIME."
    }
  ],
  "id": "CVE-2023-41152",
  "lastModified": "2024-11-21T08:20:40.553",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-13T22:15:08.490",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41152"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41152"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-13 22:15
Modified
2024-11-21 08:20
Summary
A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the file mask field while searching under the tools drop down.
Impacted products
Vendor Product Version
webmin usermin 2.000



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED13897E-B6FB-4976-9037-2136FDFE1A50",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the file mask field while searching under the tools drop down."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) Reflejada en la pesta\u00f1a del administrador de archivos en Usermin 2.000 permite a atacantes remotos inyectar scripts web o HTML arbitrarias a trav\u00e9s del campo de m\u00e1scara de archivos mientras buscan en el men\u00fa desplegable de herramientas."
    }
  ],
  "id": "CVE-2023-41162",
  "lastModified": "2024-11-21T08:20:42.123",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-13T22:15:09.017",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41162"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41162"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-13 22:15
Modified
2024-11-21 08:20
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the mail forwarding and replies tab in Webmin and Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the forward to field while creating a mail forwarding rule.
Impacted products
Vendor Product Version
webmin usermin 2.000
webmin webmin 2.000



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED13897E-B6FB-4976-9037-2136FDFE1A50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:2.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "32C6CF7F-1287-4AB2-B4C0-801AC1EC3CB5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the mail forwarding and replies tab in Webmin and Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the forward to field while creating a mail forwarding rule."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenado en la pesta\u00f1a de reenv\u00edo de correo y respuestas en Webmin y Usermin 2.000 permite a atacantes remotos inyectar scripts web o HTML de su elecci\u00f3n a trav\u00e9s del campo reenviar a mientras crean una regla de reenv\u00edo de correo."
    }
  ],
  "id": "CVE-2023-41155",
  "lastModified": "2024-11-21T08:20:41.027",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-13T22:15:08.747",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41155"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-16 06:15
Modified
2024-11-21 08:20
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the folder name parameter while creating the folder to manage the folder tab, filter tab, and forward mail tab.
Impacted products
Vendor Product Version
webmin usermin 2.000



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:2.000:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED13897E-B6FB-4976-9037-2136FDFE1A50",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the folder name parameter while creating the folder to manage the folder tab, filter tab, and forward mail tab."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de Cross-Site Scripting (XSS) almacenado en Usermin 2.000 permiten a atacantes remotos inyectar scripts web o HTML arbitrarias a trav\u00e9s del par\u00e1metro de \"nombre de carpeta\" mientras crean la carpeta para administrar la pesta\u00f1a de carpeta, la pesta\u00f1a de filtro y la pesta\u00f1a de reenv\u00edo de correo."
    }
  ],
  "id": "CVE-2023-41157",
  "lastModified": "2024-11-21T08:20:41.337",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-16T06:15:07.627",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41157"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41157"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-29 22:15
Modified
2024-11-21 08:20
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via options for the host value while editing the host options.
Impacted products
Vendor Product Version
webmin usermin 2.001



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:2.001:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CE9B3CB-9D26-492D-9584-317C5BE061EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via options for the host value while editing the host options."
    }
  ],
  "id": "CVE-2023-41153",
  "lastModified": "2024-11-21T08:20:40.710",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-29T22:15:09.217",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41153"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41153"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://webmin.com/tags/webmin-changelog/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-07-27 04:15
Modified
2024-11-21 07:13
Summary
The Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message.
Impacted products
Vendor Product Version
webmin usermin *
webmin webmin 1.995



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:webmin:usermin:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24AEB62A-F2B3-442F-8FE7-B649173A0236",
              "versionEndIncluding": "1.850",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:webmin:webmin:1.995:*:*:*:*:*:*:*",
              "matchCriteriaId": "720EE395-A946-4F86-892D-EFB3D3A4A0AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo Read Mail de Webmin 1.995 y Usermin hasta 1.850 permite un ataque de tipo XSS por medio de un mensaje de correo electr\u00f3nico HTML dise\u00f1ado"
    }
  ],
  "id": "CVE-2022-36880",
  "lastModified": "2024-11-21T07:13:58.237",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-07-27T04:15:10.837",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.webmin.com/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.webmin.com/security.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2022-36880
Vulnerability from cvelistv5
Published
2022-07-27 03:32
Modified
2024-08-03 10:14
Severity ?
Summary
The Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message.
References
https://www.webmin.com/security.htmlx_refsource_MISC
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T10:14:29.054Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.webmin.com/security.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-27T03:32:30",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.webmin.com/security.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-36880",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.webmin.com/security.html",
              "refsource": "MISC",
              "url": "https://www.webmin.com/security.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-36880",
    "datePublished": "2022-07-27T03:32:30",
    "dateReserved": "2022-07-27T00:00:00",
    "dateUpdated": "2024-08-03T10:14:29.054Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-4897
Vulnerability from cvelistv5
Published
2017-04-12 22:00
Modified
2024-08-06 00:46
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi in Usermin before 1.690.
References
http://jvn.jp/en/jp/JVN32504719/index.htmlthird-party-advisory, x_refsource_JVN
http://www.securityfocus.com/bid/93477vdb-entry, x_refsource_BID
http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.htmlthird-party-advisory, x_refsource_JVNDB
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T00:46:39.250Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#32504719",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN32504719/index.html"
          },
          {
            "name": "93477",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/93477"
          },
          {
            "name": "JVNDB-2016-000202",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-10-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi in Usermin before 1.690."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-04-12T21:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#32504719",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN32504719/index.html"
        },
        {
          "name": "93477",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/93477"
        },
        {
          "name": "JVNDB-2016-000202",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2016-4897",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in (1) filter/save_forward.cgi, (2) filter/save.cgi, (3) /man/search.cgi in Usermin before 1.690."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#32504719",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN32504719/index.html"
            },
            {
              "name": "93477",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/93477"
            },
            {
              "name": "JVNDB-2016-000202",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000202.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2016-4897",
    "datePublished": "2017-04-12T22:00:00",
    "dateReserved": "2016-05-17T00:00:00",
    "dateUpdated": "2024-08-06T00:46:39.250Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-41155
Vulnerability from cvelistv5
Published
2023-09-13 00:00
Modified
2024-09-25 20:39
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the mail forwarding and replies tab in Webmin and Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the forward to field while creating a mail forwarding rule.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:54:04.491Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://webmin.com/tags/webmin-changelog/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41155"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-41155",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-25T20:39:47.299305Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-25T20:39:56.424Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the mail forwarding and replies tab in Webmin and Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the forward to field while creating a mail forwarding rule."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-13T21:41:29.263678",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://webmin.com/tags/webmin-changelog/"
        },
        {
          "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41155"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-41155",
    "datePublished": "2023-09-13T00:00:00",
    "dateReserved": "2023-08-24T00:00:00",
    "dateUpdated": "2024-09-25T20:39:56.424Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-41157
Vulnerability from cvelistv5
Published
2023-09-16 00:00
Modified
2024-09-25 18:47
Severity ?
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the folder name parameter while creating the folder to manage the folder tab, filter tab, and forward mail tab.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:54:04.431Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://webmin.com/tags/webmin-changelog/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41157"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-41157",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-25T18:47:17.367385Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-25T18:47:25.652Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the folder name parameter while creating the folder to manage the folder tab, filter tab, and forward mail tab."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-16T05:10:09.828159",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://webmin.com/tags/webmin-changelog/"
        },
        {
          "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41157"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-41157",
    "datePublished": "2023-09-16T00:00:00",
    "dateReserved": "2023-08-24T00:00:00",
    "dateUpdated": "2024-09-25T18:47:25.652Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-35132
Vulnerability from cvelistv5
Published
2022-10-25 00:00
Modified
2024-08-03 09:29
Severity ?
Summary
Usermin through 1.850 allows a remote authenticated user to execute OS commands via command injection in a filename for the GPG module.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T09:29:17.314Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/ly1g3/webmin-usermin-vulnerabilities"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://webmin.com/uchanges.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Usermin through 1.850 allows a remote authenticated user to execute OS commands via command injection in a filename for the GPG module."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-10-25T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/ly1g3/webmin-usermin-vulnerabilities"
        },
        {
          "url": "https://webmin.com/uchanges.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-35132",
    "datePublished": "2022-10-25T00:00:00",
    "dateReserved": "2022-07-04T00:00:00",
    "dateUpdated": "2024-08-03T09:29:17.314Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-41162
Vulnerability from cvelistv5
Published
2023-09-13 00:00
Modified
2024-09-25 20:34
Severity ?
Summary
A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the file mask field while searching under the tools drop down.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:54:03.501Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://webmin.com/tags/webmin-changelog/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41162"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-41162",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-25T20:34:15.287690Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-25T20:34:26.746Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the file mask field while searching under the tools drop down."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-13T21:51:18.238302",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://webmin.com/tags/webmin-changelog/"
        },
        {
          "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41162"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-41162",
    "datePublished": "2023-09-13T00:00:00",
    "dateReserved": "2023-08-24T00:00:00",
    "dateUpdated": "2024-09-25T20:34:26.746Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-41153
Vulnerability from cvelistv5
Published
2023-08-29 00:00
Modified
2024-10-02 13:19
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via options for the host value while editing the host options.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:54:03.538Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://webmin.com/tags/webmin-changelog/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41153"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-41153",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-02T13:18:57.084182Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-02T13:19:05.953Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via options for the host value while editing the host options."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-31T22:02:24.740092",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://webmin.com/tags/webmin-changelog/"
        },
        {
          "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41153"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-41153",
    "datePublished": "2023-08-29T00:00:00",
    "dateReserved": "2023-08-24T00:00:00",
    "dateUpdated": "2024-10-02T13:19:05.953Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-41156
Vulnerability from cvelistv5
Published
2023-09-14 00:00
Modified
2024-09-25 19:33
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the filter and forward mail tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the save to new folder named field while creating a new filter.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:54:03.588Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://webmin.com/tags/webmin-changelog/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41156"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-41156",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-25T19:32:59.314276Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-25T19:33:15.580Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the filter and forward mail tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the save to new folder named field while creating a new filter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-14T20:46:17.664013",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://webmin.com/tags/webmin-changelog/"
        },
        {
          "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41156"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-41156",
    "datePublished": "2023-09-14T00:00:00",
    "dateReserved": "2023-08-24T00:00:00",
    "dateUpdated": "2024-09-25T19:33:15.580Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-36453
Vulnerability from cvelistv5
Published
2024-07-10 07:02
Modified
2024-11-06 21:34
Summary
Cross-site scripting vulnerability exists in session_login.cgi of Webmin versions prior to 1.970 and Usermin versions prior to 1.820. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a webpage may be altered or sensitive information such as a credential may be disclosed.
Impacted products
Vendor Product Version
Webmin Usermin Version: versions prior to 1.820
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 6.1,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "CHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-36453",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-10T14:03:38.998862Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-79",
                "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-06T21:34:36.873Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T03:37:05.102Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://webmin.com/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://webmin.com/usermin/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN81442045/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Webmin",
          "vendor": "Webmin",
          "versions": [
            {
              "status": "affected",
              "version": "versions prior to 1.970"
            }
          ]
        },
        {
          "product": "Usermin",
          "vendor": "Webmin",
          "versions": [
            {
              "status": "affected",
              "version": "versions prior to 1.820"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting vulnerability exists in session_login.cgi of Webmin versions prior to 1.970 and Usermin versions prior to 1.820. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a webpage may be altered or sensitive information such as a credential may be disclosed."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Cross-site scripting (XSS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-10T07:02:17.776Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "https://webmin.com/"
        },
        {
          "url": "https://webmin.com/usermin/"
        },
        {
          "url": "https://jvn.jp/en/jp/JVN81442045/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2024-36453",
    "datePublished": "2024-07-10T07:02:17.776Z",
    "dateReserved": "2024-05-28T05:38:38.739Z",
    "dateUpdated": "2024-11-06T21:34:36.873Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-41152
Vulnerability from cvelistv5
Published
2023-09-13 00:00
Modified
2024-09-26 13:19
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the handle program field while creating a new MIME type program.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:54:03.732Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://webmin.com/tags/webmin-changelog/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41152"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-41152",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-26T13:19:25.826234Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-26T13:19:38.230Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the handle program field while creating a new MIME type program."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-13T21:10:43.110819",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://webmin.com/tags/webmin-changelog/"
        },
        {
          "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41152"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-41152",
    "datePublished": "2023-09-13T00:00:00",
    "dateReserved": "2023-08-24T00:00:00",
    "dateUpdated": "2024-09-26T13:19:38.230Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-41160
Vulnerability from cvelistv5
Published
2023-09-14 00:00
Modified
2024-09-25 19:22
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the key name field while adding an authorized key.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:54:03.552Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://webmin.com/tags/webmin-changelog/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41160"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-41160",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-25T19:22:34.362404Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-25T19:22:51.517Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the key name field while adding an authorized key."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-14T20:40:46.472788",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://webmin.com/tags/webmin-changelog/"
        },
        {
          "url": "https://github.com/shindeanik/Usermin-2.001/blob/main/CVE-2023-41160"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-41160",
    "datePublished": "2023-09-14T00:00:00",
    "dateReserved": "2023-08-24T00:00:00",
    "dateUpdated": "2024-09-25T19:22:51.517Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-41159
Vulnerability from cvelistv5
Published
2023-09-14 00:00
Modified
2024-09-25 19:30
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability while editing the autoreply file page in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML by editing the forward file manually.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:54:03.956Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://webmin.com/tags/webmin-changelog/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41159"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-41159",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-25T19:30:16.854586Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-25T19:30:29.942Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A Stored Cross-Site Scripting (XSS) vulnerability while editing the autoreply file page in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML by editing the forward file manually."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-14T20:58:25.091676",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://webmin.com/tags/webmin-changelog/"
        },
        {
          "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41159"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-41159",
    "datePublished": "2023-09-14T00:00:00",
    "dateReserved": "2023-08-24T00:00:00",
    "dateUpdated": "2024-09-25T19:30:29.942Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-4568
Vulnerability from cvelistv5
Published
2010-01-05 18:31
Modified
2024-08-07 07:08
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Webmin before 1.500 and Usermin before 1.430 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
http://www.webmin.com/security.htmlx_refsource_CONFIRM
http://www.securityfocus.com/bid/37259vdb-entry, x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDVSA-2010:036vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/37648third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/3457vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:08:38.108Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.webmin.com/security.html"
          },
          {
            "name": "37259",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/37259"
          },
          {
            "name": "MDVSA-2010:036",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:036"
          },
          {
            "name": "37648",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37648"
          },
          {
            "name": "ADV-2009-3457",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3457"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-12-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Webmin before 1.500 and Usermin before 1.430 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-02-24T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.webmin.com/security.html"
        },
        {
          "name": "37259",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/37259"
        },
        {
          "name": "MDVSA-2010:036",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:036"
        },
        {
          "name": "37648",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37648"
        },
        {
          "name": "ADV-2009-3457",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3457"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4568",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Webmin before 1.500 and Usermin before 1.430 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.webmin.com/security.html",
              "refsource": "CONFIRM",
              "url": "http://www.webmin.com/security.html"
            },
            {
              "name": "37259",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/37259"
            },
            {
              "name": "MDVSA-2010:036",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:036"
            },
            {
              "name": "37648",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37648"
            },
            {
              "name": "ADV-2009-3457",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3457"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4568",
    "datePublished": "2010-01-05T18:31:00",
    "dateReserved": "2010-01-05T00:00:00",
    "dateUpdated": "2024-08-07T07:08:38.108Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-41161
Vulnerability from cvelistv5
Published
2023-09-07 00:00
Modified
2024-09-26 19:03
Severity ?
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the key comment to different pages such as public key details, Export key, sign key, send to key server page, and fetch from key server page tab.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:54:04.354Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://webmin.com/tags/webmin-changelog/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41161"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-41161",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-26T19:02:48.923529Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-26T19:03:09.539Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the key comment to different pages such as public key details, Export key, sign key, send to key server page, and fetch from key server page tab."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-07T21:09:40.326249",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://webmin.com/tags/webmin-changelog/"
        },
        {
          "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41161"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-41161",
    "datePublished": "2023-09-07T00:00:00",
    "dateReserved": "2023-08-24T00:00:00",
    "dateUpdated": "2024-09-26T19:03:09.539Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-3156
Vulnerability from cvelistv5
Published
2007-06-11 22:00
Modified
2024-08-07 14:05
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in pam_login.cgi in Webmin before 1.350 and Usermin before 1.280 allow remote attackers to inject arbitrary web script or HTML via the (1) cid, (2) message, or (3) question parameter. NOTE: some of these details are obtained from third party information.
References
http://www.webmin.com/security.htmlx_refsource_CONFIRM
http://secunia.com/advisories/25785third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/2117vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/24381vdb-entry, x_refsource_BID
http://www.webmin.com/changes-1.350.htmlx_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200707-05.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/25580third-party-advisory, x_refsource_SECUNIA
http://osvdb.org/36932vdb-entry, x_refsource_OSVDB
http://www.mandriva.com/security/advisories?name=MDKSA-2007:135vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/25956third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:05:29.294Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.webmin.com/security.html"
          },
          {
            "name": "25785",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25785"
          },
          {
            "name": "ADV-2007-2117",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2117"
          },
          {
            "name": "24381",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24381"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.webmin.com/changes-1.350.html"
          },
          {
            "name": "GLSA-200707-05",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200707-05.xml"
          },
          {
            "name": "25580",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25580"
          },
          {
            "name": "36932",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/36932"
          },
          {
            "name": "MDKSA-2007:135",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:135"
          },
          {
            "name": "25956",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25956"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-06-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in pam_login.cgi in Webmin before 1.350 and Usermin before 1.280 allow remote attackers to inject arbitrary web script or HTML via the (1) cid, (2) message, or (3) question parameter.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-06-27T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.webmin.com/security.html"
        },
        {
          "name": "25785",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25785"
        },
        {
          "name": "ADV-2007-2117",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2117"
        },
        {
          "name": "24381",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24381"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.webmin.com/changes-1.350.html"
        },
        {
          "name": "GLSA-200707-05",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200707-05.xml"
        },
        {
          "name": "25580",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25580"
        },
        {
          "name": "36932",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/36932"
        },
        {
          "name": "MDKSA-2007:135",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:135"
        },
        {
          "name": "25956",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25956"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3156",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in pam_login.cgi in Webmin before 1.350 and Usermin before 1.280 allow remote attackers to inject arbitrary web script or HTML via the (1) cid, (2) message, or (3) question parameter.  NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.webmin.com/security.html",
              "refsource": "CONFIRM",
              "url": "http://www.webmin.com/security.html"
            },
            {
              "name": "25785",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25785"
            },
            {
              "name": "ADV-2007-2117",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2117"
            },
            {
              "name": "24381",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24381"
            },
            {
              "name": "http://www.webmin.com/changes-1.350.html",
              "refsource": "CONFIRM",
              "url": "http://www.webmin.com/changes-1.350.html"
            },
            {
              "name": "GLSA-200707-05",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200707-05.xml"
            },
            {
              "name": "25580",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25580"
            },
            {
              "name": "36932",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/36932"
            },
            {
              "name": "MDKSA-2007:135",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:135"
            },
            {
              "name": "25956",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25956"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3156",
    "datePublished": "2007-06-11T22:00:00",
    "dateReserved": "2007-06-11T00:00:00",
    "dateUpdated": "2024-08-07T14:05:29.294Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-3883
Vulnerability from cvelistv5
Published
2014-06-21 15:00
Modified
2024-08-06 10:57
Severity ?
Summary
Usermin before 1.600 allows remote attackers to execute arbitrary operating-system commands via unspecified vectors related to a user action.
References
https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.htmlx_refsource_MISC
http://jvn.jp/en/jp/JVN48805624/index.htmlthird-party-advisory, x_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057third-party-advisory, x_refsource_JVNDB
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:57:17.891Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html"
          },
          {
            "name": "JVN#48805624",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN48805624/index.html"
          },
          {
            "name": "JVNDB-2014-000057",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-06-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Usermin before 1.600 allows remote attackers to execute arbitrary operating-system commands via unspecified vectors related to a user action."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-06-21T15:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html"
        },
        {
          "name": "JVN#48805624",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN48805624/index.html"
        },
        {
          "name": "JVNDB-2014-000057",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-3883",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Usermin before 1.600 allows remote attackers to execute arbitrary operating-system commands via unspecified vectors related to a user action."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html",
              "refsource": "MISC",
              "url": "https://www.ipa.go.jp/security/ciadr/vul/20140620-jvn.html"
            },
            {
              "name": "JVN#48805624",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN48805624/index.html"
            },
            {
              "name": "JVNDB-2014-000057",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000057"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-3883",
    "datePublished": "2014-06-21T15:00:00",
    "dateReserved": "2014-05-27T00:00:00",
    "dateUpdated": "2024-08-06T10:57:17.891Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-3884
Vulnerability from cvelistv5
Published
2014-07-20 10:00
Modified
2024-08-06 10:57
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Usermin before 1.600 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this might overlap CVE-2014-3924.
References
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058third-party-advisory, x_refsource_JVNDB
http://jvn.jp/en/jp/JVN92737498/index.htmlthird-party-advisory, x_refsource_JVN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:57:17.939Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2014-000058",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058"
          },
          {
            "name": "JVN#92737498",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN92737498/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-06-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Usermin before 1.600 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.  NOTE: this might overlap CVE-2014-3924."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-07-20T06:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVNDB-2014-000058",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058"
        },
        {
          "name": "JVN#92737498",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN92737498/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-3884",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Usermin before 1.600 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.  NOTE: this might overlap CVE-2014-3924."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2014-000058",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000058"
            },
            {
              "name": "JVN#92737498",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN92737498/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-3884",
    "datePublished": "2014-07-20T10:00:00",
    "dateReserved": "2014-05-27T00:00:00",
    "dateUpdated": "2024-08-06T10:57:17.939Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-41154
Vulnerability from cvelistv5
Published
2023-09-13 00:00
Modified
2024-09-26 13:15
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the scheduled cron jobs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the value field parameter while creating a new environment variable.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:54:03.475Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://webmin.com/tags/webmin-changelog/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41154"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-41154",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-26T13:15:29.354992Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-26T13:15:37.164Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the scheduled cron jobs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the value field parameter while creating a new environment variable."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-13T21:08:07.076190",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://webmin.com/tags/webmin-changelog/"
        },
        {
          "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41154"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-41154",
    "datePublished": "2023-09-13T00:00:00",
    "dateReserved": "2023-08-24T00:00:00",
    "dateUpdated": "2024-09-26T13:15:37.164Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-41158
Vulnerability from cvelistv5
Published
2023-09-13 00:00
Modified
2024-09-25 20:36
Severity ?
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the description field while creating a new MIME type program.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:54:04.336Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://webmin.com/tags/webmin-changelog/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41158"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-41158",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-25T20:35:50.024676Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-25T20:36:19.802Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the description field while creating a new MIME type program."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-13T21:19:06.949646",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://webmin.com/tags/webmin-changelog/"
        },
        {
          "url": "https://github.com/shindeanik/Usermin-2.000/blob/main/CVE-2023-41158"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-41158",
    "datePublished": "2023-09-13T00:00:00",
    "dateReserved": "2023-08-24T00:00:00",
    "dateUpdated": "2024-09-25T20:36:19.802Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-0720
Vulnerability from cvelistv5
Published
2008-02-12 01:00
Modified
2024-08-07 07:54
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Webmin 1.370 and 1.390 and Usermin 1.300 and 1.320 allows remote attackers to inject arbitrary web script or HTML via the search parameter to webmin_search.cgi (aka the search section), and possibly other components accessed through a "search box" or "open file box." NOTE: some of these details are obtained from third party information.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:54:23.199Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20080206 Re: Tested on Webmin 1.390",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/487678/100/0/threaded"
          },
          {
            "name": "28827",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28827"
          },
          {
            "name": "27662",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27662"
          },
          {
            "name": "20080206 Tested on Webmin 1.390",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/487656/100/0/threaded"
          },
          {
            "name": "ADV-2008-0450",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0450"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://forum.aria-security.net/showthread.php?t=511"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Webmin 1.370 and 1.390 and Usermin 1.300 and 1.320 allows remote attackers to inject arbitrary web script or HTML via the search parameter to webmin_search.cgi (aka the search section), and possibly other components accessed through a \"search box\" or \"open file box.\" NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20080206 Re: Tested on Webmin 1.390",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/487678/100/0/threaded"
        },
        {
          "name": "28827",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28827"
        },
        {
          "name": "27662",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27662"
        },
        {
          "name": "20080206 Tested on Webmin 1.390",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/487656/100/0/threaded"
        },
        {
          "name": "ADV-2008-0450",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0450"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://forum.aria-security.net/showthread.php?t=511"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0720",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Webmin 1.370 and 1.390 and Usermin 1.300 and 1.320 allows remote attackers to inject arbitrary web script or HTML via the search parameter to webmin_search.cgi (aka the search section), and possibly other components accessed through a \"search box\" or \"open file box.\" NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20080206 Re: Tested on Webmin 1.390",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/487678/100/0/threaded"
            },
            {
              "name": "28827",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28827"
            },
            {
              "name": "27662",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27662"
            },
            {
              "name": "20080206 Tested on Webmin 1.390",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/487656/100/0/threaded"
            },
            {
              "name": "ADV-2008-0450",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0450"
            },
            {
              "name": "http://forum.aria-security.net/showthread.php?t=511",
              "refsource": "MISC",
              "url": "http://forum.aria-security.net/showthread.php?t=511"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0720",
    "datePublished": "2008-02-12T01:00:00",
    "dateReserved": "2008-02-11T00:00:00",
    "dateUpdated": "2024-08-07T07:54:23.199Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}