CVE-2020-35769
- EPSS 0.43%
- Published 29.12.2020 06:15:13
- Last modified 21.11.2024 05:28:02
miniserv.pl in Webmin 1.962 on Windows mishandles special characters in query arguments to the CGI program.
- EPSS 81.7%
- Published 21.12.2020 20:15:12
- Last modified 21.11.2024 05:27:41
Arbitrary command execution can occur in Webmin through 1.962. Any user authorized for the Package Updates module can execute arbitrary commands with root privileges via vectors involving %0A and %0C. NOTE: this issue exists because of an incomplete ...
CVE-2020-8821
- EPSS 2.48%
- Published 12.10.2020 16:15:12
- Last modified 21.11.2024 05:39:30
An Improper Data Validation Vulnerability exists in Webmin 1.941 and earlier affecting the Command Shell Endpoint. A user may enter HTML code into the Command field and submit it. Then, after visiting the Action Logs Menu and displaying logs, the HTM...
CVE-2020-8820
- EPSS 0.34%
- Published 12.10.2020 16:15:12
- Last modified 21.11.2024 05:39:30
An XSS Vulnerability exists in Webmin 1.941 and earlier affecting the Cluster Shell Commands Endpoint. A user may enter any XSS Payload into the Command field and execute it. Then, after revisiting the Cluster Shell Commands Menu, the XSS Payload wil...
CVE-2020-12670
- EPSS 0.36%
- Published 12.10.2020 16:15:12
- Last modified 21.11.2024 05:00:02
XSS exists in Webmin 1.941 and earlier affecting the Save function of the Read User Email Module / mailboxes Endpoint when attempting to save HTML emails. This module parses any output without sanitizing SCRIPT elements, as opposed to the View functi...
CVE-2019-15642
- EPSS 91.53%
- Published 26.08.2019 18:15:12
- Last modified 21.11.2024 04:29:11
rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a crafted object name because unserialise_variable makes an eval call. NOTE: the Webmin_Servers_Index documentation states "RPC can be used to run any command or modify an...
CVE-2019-15641
- EPSS 0.88%
- Published 26.08.2019 18:15:12
- Last modified 21.11.2024 04:29:10
xmlrpc.cgi in Webmin through 1.930 allows authenticated XXE attacks. By default, only root, admin, and sysadm can access xmlrpc.cgi.
- EPSS 94.46%
- Published 16.08.2019 03:15:11
- Last modified 14.03.2025 17:50:48
An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability.
- EPSS 88.03%
- Published 15.06.2019 20:29:00
- Last modified 21.11.2024 04:23:41
In Webmin through 1.910, any user authorized to the "Package Updates" module can execute arbitrary commands with root privileges via the data parameter to update.cgi.
CVE-2018-19191
- EPSS 1.63%
- Published 21.03.2019 16:00:30
- Last modified 21.11.2024 03:57:30
Webmin 1.890 has XSS via /config.cgi?webmin, the /shell/index.cgi history parameter, /shell/index.cgi?stripped=1, or the /webminlog/search.cgi uall or mall parameter.