Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7098876-1831-4013-AFDC-4B87AEBECEDA", "versionEndIncluding": "1.680", "vulnerable": true}, {"criteria": "cpe:2.3:a:webmin:webmin:1.600:*:*:*:*:*:*:*", "matchCriteriaId": "FDDBEEF5-0D51-4585-9AFF-E317E1E81C4F", "vulnerable": true}, {"criteria": "cpe:2.3:a:webmin:webmin:1.610:*:*:*:*:*:*:*", "matchCriteriaId": "79D5E434-C5D0-476C-991C-E82355AE32B2", "vulnerable": true}, {"criteria": "cpe:2.3:a:webmin:webmin:1.620:*:*:*:*:*:*:*", "matchCriteriaId": "523DF9D1-7E6D-458E-93AD-906AAE97E1CD", "vulnerable": true}, {"criteria": "cpe:2.3:a:webmin:webmin:1.630:*:*:*:*:*:*:*", "matchCriteriaId": "76BD5561-78F2-416F-BDE1-365D887FC061", "vulnerable": true}, {"criteria": "cpe:2.3:a:webmin:webmin:1.640:*:*:*:*:*:*:*", "matchCriteriaId": "E5D20433-B154-4CD2-BF7E-2B0F6E93E81C", "vulnerable": true}, {"criteria": "cpe:2.3:a:webmin:webmin:1.650:*:*:*:*:*:*:*", "matchCriteriaId": "2403CB58-22C6-4B71-B007-4F2B8D942C5D", "vulnerable": true}, {"criteria": "cpe:2.3:a:webmin:webmin:1.660:*:*:*:*:*:*:*", "matchCriteriaId": "6321F048-D25F-4E4C-9994-7FA0D619418D", "vulnerable": true}, {"criteria": "cpe:2.3:a:webmin:webmin:1.670:*:*:*:*:*:*:*", "matchCriteriaId": "AE07D5AE-0277-493F-8362-C09285A024E6", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Webmin before 1.690, when referrer checking is disabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this might overlap CVE-2014-3924."}, {"lang": "es", "value": "Vulnerabilidad de XSS en Webmin anterior a 1.690, cuando la comprobaci\u00f3n de referenciadores est\u00e1 deshabilitada, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores no especificados. NOTA: esto podr\u00eda solaparse con CVE-2014-3924."}], "id": "CVE-2014-3886", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2014-07-20T11:12:50.527", "references": [{"source": "vultures@jpcert.or.jp", "tags": ["Vendor Advisory"], "url": "http://jvn.jp/en/jp/JVN02213197/index.html"}, {"source": "vultures@jpcert.or.jp", "tags": ["Vendor Advisory"], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000060"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://jvn.jp/en/jp/JVN02213197/index.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000060"}], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}