Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using “…%01” sequences, which bypass the removal of “…/” sequences before bytes such as “%01” are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.
attrition.org/pipermail/vim/2006-July/000923.html
attrition.org/pipermail/vim/2006-June/000912.html
secunia.com/advisories/20892
secunia.com/advisories/21105
secunia.com/advisories/21365
secunia.com/advisories/22556
security.gentoo.org/glsa/glsa-200608-11.xml
www.debian.org/security/2006/dsa-1199
www.kb.cert.org/vuls/id/999601
www.mandriva.com/security/advisories?name=MDKSA-2006:125
www.osvdb.org/26772
www.securityfocus.com/archive/1/439653/100/0/threaded
www.securityfocus.com/archive/1/440125/100/0/threaded
www.securityfocus.com/archive/1/440466/100/0/threaded
www.securityfocus.com/archive/1/440493/100/0/threaded
www.securityfocus.com/bid/18744
www.vupen.com/english/advisories/2006/2612
www.webmin.com/changes.html