CVE-2013-2159
- EPSS 0.46%
- Veröffentlicht 10.12.2019 15:15:11
- Zuletzt bearbeitet 21.11.2024 01:51:09
Monkey HTTP Daemon: broken user name authentication
CVE-2013-1771
- EPSS 0.39%
- Veröffentlicht 07.11.2019 23:15:10
- Zuletzt bearbeitet 21.11.2024 01:50:21
The web server Monkeyd produces a world-readable log (/var/log/monkeyd/master.log) on gentoo.
CVE-2014-5336
- EPSS 1.14%
- Veröffentlicht 26.08.2014 14:55:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
Monkey HTTP Server before 1.5.3, when the File Descriptor Table (FDT) is enabled and custom error messages are set, allows remote attackers to cause a denial of service (file descriptor consumption) via an HTTP request that triggers an error message.
CVE-2013-2182
- EPSS 10.81%
- Veröffentlicht 13.06.2014 14:55:12
- Zuletzt bearbeitet 12.04.2025 10:46:40
The Mandril security plugin in Monkey HTTP Daemon (monkeyd) before 1.5.0 allows remote attackers to bypass access restrictions via a crafted URI, as demonstrated by an encoded forward slash.
CVE-2013-3843
- EPSS 40.15%
- Veröffentlicht 13.06.2014 14:55:12
- Zuletzt bearbeitet 12.04.2025 10:46:40
Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP hea...
- EPSS 0.75%
- Veröffentlicht 13.06.2014 14:55:11
- Zuletzt bearbeitet 12.04.2025 10:46:40
Monkey HTTP Daemon (monkeyd) before 1.2.2 allows remote attackers to cause a denial of service (infinite loop) via an offset equal to the file size in the Range HTTP header.
- EPSS 8.87%
- Veröffentlicht 01.08.2013 13:32:35
- Zuletzt bearbeitet 11.04.2025 00:51:21
The mk_request_header_process function in mk_request.c in Monkey 1.1.1 allows remote attackers to cause a denial of service (thread crash and service outage) via a '\0' character in an HTTP request.
CVE-2013-2181
- EPSS 0.25%
- Veröffentlicht 29.07.2013 23:27:37
- Zuletzt bearbeitet 11.04.2025 00:51:21
Cross-site scripting (XSS) vulnerability in the Directory Listing plugin in Monkey HTTP Daemon (monkeyd) 1.2.2 allows attackers to inject arbitrary web script or HTML via a file name.
CVE-2012-5303
- EPSS 0.04%
- Veröffentlicht 05.10.2012 21:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
Monkey HTTP Daemon 0.9.3 might allow local users to overwrite arbitrary files via a symlink attack on a PID file, as demonstrated by a pathname different from the default /var/run/monkey.pid pathname.
CVE-2012-4442
- EPSS 0.06%
- Veröffentlicht 05.10.2012 21:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the root account during operations with a non-root effective UID, which might allow local users to bypass intended file-read restrictions by leveraging a race condition in a file-permiss...