Monkey-project

Monkey

29 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.46%
  • Veröffentlicht 10.12.2019 15:15:11
  • Zuletzt bearbeitet 21.11.2024 01:51:09

Monkey HTTP Daemon: broken user name authentication

  • EPSS 0.39%
  • Veröffentlicht 07.11.2019 23:15:10
  • Zuletzt bearbeitet 21.11.2024 01:50:21

The web server Monkeyd produces a world-readable log (/var/log/monkeyd/master.log) on gentoo.

Exploit
  • EPSS 1.14%
  • Veröffentlicht 26.08.2014 14:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Monkey HTTP Server before 1.5.3, when the File Descriptor Table (FDT) is enabled and custom error messages are set, allows remote attackers to cause a denial of service (file descriptor consumption) via an HTTP request that triggers an error message.

Exploit
  • EPSS 10.81%
  • Veröffentlicht 13.06.2014 14:55:12
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Mandril security plugin in Monkey HTTP Daemon (monkeyd) before 1.5.0 allows remote attackers to bypass access restrictions via a crafted URI, as demonstrated by an encoded forward slash.

  • EPSS 40.15%
  • Veröffentlicht 13.06.2014 14:55:12
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP hea...

Exploit
  • EPSS 0.75%
  • Veröffentlicht 13.06.2014 14:55:11
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Monkey HTTP Daemon (monkeyd) before 1.2.2 allows remote attackers to cause a denial of service (infinite loop) via an offset equal to the file size in the Range HTTP header.

Exploit
  • EPSS 8.87%
  • Veröffentlicht 01.08.2013 13:32:35
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The mk_request_header_process function in mk_request.c in Monkey 1.1.1 allows remote attackers to cause a denial of service (thread crash and service outage) via a '\0' character in an HTTP request.

Exploit
  • EPSS 0.25%
  • Veröffentlicht 29.07.2013 23:27:37
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Cross-site scripting (XSS) vulnerability in the Directory Listing plugin in Monkey HTTP Daemon (monkeyd) 1.2.2 allows attackers to inject arbitrary web script or HTML via a file name.

  • EPSS 0.04%
  • Veröffentlicht 05.10.2012 21:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Monkey HTTP Daemon 0.9.3 might allow local users to overwrite arbitrary files via a symlink attack on a PID file, as demonstrated by a pathname different from the default /var/run/monkey.pid pathname.

  • EPSS 0.06%
  • Veröffentlicht 05.10.2012 21:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the root account during operations with a non-root effective UID, which might allow local users to bypass intended file-read restrictions by leveraging a race condition in a file-permiss...