Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
monkey-project monkey 0.9.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-5303
Monkey HTTP Daemon 0.9.3 might allow local users to overwrite arbitrary files via a symlink attack on a PID file, as demonstrated by a pathname different from the default /var/run/monkey.pid pathname.
Monkey-project Monkey 0.9.3
NA
CVE-2012-4443
Monkey HTTP Daemon 0.9.3 uses a real UID of root and a real GID of root during execution of CGI scripts, which might allow local users to gain privileges by leveraging cgi-bin write access.
Monkey-project Monkey 0.9.3
NA
CVE-2012-4442
Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the root account during operations with a non-root effective UID, which might allow local users to bypass intended file-read restrictions by leveraging a race condition in a file-permission check.
Monkey-project Monkey 0.9.3
NA
CVE-2014-5336
Monkey HTTP Server prior to 1.5.3, when the File Descriptor Table (FDT) is enabled and custom error messages are set, allows remote malicious users to cause a denial of service (file descriptor consumption) via an HTTP request that triggers an error message.
Monkey-project Monkey 1.5.3
Monkey-project Monkey 1.1.1
Monkey-project Monkey 1.1.0
Monkey-project Monkey 0.8.5
Monkey-project Monkey 0.8.4
Monkey-project Monkey 0.7.1
Monkey-project Monkey 0.7.0
Monkey-project Monkey 1.4.0
Monkey-project Monkey 1.2.2
Monkey-project Monkey 0.9.3
Monkey-project Monkey 0.9.2
Monkey-project Monkey 0.8.2
Monkey-project Monkey 0.8.1
Monkey-project Monkey 0.6.0
Monkey-project Monkey 0.5.2
Monkey-project Monkey 0.21.0
Monkey-project Monkey 0.20.3
Monkey-project Monkey 0.12.2
Monkey-project Monkey
Monkey-project Monkey 1.5.1
Monkey-project Monkey 1.5.0
Monkey-project Monkey 1.0.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started