Format string vulnerability in cgi.c for Monkey daemon (monkeyd) prior to 0.9.1 allows remote malicious users to cause a denial of service and possibly execute arbitrary code via an HTTP GET request containing double-encoded format string specifiers (aka "double expansion error").
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
monkey-project monkey 0.8.0 |
||
monkey-project monkey 0.7.0 |
||
monkey-project monkey 0.7.2 |
||
monkey-project monkey 0.8.5 |
||
monkey-project monkey 0.8.4 |
||
monkey-project monkey 0.8.3 |
||
monkey-project monkey 0.6.1 |
||
monkey-project monkey 0.6.2 |
||
monkey-project monkey 0.6.3 |
||
monkey-project monkey 0.5.2 |
||
monkey-project monkey |
||
monkey-project monkey 0.8.1 |
||
monkey-project monkey 0.8.2 |
||
monkey-project monkey 0.7.1 |
||
monkey-project monkey 0.6.0 |
||
monkey-project monkey 0.1.1 |