8.1
CVSSv3

CVE-2019-11455

Published: 22/04/2019 Updated: 07/11/2023
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
CVSS v3 Base Score: 8.1 | Impact Score: 5.2 | Exploitability Score: 2.8
VMScore: 490
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:P

Vulnerability Summary

A buffer over-read in Util_urlDecode in util.c in Tildeslash Monit prior to 5.25.3 allows a remote authenticated malicious user to retrieve the contents of adjacent memory via manipulation of GET or POST parameters. The attacker can also cause a denial of service (application outage).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tildeslash monit

debian debian linux 8.0

fedoraproject fedora 31

fedoraproject fedora 32

canonical ubuntu linux 18.10

canonical ubuntu linux 19.04

Vendor Advisories

Debian Bug report logs - #927775 monit: CVE-2019-11454 CVE-2019-11455 Package: src:monit; Maintainer for src:monit is Sergey B Kirpichev <skirpichev@gmailcom>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 23 Apr 2019 04:57:01 UTC Severity: serious Tags: security, upstream Found in versions monit ...
Several security issues were fixed in Monit ...