RSS   Vulnerabilities for 'Monkey http daemon'   RSS

2019-12-10
 
CVE-2013-2183

CWE-668
 

 
Monkey HTTP Daemon has local security bypass

 
 
CVE-2013-2159

CWE-287
 

 
Monkey HTTP Daemon: broken user name authentication

 
2014-08-26
 
CVE-2014-5336

 

 
Monkey HTTP Server before 1.5.3, when the File Descriptor Table (FDT) is enabled and custom error messages are set, allows remote attackers to cause a denial of service (file descriptor consumption) via an HTTP request that triggers an error message.

 
2014-06-13
 
CVE-2013-3843

CWE-119
 

 
Stack-based buffer overflow in the mk_request_header_process function in mk_request.c in Monkey HTTP Daemon (monkeyd) before 1.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP header.

 
 
CVE-2013-2182

CWE-264
 

 
The Mandril security plugin in Monkey HTTP Daemon (monkeyd) before 1.5.0 allows remote attackers to bypass access restrictions via a crafted URI, as demonstrated by an encoded forward slash.

 
 
CVE-2013-2163

CWE-20
 

 
Monkey HTTP Daemon (monkeyd) before 1.2.2 allows remote attackers to cause a denial of service (infinite loop) via an offset equal to the file size in the Range HTTP header.

 
2013-08-01
 
CVE-2013-3724

 

 
The mk_request_header_process function in mk_request.c in Monkey 1.1.1 allows remote attackers to cause a denial of service (thread crash and service outage) via a '\0' character in an HTTP request.

 
2013-07-29
 
CVE-2013-2181

 

 
Cross-site scripting (XSS) vulnerability in the Directory Listing plugin in Monkey HTTP Daemon (monkeyd) 1.2.2 allows attackers to inject arbitrary web script or HTML via a file name.

 
2012-10-05
 
CVE-2012-5303

 

 
Monkey HTTP Daemon 0.9.3 might allow local users to overwrite arbitrary files via a symlink attack on a PID file, as demonstrated by a pathname different from the default /var/run/monkey.pid pathname.

 
 
CVE-2012-4442

 

 
Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the root account during operations with a non-root effective UID, which might allow local users to bypass intended file-read restrictions by leveraging a race condition in a file-permission check.

 


Copyright 2024, cxsecurity.com

 

Back to Top