Tildeslash Monit vulnerabilities

10 known vulnerabilities affecting tildeslash/monit.

Total CVEs
10
CISA KEV
0
Public exploits
3
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH2MEDIUM5

Vulnerabilities

Page 1 of 1
CVE-2022-26563HIGHCVSS 8.8fixed in 5.31.02023-07-18
CVE-2022-26563 [HIGH] CWE-863 CVE-2022-26563: An issue was discovered in Tildeslash Monit before 5.31.0, allows remote attackers to gain escilated An issue was discovered in Tildeslash Monit before 5.31.0, allows remote attackers to gain escilated privlidges due to improper PAM-authorization.
nvdosv
CVE-2019-11454MEDIUMCVSS 6.1≥ 0, < 1:5.6-2ubuntu0.1+esm2≥ 0, < 1:5.16-2ubuntu0.2+esm1+1 more2021-03-15
CVE-2019-11454 [MEDIUM] monit vulnerabilities monit vulnerabilities Zack Flack discovered that Monit incorrectly handled certain input. A remote authenticated user could exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2019-11454) Zack Flack discovered a buffer overread when Monit decoded certain crafted URLs. An attacker could exploit this to potentially leak sensitive information. (CVE-2019-11455)
osv
CVE-2019-11393CRITICALCVSS 9.8fixed in 3.7.32019-04-22
CVE-2019-11393 [CRITICAL] CWE-640 CVE-2019-11393: An issue was discovered in /admin/users/update in M/Monit before 3.7.3. It allows unprivileged users An issue was discovered in /admin/users/update in M/Monit before 3.7.3. It allows unprivileged users to escalate their privileges to an administrator by requesting a password change and specifying the admin parameter.
nvd
CVE-2019-11455HIGHCVSS 8.1fixed in 5.25.32019-04-22
CVE-2019-11455 [HIGH] CWE-125 CVE-2019-11455: A buffer over-read in Util_urlDecode in util.c in Tildeslash Monit before 5.25.3 allows a remote aut A buffer over-read in Util_urlDecode in util.c in Tildeslash Monit before 5.25.3 allows a remote authenticated attacker to retrieve the contents of adjacent memory via manipulation of GET or POST parameters. The attacker can also cause a denial of service (application outage).
nvdosv
CVE-2016-7067MEDIUMCVSS 6.5≥ 0, < 1:5.20.0-12018-09-10
CVE-2016-7067 [MEDIUM] CVE-2016-7067: Monit before version 5 Monit before version 5.20.0 is vulnerable to a cross site request forgery attack. Successful exploitation will enable an attacker to disable/enable all monitoring for a particular host or disable/enable monitoring for a specific service.
osv
CVE-2004-1898CRITICALCVSS 10.0PoCv1.4v3.0+7 more2004-12-31
CVE-2004-1898 [CRITICAL] CVE-2004-1898: Stack-based buffer overflow in the administration interface in Monit 1.4 through 4.2 allows remote a Stack-based buffer overflow in the administration interface in Monit 1.4 through 4.2 allows remote attackers to execute arbitrary code via a long username.
nvdosv
CVE-2004-1899MEDIUMCVSS 5.0v1.4v3.0+7 more2004-12-31
CVE-2004-1899 [MEDIUM] CVE-2004-1899: The administration interface in Monit 1.4 through 4.2 allows remote attackers to cause an off-by-one The administration interface in Monit 1.4 through 4.2 allows remote attackers to cause an off-by-one overflow via a POST that contains 1024 bytes.
nvdosv
CVE-2004-1897MEDIUMCVSS 5.0PoC≥ 0, < 1:4.2.1-12004-12-31
CVE-2004-1897 [MEDIUM] CVE-2004-1897: Administration interface in Monit 1 Administration interface in Monit 1.4 through 4.2 allows remote attackers to cause a denial of service (segmentation fault) by sending a Basic Authentication request without a password, which causes Monit to decrement a null pointer and perform an out-of-bounds read.
osv
CVE-2003-1083CRITICALCVSS 10.0PoCv1.4v1.4.1+15 more2003-12-31
CVE-2003-1083 [CRITICAL] CVE-2003-1083: Stack-based buffer overflow in Monit 1.4 to 4.1 allows remote attackers to execute arbitrary code vi Stack-based buffer overflow in Monit 1.4 to 4.1 allows remote attackers to execute arbitrary code via a long HTTP request.
nvdosv
CVE-2003-1084MEDIUMCVSS 5.0v1.4v1.4.1+15 more2003-11-24
CVE-2003-1084 [MEDIUM] CVE-2003-1084: Monit 1.4 to 4.1 allows remote attackers to cause a denial of service (daemon crash) via an HTTP POS Monit 1.4 to 4.1 allows remote attackers to cause a denial of service (daemon crash) via an HTTP POST request with a negative Content-Length field.
nvdosv