Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-4443

Опубликовано: 05 окт. 2012
Источник: debian
EPSS Низкий

Описание

Monkey HTTP Daemon 0.9.3 uses a real UID of root and a real GID of root during execution of CGI scripts, which might allow local users to gain privileges by leveraging cgi-bin write access.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
monkeyremovedpackage

EPSS

Процентиль: 17%
0.00054
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

Monkey HTTP Daemon 0.9.3 uses a real UID of root and a real GID of root during execution of CGI scripts, which might allow local users to gain privileges by leveraging cgi-bin write access.

nvd
больше 13 лет назад

Monkey HTTP Daemon 0.9.3 uses a real UID of root and a real GID of root during execution of CGI scripts, which might allow local users to gain privileges by leveraging cgi-bin write access.

github
больше 3 лет назад

Monkey HTTP Daemon 0.9.3 uses a real UID of root and a real GID of root during execution of CGI scripts, which might allow local users to gain privileges by leveraging cgi-bin write access.

EPSS

Процентиль: 17%
0.00054
Низкий