Описание
Buffer overflow in PostMethod() function for Monkey HTTP Daemon (monkeyd) 0.6.1 and earlier allows remote attackers to execute arbitrary code via a POST request with a large body.
Ссылки
- ExploitPatchVendor Advisory
- ExploitPatchVendor Advisory
- ExploitPatchVendor Advisory
- ExploitPatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.6.1 (включая)
Одно из
cpe:2.3:a:monkey-project:monkey:*:*:*:*:*:*:*:*
cpe:2.3:a:monkey-project:monkey:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:monkey-project:monkey:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:monkey-project:monkey:0.6.0:*:*:*:*:*:*:*
EPSS
Процентиль: 91%
0.06683
Низкий
7.5 High
CVSS2
Дефекты
CWE-119
Связанные уязвимости
github
почти 4 года назад
Buffer overflow in PostMethod() function for Monkey HTTP Daemon (monkeyd) 0.6.1 and earlier allows remote attackers to execute arbitrary code via a POST request with a large body.
EPSS
Процентиль: 91%
0.06683
Низкий
7.5 High
CVSS2
Дефекты
CWE-119