Логотип exploitDog
bind:CVE-2020-36969
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-36969

Количество 4

Количество 4

ubuntu логотип

CVE-2020-36969

12 дней назад

M/Monit 3.7.4 contains a privilege escalation vulnerability that allows authenticated users to modify user permissions by manipulating the admin parameter. Attackers can send a POST request to the /api/1/admin/users/update endpoint with a crafted payload to grant administrative access to a standard user account.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2020-36969

12 дней назад

M/Monit 3.7.4 contains a privilege escalation vulnerability that allows authenticated users to modify user permissions by manipulating the admin parameter. Attackers can send a POST request to the /api/1/admin/users/update endpoint with a crafted payload to grant administrative access to a standard user account.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2020-36969

12 дней назад

M/Monit 3.7.4 contains a privilege escalation vulnerability that allow ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-mwjm-9r99-f56x

12 дней назад

M/Monit 3.7.4 contains a privilege escalation vulnerability that allows authenticated users to modify user permissions by manipulating the admin parameter. Attackers can send a POST request to the /api/1/admin/users/update endpoint with a crafted payload to grant administrative access to a standard user account.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-36969

M/Monit 3.7.4 contains a privilege escalation vulnerability that allows authenticated users to modify user permissions by manipulating the admin parameter. Attackers can send a POST request to the /api/1/admin/users/update endpoint with a crafted payload to grant administrative access to a standard user account.

CVSS3: 8.8
0%
Низкий
12 дней назад
nvd логотип
CVE-2020-36969

M/Monit 3.7.4 contains a privilege escalation vulnerability that allows authenticated users to modify user permissions by manipulating the admin parameter. Attackers can send a POST request to the /api/1/admin/users/update endpoint with a crafted payload to grant administrative access to a standard user account.

CVSS3: 8.8
0%
Низкий
12 дней назад
debian логотип
CVE-2020-36969

M/Monit 3.7.4 contains a privilege escalation vulnerability that allow ...

CVSS3: 8.8
0%
Низкий
12 дней назад
github логотип
GHSA-mwjm-9r99-f56x

M/Monit 3.7.4 contains a privilege escalation vulnerability that allows authenticated users to modify user permissions by manipulating the admin parameter. Attackers can send a POST request to the /api/1/admin/users/update endpoint with a crafted payload to grant administrative access to a standard user account.

CVSS3: 8.8
0%
Низкий
12 дней назад

Уязвимостей на страницу