Show filters
739 Total Results
Displaying 1-10 of 739
Sort by:
Attacker Value
Unknown
CVE-2024-54386
Disclosure Date: December 16, 2024 (last updated December 18, 2024)
Cross-Site Request Forgery (CSRF) vulnerability in Get Push Monkey LLC Push Monkey Pro – Web Push Notifications and WooCommerce Abandoned Cart allows Cross Site Request Forgery.This issue affects Push Monkey Pro – Web Push Notifications and WooCommerce Abandoned Cart: from n/a through 3.9.
0
Attacker Value
Unknown
CVE-2024-41127
Disclosure Date: August 02, 2024 (last updated September 12, 2024)
Monkeytype is a minimalistic and customizable typing test. Monkeytype is vulnerable to Poisoned Pipeline Execution through Code Injection in its ci-failure-comment.yml GitHub Workflow, enabling attackers to gain pull-requests write access. The ci-failure-comment.yml workflow is triggered when the Monkey CI workflow completes. When it runs, it will download an artifact uploaded by the triggering workflow and assign the contents of ./pr_num/pr_num.txt artifact to the steps.pr_num_reader.outputs.content WorkFlow variable. It is not validated that the variable is actually a number and later it is interpolated into a JS script allowing an attacker to change the code to be executed. This issue leads to pull-requests write access. This vulnerability is fixed in 24.30.0.
0
Attacker Value
Unknown
CVE-2023-32623
Disclosure Date: June 28, 2023 (last updated October 08, 2023)
Directory traversal vulnerability in Snow Monkey Forms v5.1.1 and earlier allows a remote unauthenticated attacker to delete arbitrary files on the server.
0
Attacker Value
Unknown
CVE-2023-28413
Disclosure Date: May 23, 2023 (last updated October 08, 2023)
Directory traversal vulnerability in Snow Monkey Forms versions v5.0.6 and earlier allows a remote unauthenticated attacker to obtain sensitive information, alter the website, or cause a denial-of-service (DoS) condition.
0
Attacker Value
Unknown
CVE-2021-23792
Disclosure Date: May 06, 2022 (last updated February 23, 2025)
The package com.twelvemonkeys.imageio:imageio-metadata before 3.7.1 are vulnerable to XML External Entity (XXE) Injection due to an insecurely initialized XML parser for reading XMP Metadata. An attacker can exploit this vulnerability if they are able to supply a file (e.g. when an online profile picture is processed) with a malicious XMP segment. If the XMP metadata of the uploaded image is parsed, then the XXE vulnerability is triggered.
0
Attacker Value
Unknown
CVE-2020-2322
Disclosure Date: December 03, 2020 (last updated February 22, 2025)
Jenkins Chaos Monkey Plugin 0.3 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to generate load and to generate memory leaks.
0
Attacker Value
Unknown
CVE-2020-2323
Disclosure Date: December 03, 2020 (last updated February 22, 2025)
Jenkins Chaos Monkey Plugin 0.4 and earlier does not perform permission checks in an HTTP endpoint, allowing attackers with Overall/Read permission to access the Chaos Monkey page and to see the history of actions.
0
Attacker Value
Unknown
CVE-2013-2183
Disclosure Date: December 10, 2019 (last updated November 27, 2024)
Monkey HTTP Daemon has local security bypass
0
Attacker Value
Unknown
CVE-2013-2159
Disclosure Date: December 10, 2019 (last updated November 27, 2024)
Monkey HTTP Daemon: broken user name authentication
0
Attacker Value
Unknown
CVE-2013-1771
Disclosure Date: November 07, 2019 (last updated November 27, 2024)
The web server Monkeyd produces a world-readable log (/var/log/monkeyd/master.log) on gentoo.
0