Release | Version |
---|---|
jessie | 1:5.9-1+deb8u3 |
stretch | 1:5.20.0-6+deb9u3 |
stretch (security) | 1:5.20.0-6+deb9u2 |
bullseye | 1:5.27.2-1 |
bookworm | 1:5.33.0-1 |
trixie | 1:5.34.0-1 |
sid | 1:5.34.2-1 |
Bug | jessie | stretch | bullseye | bookworm | trixie | sid | Description |
---|---|---|---|---|---|---|---|
CVE-2022-26563 | fixed | fixed | vulnerable (no DSA) | fixed | fixed | fixed | An issue was discovered in Tildeslash Monit before 5.31.0, allows remo ... |
CVE-2016-7067 | vulnerable (no DSA) | fixed | fixed | fixed | fixed | fixed | Monit before version 5.20.0 is vulnerable to a cross site request forg ... |
Bug | Description |
---|---|
CVE-2019-11455 | A buffer over-read in Util_urlDecode in util.c in Tildeslash Monit bef ... |
CVE-2019-11454 | Persistent cross-site scripting (XSS) in http/cervlet.c in Tildeslash ... |
CVE-2004-1899 | The administration interface in Monit 1.4 through 4.2 allows remote at ... |
CVE-2004-1898 | Stack-based buffer overflow in the administration interface in Monit 1 ... |
CVE-2004-1897 | Administration interface in Monit 1.4 through 4.2 allows remote attack ... |
CVE-2003-1084 | Monit 1.4 to 4.1 allows remote attackers to cause a denial of service ... |
CVE-2003-1083 | Stack-based buffer overflow in Monit 1.4 to 4.1 allows remote attacker ... |
DSA / DLA | Description |
---|---|
ELA-906-1 | monit - security update |
DLA-2855-1 | monit - security update |
ELA-113-1 | monit - security update |
DLA-1767-1 | monit - security update |
DLA-732-3 | monit - regression update |
DLA-732-2 | monit - regression update |
DLA-732-1 | monit - security update |