{"id":"CVE-2020-36968","details":"M/Monit 3.7.4 contains an authentication vulnerability that allows authenticated attackers to retrieve user password hashes through an administrative API endpoint. Attackers can send requests to the /api/1/admin/users/list and /api/1/admin/users/get endpoints to extract MD5 password hashes for all users.","modified":"2026-04-10T04:27:15.856878Z","published":"2026-01-28T18:16:47.147Z","references":[{"type":"WEB","url":"https://mmonit.com/"},{"type":"ADVISORY","url":"https://www.vulncheck.com/advisories/mmonit-password-disclosure"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/49081"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-36968.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"3.7.4"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}