Show filters
328,381 Total Results
Displaying 1,921-1,930 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown

CVE-2024-47171

Disclosure Date: September 26, 2024 (last updated September 27, 2024)
Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to upload image files at attacker-chosen location on the server. This issue can lead to image file uploads to unauthorized or unintended directories, including overwriting of existing images which may be used for defacement. This does not affect `agnai.chat`, installations using S3-compatible storage, or self-hosting that is not publicly exposed. Version 1.0.330 fixes this vulnerability.
0
Attacker Value
Unknown

CVE-2024-47170

Disclosure Date: September 26, 2024 (last updated September 27, 2024)
Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to read arbitrary JSON files at attacker-chosen locations on the server. This issue can lead to unauthorized access to sensitive information and exposure of confidential configuration files. This only affects installations with `JSON_STORAGE` enabled which is intended to local/self-hosting only. Version 1.0.330 fixes this issue.
0
Attacker Value
Unknown

CVE-2024-47169

Disclosure Date: September 26, 2024 (last updated September 27, 2024)
Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to upload arbitrary files to attacker-chosen locations on the server, including JavaScript, enabling the execution of commands within those files. This issue could result in unauthorized access, full server compromise, data leakage, and other critical security threats. This does not affect `agnai.chat`, installations using S3-compatible storage, or self-hosting that is not publicly exposed. This does affect publicly hosted installs without S3-compatible storage. Version 1.0.330 fixes this vulnerability.
0
Attacker Value
Unknown

CVE-2024-47130

Disclosure Date: September 26, 2024 (last updated October 08, 2024)
The goTenna Pro series allows unauthenticated attackers to remotely update the local public keys used for P2P and Group messages.
Attacker Value
Unknown

CVE-2024-47129

Disclosure Date: September 26, 2024 (last updated October 08, 2024)
The goTenna Pro has a payload length vulnerability that makes it possible to tell the length of the payload regardless of the encryption used.
Attacker Value
Unknown

CVE-2024-47128

Disclosure Date: September 26, 2024 (last updated October 08, 2024)
The goTenna Pro broadcast key name is always sent unencrypted and could reveal the location of operation.
Attacker Value
Unknown

CVE-2024-47127

Disclosure Date: September 26, 2024 (last updated October 08, 2024)
In the goTenna Pro there is a vulnerability that makes it possible to inject any custom message with any GID and Callsign using a software defined radio in existing gotenna mesh networks. This vulnerability can be exploited if the device is being used in a unencrypted environment or if the cryptography has already been compromised.
Attacker Value
Unknown

CVE-2024-47126

Disclosure Date: September 26, 2024 (last updated October 08, 2024)
The goTenna Pro series does not use SecureRandom when generating its cryptographic keys. The random function in use is not suitable for cryptographic use.
Attacker Value
Unknown

CVE-2024-47125

Disclosure Date: September 26, 2024 (last updated October 08, 2024)
The goTenna Pro series does not authenticate public keys which allows an unauthenticated attacker to intercept and manipulate messages.
Attacker Value
Unknown

CVE-2024-47124

Disclosure Date: September 26, 2024 (last updated October 08, 2024)
The goTenna pro series does not encrypt the callsigns of its users. These callsigns reveal information about the users and can also be leveraged for other vulnerabilities.