Show filters
328,579 Total Results
Displaying 2,051-2,060 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown

CVE-2024-47174

Disclosure Date: September 26, 2024 (last updated September 27, 2024)
Nix is a package manager for Linux and other Unix systems. Starting in version 1.11 and prior to versions 2.18.8 and 2.24.8, `<nix/fetchurl.nix>` did not verify TLS certificates on HTTPS connections. This could lead to connection details such as full URLs or credentials leaking in case of a man-in-the-middle (MITM) attack. `<nix/fetchurl.nix>` is also known as the builtin derivation builder `builtin:fetchurl`. It's not to be confused with the evaluation-time function `builtins.fetchurl`, which was not affected by this issue. A user may be affected by the risk of leaking credentials if they have a `netrc` file for authentication, or rely on derivations with `impureEnvVars` set to use credentials from the environment. In addition, the commonplace trust-on-first-use (TOFU) technique of updating dependencies by specifying an invalid hash and obtaining it from a remote store was also vulnerable to a MITM injecting arbitrary store objects. This also applied to the impure derivations experi…
0
Attacker Value
Unknown

CVE-2024-47171

Disclosure Date: September 26, 2024 (last updated September 27, 2024)
Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to upload image files at attacker-chosen location on the server. This issue can lead to image file uploads to unauthorized or unintended directories, including overwriting of existing images which may be used for defacement. This does not affect `agnai.chat`, installations using S3-compatible storage, or self-hosting that is not publicly exposed. Version 1.0.330 fixes this vulnerability.
0
Attacker Value
Unknown

CVE-2024-47170

Disclosure Date: September 26, 2024 (last updated September 27, 2024)
Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to read arbitrary JSON files at attacker-chosen locations on the server. This issue can lead to unauthorized access to sensitive information and exposure of confidential configuration files. This only affects installations with `JSON_STORAGE` enabled which is intended to local/self-hosting only. Version 1.0.330 fixes this issue.
0
Attacker Value
Unknown

CVE-2024-47169

Disclosure Date: September 26, 2024 (last updated September 27, 2024)
Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to upload arbitrary files to attacker-chosen locations on the server, including JavaScript, enabling the execution of commands within those files. This issue could result in unauthorized access, full server compromise, data leakage, and other critical security threats. This does not affect `agnai.chat`, installations using S3-compatible storage, or self-hosting that is not publicly exposed. This does affect publicly hosted installs without S3-compatible storage. Version 1.0.330 fixes this vulnerability.
0
Attacker Value
Unknown

CVE-2024-47130

Disclosure Date: September 26, 2024 (last updated October 08, 2024)
The goTenna Pro series allows unauthenticated attackers to remotely update the local public keys used for P2P and Group messages.
Attacker Value
Unknown

CVE-2024-47129

Disclosure Date: September 26, 2024 (last updated October 08, 2024)
The goTenna Pro has a payload length vulnerability that makes it possible to tell the length of the payload regardless of the encryption used.
Attacker Value
Unknown

CVE-2024-47128

Disclosure Date: September 26, 2024 (last updated October 08, 2024)
The goTenna Pro broadcast key name is always sent unencrypted and could reveal the location of operation.
Attacker Value
Unknown

CVE-2024-47127

Disclosure Date: September 26, 2024 (last updated October 08, 2024)
In the goTenna Pro there is a vulnerability that makes it possible to inject any custom message with any GID and Callsign using a software defined radio in existing gotenna mesh networks. This vulnerability can be exploited if the device is being used in a unencrypted environment or if the cryptography has already been compromised.
Attacker Value
Unknown

CVE-2024-47126

Disclosure Date: September 26, 2024 (last updated October 08, 2024)
The goTenna Pro series does not use SecureRandom when generating its cryptographic keys. The random function in use is not suitable for cryptographic use.
Attacker Value
Unknown

CVE-2024-47125

Disclosure Date: September 26, 2024 (last updated October 08, 2024)
The goTenna Pro series does not authenticate public keys which allows an unauthenticated attacker to intercept and manipulate messages.