991
|
- |
|
-
|
-
|
Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to read arbitrary JSON files at attacker-chos…
|
CWE-35
Path Traversal: '.../...//'
|
CVE-2024-47170
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
992
|
- |
|
-
|
-
|
Agnai is an artificial-intelligence-agnostic multi-user, mult-bot roleplaying chat system. A vulnerability in versions prior to 1.0.330 permits attackers to upload arbitrary files to attacker-chosen …
|
CWE-434 CWE-35
Unrestricted Upload of File with Dangerous Type Path Traversal: '.../...//'
|
CVE-2024-47169
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
993
|
- |
|
-
|
-
|
The goTenna Pro series allows unauthenticated attackers to remotely update the local public keys used for P2P and Group messages.
|
CWE-306
Missing Authentication for Critical Function
|
CVE-2024-47130
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
994
|
- |
|
-
|
-
|
The goTenna Pro has a payload length vulnerability that makes it possible to tell the length of the payload regardless of the encryption used.
|
CWE-204
Response Discrepancy Information Exposure
|
CVE-2024-47129
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
995
|
- |
|
-
|
-
|
The goTenna Pro broadcast key name is always sent unencrypted and could reveal the location of operation.
|
CWE-201
Insertion of Sensitive Information Into Sent Data
|
CVE-2024-47128
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
996
|
- |
|
-
|
-
|
In the goTenna Pro there is a vulnerability that makes it possible to inject any custom message with any GID and Callsign using a software defined radio in existing gotenna mesh networks. This vulner…
|
CWE-1390
Weak Authentication
|
CVE-2024-47127
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
997
|
- |
|
-
|
-
|
The goTenna Pro series does not use SecureRandom when generating its cryptographic keys. The random function in use is not suitable for cryptographic use.
|
-
|
CVE-2024-47126
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
998
|
- |
|
-
|
-
|
The goTenna Pro series does not authenticate public keys which allows an unauthenticated attacker to intercept and manipulate messages.
|
CWE-923
Improper Restriction of Communication Channel to Intended Endpoints
|
CVE-2024-47125
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
999
|
- |
|
-
|
-
|
The goTenna pro series does not encrypt the callsigns of its users. These callsigns reveal information about the users and can also be leveraged for other vulnerabilities.
|
CWE-319
Cleartext Transmission of Sensitive Information
|
CVE-2024-47124
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
1000
|
- |
|
-
|
-
|
The goTenna Pro series use AES CTR mode for short, encrypted messages without any additional integrity checking mechanisms. This leaves messages malleable to any attacker that can access the message.
|
CWE-353
Missing Support for Integrity Check
|
CVE-2024-47123
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|