971
|
- |
|
-
|
-
|
The goTenna Pro broadcast key name is always sent unencrypted and could reveal the location of operation.
|
CWE-201
Insertion of Sensitive Information Into Sent Data
|
CVE-2024-47128
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
972
|
- |
|
-
|
-
|
In the goTenna Pro there is a vulnerability that makes it possible to inject any custom message with any GID and Callsign using a software defined radio in existing gotenna mesh networks. This vulner…
|
CWE-1390
Weak Authentication
|
CVE-2024-47127
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
973
|
- |
|
-
|
-
|
The goTenna Pro series does not use SecureRandom when generating its cryptographic keys. The random function in use is not suitable for cryptographic use.
|
-
|
CVE-2024-47126
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
974
|
- |
|
-
|
-
|
The goTenna Pro series does not authenticate public keys which allows an unauthenticated attacker to intercept and manipulate messages.
|
CWE-923
Improper Restriction of Communication Channel to Intended Endpoints
|
CVE-2024-47125
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
975
|
- |
|
-
|
-
|
The goTenna pro series does not encrypt the callsigns of its users. These callsigns reveal information about the users and can also be leveraged for other vulnerabilities.
|
CWE-319
Cleartext Transmission of Sensitive Information
|
CVE-2024-47124
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
976
|
- |
|
-
|
-
|
The goTenna Pro series use AES CTR mode for short, encrypted messages without any additional integrity checking mechanisms. This leaves messages malleable to any attacker that can access the message.
|
CWE-353
Missing Support for Integrity Check
|
CVE-2024-47123
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
977
|
- |
|
-
|
-
|
In the goTenna Pro application, the encryption keys are stored along with a static IV on the device. This allows for complete decryption of keys stored on the device. This allows an attacker to decry…
|
CWE-922
Insecure Storage of Sensitive Information
|
CVE-2024-47122
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
978
|
- |
|
-
|
-
|
The goTenna Pro series uses a weak password for the QR broadcast message. If the QR broadcast message is captured over RF it is possible to decrypt it and use it to decrypt all future and past messag…
|
CWE-521
Weak Password Requirements
|
CVE-2024-47121
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
979
|
- |
|
-
|
-
|
LayUI is a native minimalist modular Web UI component library. Versions prior to 2.9.17 have a DOM Clobbering vulnerability that can lead to Cross-site Scripting (XSS) on web pages where attacker-con…
|
-
|
CVE-2024-47075
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
980
|
- |
|
-
|
-
|
Monica AI Assistant desktop application v2.3.0 is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor. A prompt injection allows an attacker to modify chatbot answer with an unlo…
|
-
|
CVE-2024-45989
|
2024-09-30 21:46 |
2024-09-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|