Lucene search

K
Tgstation13Tgstation-server*

5 matches found

CVE
CVE
added 2024/07/29 3:15 p.m.37 views

CVE-2024-41799

tgstation-server is a production scale tool for BYOND server management. Prior to 6.8.0, low permission users using the "Set .dme Path" privilege could potentially set malicious .dme files existing on the host machine to be compiled and executed. These .dme files could be uploaded via tgstation-ser...

8.4CVSS8.6AI score0.00476EPSS
CVE
CVE
added 2018/09/24 10:29 p.m.32 views

CVE-2018-17107

In Tgstation tgstation-server 3.2.4.0 through 3.2.1.0 (fixed in 3.2.5.0), active logins would be cached, allowing subsequent logins to succeed with any username or password.

9.8CVSS9.3AI score0.00519EPSS
CVE
CVE
added 2023/05/30 5:15 a.m.29 views

CVE-2023-33198

tgstation-server is a production scale tool for BYOND server management. The DreamMaker API (DMAPI) chat channel cache can possibly be poisoned by a tgstation-server (TGS) restart and reattach. This can result in sending chat messages to one of any of the configured IRC or Discord channels for the ...

7.5CVSS6.9AI score0.00157EPSS
CVE
CVE
added 2023/06/08 10:15 p.m.26 views

CVE-2023-34243

TGstation is a toolset to manage production BYOND servers. In affected versions if a Windows user was registered in tgstation-server (TGS), an attacker could discover their username by brute-forcing the login endpoint with an invalid password. When a valid Windows logon was found, a distinct respon...

5.8CVSS5.3AI score0.00185EPSS
CVE
CVE
added 2023/05/29 9:15 p.m.23 views

CVE-2023-32687

tgstation-server is a toolset to manage production BYOND servers. Starting in version 4.7.0 and prior to 5.12.1, instance users with the list chat bots permission can read chat bot connections strings without the associated permission. This issue is patched in version 5.12.1. As a workaround, remov...

7.7CVSS6.4AI score0.00157EPSS