CVE-2025-21611
- EPSS 0.39%
- Veröffentlicht 06.01.2025 16:15:31
- Zuletzt bearbeitet 19.08.2025 13:17:13
tgstation-server is a production scale tool for BYOND server management. Prior to 6.12.3, roles used to authorize API methods were incorrectly OR'd instead of AND'ed with the role used to determine if a user was enabled. This allows enabled users acc...
CVE-2024-41799
- EPSS 7.02%
- Veröffentlicht 29.07.2024 15:15:16
- Zuletzt bearbeitet 19.08.2025 14:35:40
tgstation-server is a production scale tool for BYOND server management. Prior to 6.8.0, low permission users using the "Set .dme Path" privilege could potentially set malicious .dme files existing on the host machine to be compiled and executed. The...
CVE-2023-34243
- EPSS 0.23%
- Veröffentlicht 08.06.2023 22:15:09
- Zuletzt bearbeitet 21.11.2024 08:06:50
TGstation is a toolset to manage production BYOND servers. In affected versions if a Windows user was registered in tgstation-server (TGS), an attacker could discover their username by brute-forcing the login endpoint with an invalid password. When a...
CVE-2023-33198
- EPSS 0.2%
- Veröffentlicht 30.05.2023 05:15:12
- Zuletzt bearbeitet 21.11.2024 08:05:06
tgstation-server is a production scale tool for BYOND server management. The DreamMaker API (DMAPI) chat channel cache can possibly be poisoned by a tgstation-server (TGS) restart and reattach. This can result in sending chat messages to one of any o...
CVE-2023-32687
- EPSS 0.2%
- Veröffentlicht 29.05.2023 21:15:10
- Zuletzt bearbeitet 21.11.2024 08:03:51
tgstation-server is a toolset to manage production BYOND servers. Starting in version 4.7.0 and prior to 5.12.1, instance users with the list chat bots permission can read chat bot connections strings without the associated permission. This issue is ...
CVE-2020-16136
- EPSS 1.58%
- Veröffentlicht 31.07.2020 16:15:11
- Zuletzt bearbeitet 21.11.2024 05:06:49
In tgstation-server 4.4.0 and 4.4.1, an authenticated user with permission to download logs can download any file on the server machine (accessible by the owner of the server process) via directory traversal ../ sequences in /Administration/Logs/ req...
CVE-2018-17107
- EPSS 0.52%
- Veröffentlicht 24.09.2018 22:29:01
- Zuletzt bearbeitet 21.11.2024 03:53:53
In Tgstation tgstation-server 3.2.4.0 through 3.2.1.0 (fixed in 3.2.5.0), active logins would be cached, allowing subsequent logins to succeed with any username or password.