Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 27 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Butterflyeffectpte
Butterflyeffectpte monica |
|
| Weaknesses | CWE-77 | |
| CPEs | cpe:2.3:a:butterflyeffectpte:monica:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Butterflyeffectpte
Butterflyeffectpte monica |
|
| Metrics |
cvssV3_1
|
Thu, 26 Sep 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Monica AI Assistant desktop application v2.3.0 is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor. A prompt injection allows an attacker to modify chatbot answer with an unloaded image that exfiltrates the user's sensitive chat data of the current session to a malicious third-party or attacker-controlled server. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-27T14:55:41.032Z
Reserved: 2024-09-11T00:00:00.000Z
Link: CVE-2024-45989
Updated: 2024-09-27T14:53:39.946Z
Status : Deferred
Published: 2024-09-26T18:15:08.667
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-45989
No data.
OpenCVE Enrichment
No data.