Filtered by vendor Spaceapplications
Subscriptions
Filtered by product Yamcs
Subscriptions
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-45281 | 1 Spaceapplications | 1 Yamcs | 2024-11-21 | 6.1 Medium |
An issue in Yamcs 5.8.6 allows attackers to obtain the session cookie via upload of crafted HTML file. | ||||
CVE-2023-45280 | 1 Spaceapplications | 1 Yamcs | 2024-11-21 | 5.4 Medium |
Yamcs 5.8.6 allows XSS (issue 2 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload an HTML file containing arbitrary JavaScript and then navigate to it. Once the user opens the file, the browser will execute the arbitrary JavaScript. | ||||
CVE-2023-45279 | 1 Spaceapplications | 1 Yamcs | 2024-11-21 | 5.4 Medium |
Yamcs 5.8.6 allows XSS (issue 1 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload a display referencing a malicious JavaScript file to the bucket. The user can then open the uploaded display by selecting Telemetry from the menu and navigating to the display. | ||||
CVE-2023-45278 | 1 Spaceapplications | 1 Yamcs | 2024-11-21 | 9.1 Critical |
Directory Traversal vulnerability in the storage functionality of the API in Yamcs 5.8.6 allows attackers to delete arbitrary files via crafted HTTP DELETE request. | ||||
CVE-2023-45277 | 1 Spaceapplications | 1 Yamcs | 2024-11-21 | 7.5 High |
Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files. |
Page 1 of 1.