Filtered by vendor Spaceapplications Subscriptions
Total 8 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-47311 1 Spaceapplications 1 Yacms 2024-11-21 6.1 Medium
An issue in Yamcs 5.8.6 allows attackers to send aribitrary telelcommands in a Command Stack via Clickjacking.
CVE-2023-46471 1 Spaceapplications 1 Yacms 2024-11-21 5.4 Medium
Cross Site Scripting vulnerability in Space Applications Services Yamcs v.5.8.6 allows a remote attacker to execute arbitrary code via the text variable scriptContainer of the ScriptViewer.
CVE-2023-46470 1 Spaceapplications 1 Yacms 2024-11-21 5.4 Medium
Cross Site Scripting vulnerability in Space Applications Services Yamcs v.5.8.6 allows a remote attacker to execute arbitrary code via crafted telecommand in the timeline view of the ArchiveBrowser.
CVE-2023-45281 1 Spaceapplications 1 Yamcs 2024-11-21 6.1 Medium
An issue in Yamcs 5.8.6 allows attackers to obtain the session cookie via upload of crafted HTML file.
CVE-2023-45280 1 Spaceapplications 1 Yamcs 2024-11-21 5.4 Medium
Yamcs 5.8.6 allows XSS (issue 2 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload an HTML file containing arbitrary JavaScript and then navigate to it. Once the user opens the file, the browser will execute the arbitrary JavaScript.
CVE-2023-45279 1 Spaceapplications 1 Yamcs 2024-11-21 5.4 Medium
Yamcs 5.8.6 allows XSS (issue 1 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload a display referencing a malicious JavaScript file to the bucket. The user can then open the uploaded display by selecting Telemetry from the menu and navigating to the display.
CVE-2023-45278 1 Spaceapplications 1 Yamcs 2024-11-21 9.1 Critical
Directory Traversal vulnerability in the storage functionality of the API in Yamcs 5.8.6 allows attackers to delete arbitrary files via crafted HTTP DELETE request.
CVE-2023-45277 1 Spaceapplications 1 Yamcs 2024-11-21 7.5 High
Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files.