Search
Search Results (5 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 | 
|---|---|---|---|---|
| CVE-2023-45281 | 1 Spaceapplications | 1 Yamcs | 2024-11-21 | 6.1 Medium | 
| An issue in Yamcs 5.8.6 allows attackers to obtain the session cookie via upload of crafted HTML file. | ||||
| CVE-2023-45280 | 1 Spaceapplications | 1 Yamcs | 2024-11-21 | 5.4 Medium | 
| Yamcs 5.8.6 allows XSS (issue 2 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload an HTML file containing arbitrary JavaScript and then navigate to it. Once the user opens the file, the browser will execute the arbitrary JavaScript. | ||||
| CVE-2023-45279 | 1 Spaceapplications | 1 Yamcs | 2024-11-21 | 5.4 Medium | 
| Yamcs 5.8.6 allows XSS (issue 1 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload a display referencing a malicious JavaScript file to the bucket. The user can then open the uploaded display by selecting Telemetry from the menu and navigating to the display. | ||||
| CVE-2023-45278 | 1 Spaceapplications | 1 Yamcs | 2024-11-21 | 9.1 Critical | 
| Directory Traversal vulnerability in the storage functionality of the API in Yamcs 5.8.6 allows attackers to delete arbitrary files via crafted HTTP DELETE request. | ||||
| CVE-2023-45277 | 1 Spaceapplications | 1 Yamcs | 2024-11-21 | 7.5 High | 
| Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files. | ||||
                            
                                
                                
                                    Page 1 of 1.