Total
5 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2023-45281 | 1 Spaceapplications | 1 Yamcs | 2024-11-21 | N/A | 6.1 MEDIUM |
| An issue in Yamcs 5.8.6 allows attackers to obtain the session cookie via upload of crafted HTML file. | |||||
| CVE-2023-45280 | 1 Spaceapplications | 1 Yamcs | 2024-11-21 | N/A | 5.4 MEDIUM |
| Yamcs 5.8.6 allows XSS (issue 2 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload an HTML file containing arbitrary JavaScript and then navigate to it. Once the user opens the file, the browser will execute the arbitrary JavaScript. | |||||
| CVE-2023-45279 | 1 Spaceapplications | 1 Yamcs | 2024-11-21 | N/A | 5.4 MEDIUM |
| Yamcs 5.8.6 allows XSS (issue 1 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload a display referencing a malicious JavaScript file to the bucket. The user can then open the uploaded display by selecting Telemetry from the menu and navigating to the display. | |||||
| CVE-2023-45278 | 1 Spaceapplications | 1 Yamcs | 2024-11-21 | N/A | 9.1 CRITICAL |
| Directory Traversal vulnerability in the storage functionality of the API in Yamcs 5.8.6 allows attackers to delete arbitrary files via crafted HTTP DELETE request. | |||||
| CVE-2023-45277 | 1 Spaceapplications | 1 Yamcs | 2024-11-21 | N/A | 7.5 HIGH |
| Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files. | |||||
