5.10.9
8 years ago
14 days ago
Known vulnerabilities in the org.yamcs:yamcs-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Improper Restriction of Rendered UI Layers or Frames allowing an attacker to create a website that would encourage the user to perform specific actions. This type of vulnerability can have an exceptionally high impact on control systems, such as this package. How to fix Improper Restriction of Rendered UI Layers or Frames? There is no fixed version for | [0,) |
Affected versions of this package are vulnerable to Information Exposure via the How to fix Information Exposure? Upgrade | [,5.8.8) |
Affected versions of this package are vulnerable to Path Traversal in the storage functionality of the API. An attacker can escape the base directory of the buckets, freely navigate system directories, and read arbitrary files. How to fix Path Traversal? Upgrade | [,5.8.8) |
Affected versions of this package are vulnerable to Path Traversal in the storage functionality of the API. An attacker can delete arbitrary files by sending a crafted How to fix Path Traversal? Upgrade | [,5.8.8) |
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when uploading a display referencing a malicious JavaScript file to the bucket is possible. How to fix Cross-site Scripting (XSS)? Upgrade | [,5.8.7) |
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Bucket storage mechanism. An attacker can execute arbitrary JavaScript by uploading an HTML file containing the script and then navigating to it. This is only exploitable if the user opens the uploaded file. How to fix Cross-site Scripting (XSS)? Upgrade | [,5.8.7) |