Vulnerabilities
Vulnerable Software
Seagate:  >> Nas Os  Security Vulnerabilities
SQL injection in folderViewSpecific.psp in Seagate NAS OS version 4.3.15.1 allows attackers to execute arbitrary SQL commands via the dirId URL parameter.
CVSS Score
9.8
EPSS Score
0.003
Published
2019-05-13
Insufficient access control in /api/external/7.0/system.System.get_infos in Seagate NAS OS version 4.3.15.1 allows attackers to obtain information about the NAS without authentication via empty POST requests.
CVSS Score
7.5
EPSS Score
0.602
Published
2019-05-13
Cross-site scripting in API error pages in Seagate NAS OS version 4.3.15.1 allows attackers to execute JavaScript via URL path names.
CVSS Score
6.1
EPSS Score
0.002
Published
2019-05-13
Directory Traversal in filebrowser in Seagate NAS OS 4.3.15.1 allows attackers to read files within the application's container via a URL path.
CVSS Score
7.5
EPSS Score
0.004
Published
2019-05-13
Cross-site scripting in filebrowser in Seagate NAS OS version 4.3.15.1 allows attackers to execute JavaScript via uploaded file names.
CVSS Score
5.4
EPSS Score
0.002
Published
2019-05-13
Arbitrary Redirect in echo-server.html in Seagate NAS OS version 4.3.15.1 allows attackers to disclose information in the Referer header via the 'state' URL parameter.
CVSS Score
6.1
EPSS Score
0.135
Published
2019-05-13
Unvalidated URL in Download Manager in Seagate NAS OS version 4.3.15.1 allows attackers to access the loopback interface via a Download URL of 127.0.0.1 or localhost.
CVSS Score
7.5
EPSS Score
0.003
Published
2019-05-13
Missing HTTPOnly flag on session cookies in the Seagate NAS OS version 4.3.15.1 web application allows attackers to steal session tokens via cross-site scripting.
CVSS Score
6.1
EPSS Score
0.002
Published
2019-05-13
Cross-site scripting in filebrowser in Seagate NAS OS version 4.3.15.1 allows attackers to execute JavaScript via directory names.
CVSS Score
5.4
EPSS Score
0.002
Published
2019-05-13
Cross-site scripting in Application Manager in Seagate NAS OS version 4.3.15.1 allows attackers to execute JavaScript via multiple application metadata fields: Short Description, Publisher Name, Publisher Contact, or Website URL.
CVSS Score
6.1
EPSS Score
0.002
Published
2019-05-13


Contact Us

Shodan ® - All rights reserved