Vulnerabilities > Seagate > NAS OS > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-05-13 | CVE-2018-12304 | Cross-site Scripting vulnerability in Seagate NAS OS 4.3.15.1 Cross-site scripting in Application Manager in Seagate NAS OS version 4.3.15.1 allows attackers to execute JavaScript via multiple application metadata fields: Short Description, Publisher Name, Publisher Contact, or Website URL. | 4.3 |
2019-05-13 | CVE-2018-12302 | Cross-site Scripting vulnerability in Seagate NAS OS 4.3.15.1 Missing HTTPOnly flag on session cookies in the Seagate NAS OS version 4.3.15.1 web application allows attackers to steal session tokens via cross-site scripting. | 4.3 |
2019-05-13 | CVE-2018-12301 | Information Exposure vulnerability in Seagate NAS OS 4.3.15.1 Unvalidated URL in Download Manager in Seagate NAS OS version 4.3.15.1 allows attackers to access the loopback interface via a Download URL of 127.0.0.1 or localhost. | 5.0 |
2019-05-13 | CVE-2018-12300 | Open Redirect vulnerability in Seagate NAS OS 4.3.15.1 Arbitrary Redirect in echo-server.html in Seagate NAS OS version 4.3.15.1 allows attackers to disclose information in the Referer header via the 'state' URL parameter. | 5.8 |
2019-05-13 | CVE-2018-12298 | Path Traversal vulnerability in Seagate NAS OS 4.3.15.1 Directory Traversal in filebrowser in Seagate NAS OS 4.3.15.1 allows attackers to read files within the application's container via a URL path. | 5.0 |
2019-05-13 | CVE-2018-12297 | Cross-site Scripting vulnerability in Seagate NAS OS 4.3.15.1 Cross-site scripting in API error pages in Seagate NAS OS version 4.3.15.1 allows attackers to execute JavaScript via URL path names. | 4.3 |
2019-05-13 | CVE-2018-12296 | Incorrect Permission Assignment for Critical Resource vulnerability in Seagate NAS OS 4.3.15.1 Insufficient access control in /api/external/7.0/system.System.get_infos in Seagate NAS OS version 4.3.15.1 allows attackers to obtain information about the NAS without authentication via empty POST requests. | 5.0 |