Логотип exploitDog
bind:CVE-2020-6627
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-6627

Количество 2

Количество 2

nvd логотип

CVE-2020-6627

около 3 лет назад

The web-management application on Seagate Central NAS STCG2000300, STCG3000300, and STCG4000300 devices allows OS command injection via mv_backend_launch in cirrus/application/helpers/mv_backend_helper.php by leveraging the "start" state and sending a check_device_name request.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-6q9w-5qvx-ggjm

около 3 лет назад

The web-management application on Seagate Central NAS STCG2000300, STCG3000300, and STCG4000300 devices allows OS command injection via mv_backend_launch in cirrus/application/helpers/mv_backend_helper.php by leveraging the "start" state and sending a check_device_name request.

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-6627

The web-management application on Seagate Central NAS STCG2000300, STCG3000300, and STCG4000300 devices allows OS command injection via mv_backend_launch in cirrus/application/helpers/mv_backend_helper.php by leveraging the "start" state and sending a check_device_name request.

CVSS3: 9.8
14%
Средний
около 3 лет назад
github логотип
GHSA-6q9w-5qvx-ggjm

The web-management application on Seagate Central NAS STCG2000300, STCG3000300, and STCG4000300 devices allows OS command injection via mv_backend_launch in cirrus/application/helpers/mv_backend_helper.php by leveraging the "start" state and sending a check_device_name request.

CVSS3: 9.8
14%
Средний
около 3 лет назад

Уязвимостей на страницу