Vulnerabilities (CVE)

Filtered by vendor Iomega Subscribe
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2012-2283 2 Emc, Iomega 4 Lifeline, Home Media Network Hard Drive, Iconnect and 1 more 2024-11-21 5.5 MEDIUM N/A
The Iomega Home Media Network Hard Drive with EMC Lifeline firmware before 2.104, Home Media Network Hard Drive Cloud Edition with EMC Lifeline firmware before 3.2.3.15290, iConnect with EMC Lifeline firmware before 2.5.26.18966, and StorCenter with EMC Lifeline firmware before 2.0.18.23122, 2.1.x before 2.1.42.18967, and 3.x before 3.2.3.15290 allow remote authenticated users to read or modify data on arbitrary remote shares via unspecified vectors.
CVE-2009-2367 1 Iomega 2 Storcenter Pro, Storcenter Pro Firmware 2024-11-21 7.5 HIGH 9.8 CRITICAL
cgi-bin/makecgi-pro in Iomega StorCenter Pro generates predictable session IDs, which allows remote attackers to hijack active sessions and gain privileges via brute force guessing attacks on the session_id parameter.
CVE-2002-1955 1 Iomega 1 Nas 2024-11-20 5.0 MEDIUM N/A
Iomega NAS A300U uses cleartext LANMAN authentication when mounting CIFS/SMB drives, which allows remote attackers to perform a man-in-the-middle attack.
CVE-2002-1949 1 Iomega 2 Nas A300u, Nas A300u Firmware 2024-11-20 5.0 MEDIUM 7.5 HIGH
The Network Attached Storage (NAS) Administration Web Page for Iomega NAS A300U transmits passwords in cleartext, which allows remote attackers to sniff the administrative password.
CVE-2002-1863 1 Iomega 1 Network Attached Storage 2024-11-20 4.6 MEDIUM N/A
Iomega Network Attached Storage (NAS) A300U, and possibly other models, does not allow the FTP service to be disabled, which allows local users to access home directories via FTP even when access to all shared directories have been disabled.
CVE-2001-0110 1 Iomega 1 Jazip 2024-11-20 7.2 HIGH N/A
Buffer overflow in jaZip Zip/Jaz drive manager allows local users to gain root privileges via a long DISPLAY environmental variable.
CVE-1999-1174 1 Iomega 1 Zip 100 Mb Drive 2024-11-20 4.6 MEDIUM N/A
ZIP drive for Iomega ZIP-100 disks allows attackers with physical access to the drive to bypass password protection by inserting a known disk with a known password, waiting for the ZIP drive to power down, manually replacing the known disk with the target disk, and using the known password to access the target disk.