Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
seagate wireless mobile storage vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2015-2874
Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie FUEL devices with firmware prior to 3.4.1.105 have a default password of root for the root account, which allows remote malicious users to obtain administrative access via a...
Seagate Wireless Plus Mobile Storage
Seagate Wireless Mobile Storage
Lacie Lac9000464u Firmware
Lacie Lac9000436u Firmware
Seagate Goflex Sattelite
8.3
CVSSv2
CVE-2015-2876
Unrestricted file upload vulnerability on Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie FUEL devices with firmware prior to 3.4.1.105 allows remote malicious users to execute arbitrary code by uploading a file to /media...
Lacie Lac9000436u Firmware
Lacie Lac9000464u Firmware
Seagate Wireless Plus Mobile Storage
Seagate Wireless Mobile Storage
Seagate Goflex Sattelite
7.8
CVSSv2
CVE-2015-2875
Absolute path traversal vulnerability on Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie FUEL devices with firmware prior to 3.4.1.105 allows remote malicious users to read arbitrary files via a full pathname in a downloa...
Seagate Goflex Sattelite
Seagate Wireless Plus Mobile Storage
Seagate Wireless Mobile Storage
Lacie Lac9000464u Firmware
Lacie Lac9000436u Firmware
NA
CVE-2015-28742
Seagate GoFlex Satellite Mobile Wireless Storage devices contain a hardcoded backdoor account. An attacker could use this account to remotely tamper with the underlying operating system when Telnet is enabled.
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started