Vulnerabilities
Vulnerable Software
Logitech iTouch keyboards allows attackers with physical access to the system to bypass the screen locking function and execute user-defined commands that have been assigned to a button.
CVSS Score
4.6
EPSS Score
0.001
Published
2002-12-31
A long 'synch' delay in Logitech wireless mice and keyboard receivers allows a remote attacker to hijack connections via a man-in-the-middle attack.
CVSS Score
7.5
EPSS Score
0.009
Published
2001-10-18


Contact Us

Shodan ® - All rights reserved