2 results (0.003 seconds)

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

Logitech iTouch keyboards allows attackers with physical access to the system to bypass the screen locking function and execute user-defined commands that have been assigned to a button. • http://online.securityfocus.com/archive/1/270702 http://www.securityfocus.com/bid/4662 https://exchange.xforce.ibmcloud.com/vulnerabilities/8994 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 1

A long 'synch' delay in Logitech wireless mice and keyboard receivers allows a remote attacker to hijack connections via a man-in-the-middle attack. • http://www.securityfocus.com/archive/1/185003 http://www.securityfocus.com/archive/1/3B0A36C8.E9D8610%40daten-treuhand.de http://www.securityfocus.com/bid/2738 https://exchange.xforce.ibmcloud.com/vulnerabilities/6562 •