Logitech iTouch keyboards allows attackers with physical access to the system to bypass the screen locking function and execute user-defined commands that have been assigned to a button.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2002-12-31 05:00
Updated : 2024-02-04 16:31
NVD link : CVE-2002-1722
Mitre link : CVE-2002-1722
CVE.ORG link : CVE-2002-1722
JSON object : View
Products Affected
logitech
- itouch_keyboard
- cordless_freedom_itouch_keyboard
- cordless_itouch_keyboard
CWE