Vulnerabilities > Fujitsu
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-11-30 | CVE-2020-29127 | Improper Authentication vulnerability in Fujitsu Eternus Storage Dx200 S4 Firmware An issue was discovered on Fujitsu Eternus Storage DX200 S4 devices through 2020-11-25. | 10.0 |
2020-02-07 | CVE-2019-13163 | Inadequate Encryption Strength vulnerability in Fujitsu products The Fujitsu TLS library allows a man-in-the-middle attack. | 4.3 |
2019-10-24 | CVE-2019-18201 | Missing Encryption of Sensitive Data vulnerability in Fujitsu Lx390 Firmware An issue was discovered on Fujitsu Wireless Keyboard Set LX390 GK381 devices. | 5.0 |
2019-10-24 | CVE-2019-18200 | Unspecified vulnerability in Fujitsu Lx390 Firmware An issue was discovered on Fujitsu Wireless Keyboard Set LX390 GK381 devices. | 10.0 |
2019-10-24 | CVE-2019-18199 | Authentication Bypass BY Capture-Replay vulnerability in Fujitsu Lx390 Firmware An issue was discovered on Fujitsu Wireless Keyboard Set LX390 GK381 devices. | 6.9 |
2019-06-06 | CVE-2019-12762 | Xiaomi Mi 5s Plus devices allow attackers to trigger touchscreen anomalies via a radio signal between 198 kHz and 203 kHz, as demonstrated by a transmitter and antenna hidden just beneath the surface of a coffee-shop table, aka Ghost Touch. | 1.9 |
2019-05-17 | CVE-2018-16156 | Untrusted Search Path vulnerability in Fujitsu Paperstream IP (Twain) 1.42.0.5685 In PaperStream IP (TWAIN) 1.42.0.5685 (Service Update 7), the FJTWSVIC service running with SYSTEM privilege processes unauthenticated messages received over the FjtwMkic_Fjicube_32 named pipe. | 7.2 |
2019-03-15 | CVE-2019-9835 | Unspecified vulnerability in Fujitsu Gk900 Firmware and Lx901 Firmware The receiver (aka bridge) component of Fujitsu Wireless Keyboard Set LX901 GK900 devices allows Keystroke Injection. low complexity fujitsu | 5.8 |
2018-07-24 | CVE-2017-3210 | Configuration vulnerability in multiple products Applications developed using the Portrait Display SDK, versions 2.30 through 2.34, default to insecure configurations which allow arbitrary code execution. | 7.2 |
2017-09-15 | CVE-2017-10855 | Untrusted Search Path vulnerability in Fujitsu Fence-Explorer Untrusted search path vulnerability in FENCE-Explorer for Windows V8.4.1 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | 9.3 |