Vulnerabilities > Logitech > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-09-10 | CVE-2024-8258 | Code Injection vulnerability in Logitech Logi Options+ Improper Control of Generation of Code ('Code Injection') in Electron Fuses in Logitech Options Plus version 1.60.496306 on macOS allows attackers to execute arbitrary code via insecure Electron Fuses configuration. | 7.8 |
2022-08-19 | CVE-2022-36263 | Unspecified vulnerability in Logitech Streamlabs Desktop 1.9.0 StreamLabs Desktop Application 1.9.0 is vulnerable to Incorrect Access Control via obs64.exe. | 7.3 |
2022-05-03 | CVE-2022-0916 | Cross-Site Request Forgery (CSRF) vulnerability in Logitech Options An issue was discovered in Logitech Options. | 8.8 |
2022-04-12 | CVE-2022-0915 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Logitech Sync There is a Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability in Logitech Sync for Windows prior to 2.4.574. | 7.0 |
2019-06-07 | CVE-2019-12506 | Cleartext Transmission of Sensitive Information vulnerability in Logitech R700 Laser Presentation Remote Firmware Wd802Xm/Wd904Xm Due to unencrypted and unauthenticated data communication, the wireless presenter Logitech R700 Laser Presentation Remote R-R0010 is prone to keystroke injection attacks. | 8.8 |
2018-12-20 | CVE-2018-15722 | OS Command Injection vulnerability in Logitech Harmony HUB Firmware The Logitech Harmony Hub before version 4.15.206 is vulnerable to OS command injection via the time update request. | 8.1 |
2018-07-26 | CVE-2018-0621 | Untrusted Search Path vulnerability in Logitech Connection Utility Software 2.00.3/2.20.28/2.30.6 Untrusted search path vulnerability in LOGICOOL CONNECTION UTILITY SOFTWARE versions before 2.30.9 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | 7.8 |
2018-07-26 | CVE-2018-0620 | Untrusted Search Path vulnerability in Logitech Game Software Untrusted search path vulnerability in LOGICOOL Game Software versions before 8.87.116 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | 7.8 |