Logitech Connection Utility Software : CVE security vulnerabilities, versions and detailed reports
You can generate a custom RSS feed or an embedable vulnerability list widget or a json API call url.
(Feeds or widget will contain only vulnerabilities of this product)
Selected vulnerability types are OR’ed. If you don’t select any criteria “all” CVE entries will be returned
Vulnerabilities with exploits
Code execution
Overflows
Cross Site Request Forgery
File inclusion
Gain privilege
Sql injection
Cross site scripting
Directory traversal
Memory corruption
Http response splitting
Bypass something
Gain information
Denial of service
Order By:
CVSS score >= :
Log in or
sign up for an account
to create a custom feed or widget
(Feeds or widget will contain only vulnerabilities of this product)
Mục lục bài viết
Vulnerability Trends Over Time
Year
# of Vulnerabilities
DoS
Code Execution
Overflow
Memory Corruption
Sql Injection
XSS
Directory Traversal
Http Response Splitting
Bypass something
Gain Information
Gain Privileges
CSRF
File Inclusion
# of exploits
2018
1
1
Total
1
1
% Of All
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
100.0
0.0
0.0
Warning : Vulnerabilities with publish dates before 1999 are not included in this table and chart.
(Because there are not many of them and they make the page look bad; and they may not be actually published in those years.)
Vulnerabilities By Year
1
2018 1
Vulnerabilities By Type
1
Gain Privilege 1
Click on legend names to show/hide lines for vulnerability types
If you can’t see MS Office style charts above then it’s time to upgrade your browser!
P.S: Charts may not be displayed properly especially if there are only a few data points.
This page lists vulnerability statistics for all versions of
Logitech Connection Utility Software.
Vulnerability statistics provide a quick overview for security vulnerabilities of this software.
You can view versions of this product or security vulnerabilities related to
Logitech Connection Utility Software.