Show filters
45 Total Results
Displaying 41-45 of 45
Sort by:
Attacker Value
Unknown
CVE-2010-4548
Disclosure Date: December 16, 2010 (last updated October 04, 2023)
IBM Lotus Notes Traveler before 8.5.1.2 allows remote authenticated users to cause a denial of service (daemon crash) by accepting a meeting invitation with an iNotes client and then accepting this meeting invitation with an iPhone client.
0
Attacker Value
Unknown
CVE-2009-5034
Disclosure Date: December 16, 2010 (last updated October 04, 2023)
IBM Lotus Notes Traveler before 8.5.0.2 allows remote authenticated users to cause a denial of service (memory consumption and daemon crash) by syncing a large volume of data, related to the launch of a new process to handle the data while the previous process is still operating on the data.
0
Attacker Value
Unknown
CVE-2010-0223
Disclosure Date: January 07, 2010 (last updated October 04, 2023)
Kingston DataTraveler BlackBox (DTBB), DataTraveler Secure Privacy Edition (DTSP), and DataTraveler Elite Privacy Edition (DTEP) USB flash drives do not prevent password replay attacks, which allows physically proximate attackers to access the cleartext drive contents by providing a key that was captured in a USB data stream at an earlier time.
0
Attacker Value
Unknown
CVE-2010-0221
Disclosure Date: January 07, 2010 (last updated October 04, 2023)
Kingston DataTraveler BlackBox (DTBB), DataTraveler Secure Privacy Edition (DTSP), and DataTraveler Elite Privacy Edition (DTEP) USB flash drives validate passwords with a program running on the host computer rather than the device hardware, which allows physically proximate attackers to access the cleartext drive contents via a modified program.
0
Attacker Value
Unknown
CVE-2010-0222
Disclosure Date: January 07, 2010 (last updated October 04, 2023)
Kingston DataTraveler BlackBox (DTBB), DataTraveler Secure Privacy Edition (DTSP), and DataTraveler Elite Privacy Edition (DTEP) USB flash drives use a fixed 256-bit key for obtaining access to the cleartext drive contents, which makes it easier for physically proximate attackers to read or modify data by determining and providing this key.
0