Severity High Analysis Summary A remote, unauthenticated attacker may be able to compromise a vulnerable VPN server. The attacker may be able to gain access to […]
Severity Medium Analysis Summary In a Point-to-Multipoint (P2MP) Label Switched Path (LSP) scenario, an uncontrolled resource consumption vulnerability in the Routing Protocol Daemon (RPD) in Juniper […]
Severity Medium Analysis Summary The vulnerability is due to improper validation of user-supplied input by the web-based management interface of the affected software. An attacker could […]
Severity High Analysis Summary Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. Impact Execute code or trigger […]
Severity High Analysis Summary CVE-2020-6377 (Use after free in audio) Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by […]
Severity High Analysis Summary Cisco patched three authentication bypass bugs tied to its DCNM platform used to manage NX-OS. The three critical vulnerabilities impact a key […]
Severity High Analysis Summary Five vulnerabilities in Google Chrome that stem from SQLite could enable remote code execution. Dubbed Magellan 2.0, the flaws exist in the […]
Severity High Analysis Summary NVIDIA GeForce Experience contains a vulnerability when GameStream is enabled in which an attacker with local system access can corrupt a system […]