|ID||CVSS||Summary||Last (major) update||Published|
Kaseya VSA RMM before R9.3 184.108.40.206, R9.4 before 220.127.116.11, and R9.5 before 18.104.22.168 allows unprivileged remote attackers to execute PowerShell payloads on all managed devices. In January 2018, attackers actively exploited this vulnerability in the wil
|05-02-2019 - 01:29||05-02-2019 - 01:29|
It is possible to exploit a Time of Check & Time of Use (TOCTOU) vulnerability by winning a race condition when Kaseya Virtual System Administrator agent 22.214.171.124 and earlier tries to execute its binaries from working and/or temporary folders. Succes
|26-03-2018 - 17:29||26-03-2018 - 17:29|
Directory traversal vulnerability in Kaseya Virtual System Administrator (VSA) 7.x before 126.96.36.199, 8.x before 188.8.131.52, 9.0 before 184.108.40.206, and 9.1 before 220.127.116.11 allows remote authenticated users to read arbitrary files via a crafted HTTP request.
|22-07-2015 - 07:21||20-07-2015 - 19:59|
Open redirect vulnerability in Kaseya Virtual System Administrator (VSA) 7.x before 18.104.22.168, 8.x before 22.214.171.124, 9.0 before 126.96.36.199, and 9.1 before 188.8.131.52 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attac
|21-07-2015 - 17:11||20-07-2015 - 19:59|
kapfa.sys in Kaseya Virtual System Administrator (VSA) 6.5 before 184.108.40.206 and 7.0 before 220.127.116.11 allows local users to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors.
|15-07-2014 - 11:26||14-07-2014 - 17:55|