Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pulsesecure pulse secure desktop client 9.0r1 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2018-20812
An information exposure issue where IPv6 DNS traffic would be sent outside of the VPN tunnel (when Traffic Enforcement was enabled) exists in Pulse Secure Pulse Secure Desktop 9.0R1 and below. This is applicable only to dual-stack (IPv4/IPv6) endpoints.
Pulsesecure Pulse Secure Desktop Client 4.0
Pulsesecure Pulse Secure Desktop Client 5.1
Pulsesecure Pulse Secure Desktop Client 5.1r
Pulsesecure Pulse Secure Desktop Client 5.3
Pulsesecure Pulse Secure Desktop Client 9.0
7.2
CVSSv2
CVE-2018-7572
Pulse Secure Client 9.0R1 and 5.3RX prior to 5.3R5, when configured to authenticate VPN users during Windows Logon, can allow malicious users to bypass Windows authentication and execute commands on the system with the privileges of Pulse Secure Client. The attacker must interrup...
Pulsesecure Pulse Secure Desktop 5.3r1.0
Pulsesecure Pulse Secure Desktop 5.3r1.1
Pulsesecure Pulse Secure Desktop 5.3r2.0
Pulsesecure Pulse Secure Desktop 5.3r3.0
Pulsesecure Pulse Secure Desktop 5.3r4.0
Pulsesecure Pulse Secure Desktop 5.3r4.1
Pulsesecure Pulse Secure Desktop 9.0r1.0
Pulsesecure Pulse Secure Desktop 5.3rx
Pulsesecure Pulse Secure Desktop 5.3r4.2
2.1
CVSSv2
CVE-2018-15749
The Pulse Secure Desktop (macOS) 5.3RX prior to 5.3R5 and 9.0R1 has a Format String Vulnerability.
Pulsesecure Pulse Secure Desktop Client 9.0r1
Pulsesecure Pulse Secure Desktop Client 5.3r1.1
Pulsesecure Pulse Secure Desktop Client 5.3r1
Pulsesecure Pulse Secure Desktop Client 5.3rx
Pulsesecure Pulse Secure Desktop Client 5.3r4.2
Pulsesecure Pulse Secure Desktop Client 5.3r4
Pulsesecure Pulse Secure Desktop Client 5.3r2
Pulsesecure Pulse Secure Desktop Client 5.3r4.1
Pulsesecure Pulse Secure Desktop Client 5.3r3
4.6
CVSSv2
CVE-2018-16261
In Pulse Secure Pulse Desktop Client 5.3RX prior to 5.3R5 and 9.0R1, there is a Privilege Escalation Vulnerability with Dynamic Certificate Trust.
Pulsesecure Pulse Secure Desktop Client 5.3r3
Pulsesecure Pulse Secure Desktop Client 5.3r2
Pulsesecure Pulse Secure Desktop Client 5.3r1.1
Pulsesecure Pulse Secure Desktop Client 5.3r1
Pulsesecure Pulse Secure Desktop Client 9.0r1
Pulsesecure Pulse Secure Desktop Client 5.3r4.1
Pulsesecure Pulse Secure Desktop Client 5.3r4.2
Pulsesecure Pulse Secure Desktop Client 5.3r4
Pulsesecure Pulse Secure Desktop Client 5.3rx
4.6
CVSSv2
CVE-2018-15726
The Pulse Secure Desktop (macOS) 5.3RX prior to 5.3R5 and 9.0R1 has a Privilege Escalation Vulnerability.
Pulsesecure Pulse Secure Desktop Client 5.3r1
Pulsesecure Pulse Secure Desktop Client 5.3rx
Pulsesecure Pulse Secure Desktop Client 9.0r1
Pulsesecure Pulse Secure Desktop Client 5.3r4.2
Pulsesecure Pulse Secure Desktop Client 5.3r4.1
Pulsesecure Pulse Secure Desktop Client 5.3r3
Pulsesecure Pulse Secure Desktop Client 5.3r1.1
Pulsesecure Pulse Secure Desktop Client 5.3r4
Pulsesecure Pulse Secure Desktop Client 5.3r2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started