Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pulsesecure pulse secure desktop client vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2020-8239
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack. This fix also requires Server Side Upgrade due to Standalone Host Checker Client (Windows) and Windows PDC.
Pulsesecure Pulse Secure Desktop Client
Pulsesecure Pulse Secure Desktop Client 9.1
2 Github repositories
8.8
CVSSv3
CVE-2020-8254
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 has Remote Code Execution (RCE) if users can be convinced to connect to a malicious server. This vulnerability only affects Windows PDC.To improve the security of connections between Pulse clients and Pulse Connect Sec...
Pulsesecure Pulse Secure Desktop Client
Pulsesecure Pulse Secure Desktop Client 9.1
1 Github repository
8.1
CVSSv3
CVE-2019-11213
In Pulse Secure Pulse Desktop Client and Network Connect, an attacker could access session tokens to replay and spoof sessions, and as a result, gain unauthorized access as an end user, a related issue to CVE-2019-1573. (The endpoint would need to be already compromised for explo...
Pulsesecure Pulse Secure Desktop Client
Pulsesecure Pulse Connect Secure
Ivanti Connect Secure
7.8
CVSSv3
CVE-2020-8248
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local malicious users to escalate privilege.
Pulsesecure Pulse Secure Desktop Client
Pulsesecure Pulse Secure Desktop Client 9.1
1 Github repository
7.8
CVSSv3
CVE-2020-8249
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local malicious users to perform buffer overflow.
Pulsesecure Pulse Secure Desktop Client
Pulsesecure Pulse Secure Desktop Client 9.1
1 Github repository
7.8
CVSSv3
CVE-2020-8240
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 allows a restricted user on an endpoint machine can use system-level privileges if the Embedded Browser is configured with Credential Provider. This vulnerability only affects Windows PDC if the Embedded Browser is con...
Pulsesecure Pulse Secure Desktop Client
Pulsesecure Pulse Secure Desktop Client 9.1
7.8
CVSSv3
CVE-2020-8250
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local malicious users to escalate privilege.
Pulsesecure Pulse Secure Desktop Client
Pulsesecure Pulse Secure Desktop Client 9.1
1 Github repository
7.8
CVSSv3
CVE-2018-15865
The Pulse Secure Desktop (macOS) has a Privilege Escalation Vulnerability.
Pulsesecure Pulse Secure Desktop Client 5.1r3.2
Pulsesecure Pulse Secure Desktop Client 5.1r4.0
Pulsesecure Pulse Secure Desktop Client 5.1r5.0
Pulsesecure Pulse Secure Desktop Client 5.1r5.1
Pulsesecure Pulse Secure Desktop Client 5.3r4.2
Pulsesecure Pulse Secure Desktop Client 5.3r5
Pulsesecure Pulse Secure Desktop Client 5.3r5.2
Pulsesecure Pulse Secure Desktop Client 5.1r1.0
Pulsesecure Pulse Secure Desktop Client 5.1r9.1
Pulsesecure Pulse Secure Desktop Client 5.1r10.0
Pulsesecure Pulse Secure Desktop Client 5.1rx
Pulsesecure Pulse Secure Desktop Client 5.3r1
Pulsesecure Pulse Secure Desktop Client 5.1r2.0
Pulsesecure Pulse Secure Desktop Client 5.1r3.1
Pulsesecure Pulse Secure Desktop Client 5.1r6.0
Pulsesecure Pulse Secure Desktop Client 5.1r8.0
Pulsesecure Pulse Secure Desktop Client 5.3r2
Pulsesecure Pulse Secure Desktop Client 5.3r4
Pulsesecure Pulse Secure Desktop Client 5.1r1.1
Pulsesecure Pulse Secure Desktop Client 5.1r3.0
Pulsesecure Pulse Secure Desktop Client 5.1r7.0
Pulsesecure Pulse Secure Desktop Client 5.1r9.0
7.5
CVSSv3
CVE-2020-8241
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 could allow the malicious user to perform a MITM Attack if end users are convinced to connect to a malicious server.
Pulsesecure Pulse Secure Desktop Client
Pulsesecure Pulse Secure Desktop Client 9.1
2 Github repositories
7.5
CVSSv3
CVE-2018-20812
An information exposure issue where IPv6 DNS traffic would be sent outside of the VPN tunnel (when Traffic Enforcement was enabled) exists in Pulse Secure Pulse Secure Desktop 9.0R1 and below. This is applicable only to dual-stack (IPv4/IPv6) endpoints.
Pulsesecure Pulse Secure Desktop Client 4.0
Pulsesecure Pulse Secure Desktop Client 5.1
Pulsesecure Pulse Secure Desktop Client 5.1r
Pulsesecure Pulse Secure Desktop Client 5.3
Pulsesecure Pulse Secure Desktop Client 9.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »