Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pulsesecure pulse secure desktop client 5.3 vulnerabilities and exploits
(subscribe to this query)
614
VMScore
CVE-2020-13162
A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions before 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged users to run a Microsoft Installer executable with elevated privileges.
Pulsesecure Pulse Secure Desktop Client 9.1
Pulsesecure Pulse Secure Desktop Client 9.0
Pulsesecure Pulse Secure Desktop Client 5.3
Pulsesecure Pulse Secure Installer Service 8.3
Pulsesecure Pulse Secure Installer Service 9.1
1 Github repository
445
VMScore
CVE-2018-20812
An information exposure issue where IPv6 DNS traffic would be sent outside of the VPN tunnel (when Traffic Enforcement was enabled) exists in Pulse Secure Pulse Secure Desktop 9.0R1 and below. This is applicable only to dual-stack (IPv4/IPv6) endpoints.
Pulsesecure Pulse Secure Desktop Client 4.0
Pulsesecure Pulse Secure Desktop Client 5.1
Pulsesecure Pulse Secure Desktop Client 5.1r
Pulsesecure Pulse Secure Desktop Client 5.3
Pulsesecure Pulse Secure Desktop Client 9.0
516
VMScore
CVE-2018-11002
Pulse Secure Desktop Client 5.3 up to and including R6.0 build 1769 on Windows has Insecure Permissions.
Pulsesecure Pulse Secure Desktop Client 5.3r3
Pulsesecure Pulse Secure Desktop Client 5.3r4.1
Pulsesecure Pulse Secure Desktop Client 5.3r1
Pulsesecure Pulse Secure Desktop Client 5.3r1.1
Pulsesecure Pulse Secure Desktop Client 5.3r2
Pulsesecure Pulse Secure Desktop Client 5.3r5
Pulsesecure Pulse Secure Desktop Client 5.3r5.2
Pulsesecure Pulse Secure Desktop Client 5.3r6
Pulsesecure Pulse Secure Desktop Client 5.3r4
Pulsesecure Pulse Secure Desktop Client 5.3r4.2
570
VMScore
CVE-2018-6374
The GUI component (aka PulseUI) in Pulse Secure Desktop Linux clients before PULSE5.2R9.2 and 5.3.x before PULSE5.3R4.2 does not perform strict SSL Certificate Validation. This can lead to the manipulation of the Pulse Connection set.
Pulsesecure Desktop Linux Client
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started