Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pulse secure desktop client vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2020-8248
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local malicious users to escalate privilege.
Pulsesecure Pulse Secure Desktop Client
Pulsesecure Pulse Secure Desktop Client 9.1
1 Github repository
8.8
CVSSv3
CVE-2020-8254
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 has Remote Code Execution (RCE) if users can be convinced to connect to a malicious server. This vulnerability only affects Windows PDC.To improve the security of connections between Pulse clients and Pulse Connect Sec...
Pulsesecure Pulse Secure Desktop Client
Pulsesecure Pulse Secure Desktop Client 9.1
1 Github repository
4.9
CVSSv3
CVE-2020-8255
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated malicious user to perform an arbitrary file reading vulnerability is fixed using encrypted URL blacklisting that prevents these messages.
Pulsesecure Pulse Secure Desktop Client
Pulsesecure Pulse Secure Desktop Client 9.1
7.2
CVSSv3
CVE-2020-8260
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated malicious user to perform an arbitrary code execution using uncontrolled gzip extraction.
Pulsesecure Pulse Secure Desktop Client
Pulsesecure Pulse Secure Desktop Client 9.1
1 Article
7.8
CVSSv3
CVE-2020-8240
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 allows a restricted user on an endpoint machine can use system-level privileges if the Embedded Browser is configured with Credential Provider. This vulnerability only affects Windows PDC if the Embedded Browser is con...
Pulsesecure Pulse Secure Desktop Client
Pulsesecure Pulse Secure Desktop Client 9.1
7.5
CVSSv3
CVE-2020-8241
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 could allow the malicious user to perform a MITM Attack if end users are convinced to connect to a malicious server.
Pulsesecure Pulse Secure Desktop Client
Pulsesecure Pulse Secure Desktop Client 9.1
2 Github repositories
5.4
CVSSv3
CVE-2020-8263
A vulnerability in the authenticated user web interface of Pulse Connect Secure < 9.1R9 could allow malicious users to conduct Cross-Site Scripting (XSS) through the CGI file.
Pulsesecure Pulse Secure Desktop Client
Pulsesecure Pulse Secure Desktop Client 9.1
4.6
CVSSv3
CVE-2020-15408
An issue exists in Pulse Secure Pulse Connect Secure prior to 9.1R8. An authenticated attacker can access the admin page console via the end-user web interface because of a rewrite.
Pulsesecure Pulse Connect Secure
Pulsesecure Pulse Secure Desktop Client 9.1
8.1
CVSSv3
CVE-2019-11213
In Pulse Secure Pulse Desktop Client and Network Connect, an attacker could access session tokens to replay and spoof sessions, and as a result, gain unauthorized access as an end user, a related issue to CVE-2019-1573. (The endpoint would need to be already compromised for explo...
Pulsesecure Pulse Secure Desktop Client
Pulsesecure Pulse Connect Secure
Ivanti Connect Secure
6.8
CVSSv3
CVE-2018-7572
Pulse Secure Client 9.0R1 and 5.3RX prior to 5.3R5, when configured to authenticate VPN users during Windows Logon, can allow malicious users to bypass Windows authentication and execute commands on the system with the privileges of Pulse Secure Client. The attacker must interrup...
Pulsesecure Pulse Secure Desktop 5.3r1.0
Pulsesecure Pulse Secure Desktop 5.3r1.1
Pulsesecure Pulse Secure Desktop 5.3r2.0
Pulsesecure Pulse Secure Desktop 5.3r3.0
Pulsesecure Pulse Secure Desktop 5.3r4.0
Pulsesecure Pulse Secure Desktop 5.3r4.1
Pulsesecure Pulse Secure Desktop 9.0r1.0
Pulsesecure Pulse Secure Desktop 5.3rx
Pulsesecure Pulse Secure Desktop 5.3r4.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »