Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pulsesecure vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv3
CVE-2019-11508
In Pulse Secure Pulse Connect Secure (PCS) prior to 8.1R15.1, 8.2 prior to 8.2R12.1, 8.3 prior to 8.3R7.1, and 9.0 prior to 9.0R3.4, an authenticated attacker (via the admin web interface) can exploit Directory Traversal to execute arbitrary code on the appliance.
Pulsesecure Pulse Connect Secure 7.4
Ivanti Connect Secure 9.0
Ivanti Connect Secure 8.1
Ivanti Connect Secure 8.2
Ivanti Connect Secure 8.3
Ivanti Connect Secure 7.1
Ivanti Connect Secure 7.4
7.2
CVSSv3
CVE-2019-11539
In Pulse Secure Pulse Connect Secure version 9.0RX prior to 9.0R3.4, 8.3RX prior to 8.3R7.1, 8.2RX prior to 8.2R12.1, and 8.1RX prior to 8.1R15.1 and Pulse Policy Secure version 9.0RX prior to 9.0R3.2, 5.4RX prior to 5.4R7.1, 5.3RX prior to 5.3R12.1, 5.2RX prior to 5.2R12.1, and ...
Pulsesecure Pulse Connect Secure 8.2r1.1
Pulsesecure Pulse Policy Secure 5.1r5.0
Pulsesecure Pulse Policy Secure 5.1r1.1
Pulsesecure Pulse Policy Secure 5.1r2.0
Pulsesecure Pulse Policy Secure 5.2r7.0
Pulsesecure Pulse Policy Secure 5.3r7.0
Pulsesecure Pulse Policy Secure 5.3r4.1
Pulsesecure Pulse Policy Secure 5.3r2.0
Pulsesecure Pulse Policy Secure 5.3r3.0
Pulsesecure Pulse Policy Secure 5.3r1.0
Pulsesecure Pulse Policy Secure 5.1r2.1
Pulsesecure Pulse Policy Secure 5.1r1.0
Pulsesecure Pulse Connect Secure 8.2r2.0
Pulsesecure Pulse Connect Secure 8.1r1.0
Pulsesecure Pulse Connect Secure 8.2r4.0
Pulsesecure Pulse Policy Secure 5.2r2.0
Pulsesecure Pulse Policy Secure 5.1r7.0
Pulsesecure Pulse Policy Secure 5.3r5.1
Pulsesecure Pulse Policy Secure 5.3r4.0
Pulsesecure Pulse Policy Secure 5.1r3.2
Pulsesecure Pulse Policy Secure 5.2r7.1
Pulsesecure Pulse Policy Secure 5.1r3.0
2 EDB exploits
2 Github repositories
1 Article
7.2
CVSSv3
CVE-2019-11542
In Pulse Secure Pulse Connect Secure version 9.0RX prior to 9.0R3.4, 8.3RX prior to 8.3R7.1, 8.2RX prior to 8.2R12.1, and 8.1RX prior to 8.1R15.1 and Pulse Policy Secure version 9.0RX prior to 9.0R3.2, 5.4RX prior to 5.4R7.1, 5.3RX prior to 5.3R12.1, 5.2RX prior to 5.2R12.1, and ...
Pulsesecure Pulse Connect Secure 8.2r1.1
Pulsesecure Pulse Policy Secure 5.1r5.0
Pulsesecure Pulse Policy Secure 5.1r1.1
Pulsesecure Pulse Policy Secure 5.1r2.0
Pulsesecure Pulse Policy Secure 5.2r7.0
Pulsesecure Pulse Policy Secure 5.3r7.0
Pulsesecure Pulse Policy Secure 5.3r4.1
Pulsesecure Pulse Policy Secure 5.3r2.0
Pulsesecure Pulse Policy Secure 5.3r3.0
Pulsesecure Pulse Policy Secure 5.3r1.0
Pulsesecure Pulse Policy Secure 5.1r2.1
Pulsesecure Pulse Policy Secure 5.1r1.0
Pulsesecure Pulse Connect Secure 8.2r2.0
Pulsesecure Pulse Connect Secure 8.1r1.0
Pulsesecure Pulse Connect Secure 8.2r4.0
Pulsesecure Pulse Policy Secure 5.2r2.0
Pulsesecure Pulse Policy Secure 5.1r7.0
Pulsesecure Pulse Policy Secure 5.3r5.1
Pulsesecure Pulse Policy Secure 5.3r4.0
Pulsesecure Pulse Policy Secure 5.1r3.2
Pulsesecure Pulse Policy Secure 5.2r7.1
Pulsesecure Pulse Policy Secure 5.1r3.0
7
CVSSv3
CVE-2020-13162
A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions before 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged users to run a Microsoft Installer executable with elevated privileges.
Pulsesecure Pulse Secure Desktop Client 9.1
Pulsesecure Pulse Secure Desktop Client 9.0
Pulsesecure Pulse Secure Desktop Client 5.3
Pulsesecure Pulse Secure Installer Service 8.3
Pulsesecure Pulse Secure Installer Service 9.1
1 Github repository
6.8
CVSSv3
CVE-2020-8222
A path traversal vulnerability exists in Pulse Connect Secure <9.1R8 that allowed an authenticated attacker via the administrator web interface to perform an arbitrary file reading vulnerability through Meeting.
Pulsesecure Pulse Connect Secure
Ivanti Connect Secure 9.1
Pulsesecure Pulse Policy Secure
Ivanti Policy Secure 9.1
6.8
CVSSv3
CVE-2018-7572
Pulse Secure Client 9.0R1 and 5.3RX prior to 5.3R5, when configured to authenticate VPN users during Windows Logon, can allow malicious users to bypass Windows authentication and execute commands on the system with the privileges of Pulse Secure Client. The attacker must interrup...
Pulsesecure Pulse Secure Desktop 5.3r1.0
Pulsesecure Pulse Secure Desktop 5.3r1.1
Pulsesecure Pulse Secure Desktop 5.3r2.0
Pulsesecure Pulse Secure Desktop 5.3r3.0
Pulsesecure Pulse Secure Desktop 5.3r4.0
Pulsesecure Pulse Secure Desktop 5.3r4.1
Pulsesecure Pulse Secure Desktop 9.0r1.0
Pulsesecure Pulse Secure Desktop 5.3rx
Pulsesecure Pulse Secure Desktop 5.3r4.2
6.8
CVSSv3
CVE-2018-16261
In Pulse Secure Pulse Desktop Client 5.3RX prior to 5.3R5 and 9.0R1, there is a Privilege Escalation Vulnerability with Dynamic Certificate Trust.
Pulsesecure Pulse Secure Desktop Client 5.3r3
Pulsesecure Pulse Secure Desktop Client 5.3r2
Pulsesecure Pulse Secure Desktop Client 5.3r1.1
Pulsesecure Pulse Secure Desktop Client 5.3r1
Pulsesecure Pulse Secure Desktop Client 9.0r1
Pulsesecure Pulse Secure Desktop Client 5.3r4.1
Pulsesecure Pulse Secure Desktop Client 5.3r4.2
Pulsesecure Pulse Secure Desktop Client 5.3r4
Pulsesecure Pulse Secure Desktop Client 5.3rx
6.5
CVSSv3
CVE-2021-22933
A vulnerability in Pulse Connect Secure prior to 9.1R12 could allow an authenticated administrator to perform an arbitrary file delete via a maliciously crafted web request.
Pulsesecure Pulse Connect Secure
Ivanti Connect Secure 9.1
6.5
CVSSv3
CVE-2020-8220
A denial of service vulnerability exists in Pulse Connect Secure <9.1R8 that allows an authenticated malicious user to perform command injection via the administrator web which can cause DOS.
Pulsesecure Pulse Connect Secure
Ivanti Connect Secure 9.1
Pulsesecure Pulse Policy Secure
Ivanti Policy Secure 9.1
6.5
CVSSv3
CVE-2018-6374
The GUI component (aka PulseUI) in Pulse Secure Desktop Linux clients before PULSE5.2R9.2 and 5.3.x before PULSE5.3R4.2 does not perform strict SSL Certificate Validation. This can lead to the manipulation of the Pulse Connection set.
Pulsesecure Desktop Linux Client
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »