Latest pulsesecure pulse secure desktop client Vulnerabilities

A vulnerability in the authenticated user web interface of Pulse Connect Secure < 9.1R9 could allow attackers to conduct Cross-Site Scripting (XSS) through the CGI file.
Pulsesecure Pulse Secure Desktop Client<9.1
Pulsesecure Pulse Secure Desktop Client=9.1-r1
Pulsesecure Pulse Secure Desktop Client=9.1-r2
Pulsesecure Pulse Secure Desktop Client=9.1-r3
Pulsesecure Pulse Secure Desktop Client=9.1-r3.1
Pulsesecure Pulse Secure Desktop Client=9.1-r4
and 8 more
Ivanti Pulse Connect Secure Code Execution Vulnerability
Pulsesecure Pulse Secure Desktop Client<9.1
Pulsesecure Pulse Secure Desktop Client=9.1
Pulsesecure Pulse Secure Desktop Client=9.1-r1
Pulsesecure Pulse Secure Desktop Client=9.1-r2
Pulsesecure Pulse Secure Desktop Client=9.1-r3
Pulsesecure Pulse Secure Desktop Client=9.1-r3.1
and 10 more
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 allows a restricted user on an endpoint machine can use system-level privileges if the Embedded Browser is configured with Credential Provide...
Pulsesecure Pulse Secure Desktop Client<9.1
Pulsesecure Pulse Secure Desktop Client=9.1-r1
Pulsesecure Pulse Secure Desktop Client=9.1-r2
Pulsesecure Pulse Secure Desktop Client=9.1-r3
Pulsesecure Pulse Secure Desktop Client=9.1-r3.1
Pulsesecure Pulse Secure Desktop Client=9.1-r4
and 8 more
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to escalate privilege.
Pulsesecure Pulse Secure Desktop Client<9.1
Pulsesecure Pulse Secure Desktop Client=9.1-r1
Pulsesecure Pulse Secure Desktop Client=9.1-r2
Pulsesecure Pulse Secure Desktop Client=9.1-r3
Pulsesecure Pulse Secure Desktop Client=9.1-r3.1
Pulsesecure Pulse Secure Desktop Client=9.1-r4
and 8 more
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to perform buffer overflow.
Pulsesecure Pulse Secure Desktop Client<9.1
Pulsesecure Pulse Secure Desktop Client=9.1-r1
Pulsesecure Pulse Secure Desktop Client=9.1-r2
Pulsesecure Pulse Secure Desktop Client=9.1-r3
Pulsesecure Pulse Secure Desktop Client=9.1-r3.1
Pulsesecure Pulse Secure Desktop Client=9.1-r4
and 8 more
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary file reading vulnerability is fixed using encrypted URL blacklisti...
Pulsesecure Pulse Secure Desktop Client<9.1
Pulsesecure Pulse Secure Desktop Client=9.1
Pulsesecure Pulse Secure Desktop Client=9.1-r1
Pulsesecure Pulse Secure Desktop Client=9.1-r2
Pulsesecure Pulse Secure Desktop Client=9.1-r3
Pulsesecure Pulse Secure Desktop Client=9.1-r3.1
and 9 more
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack. This fix also requires Server Side Upgrade due to Standalone Host Checker C...
Pulsesecure Pulse Secure Desktop Client<9.1
Pulsesecure Pulse Secure Desktop Client=9.1-r1
Pulsesecure Pulse Secure Desktop Client=9.1-r2
Pulsesecure Pulse Secure Desktop Client=9.1-r3
Pulsesecure Pulse Secure Desktop Client=9.1-r3.1
Pulsesecure Pulse Secure Desktop Client=9.1-r4
and 8 more
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to escalate privilege.
Pulsesecure Pulse Secure Desktop Client<9.1
Pulsesecure Pulse Secure Desktop Client=9.1
Pulsesecure Pulse Secure Desktop Client=9.1-r1
Pulsesecure Pulse Secure Desktop Client=9.1-r2
Pulsesecure Pulse Secure Desktop Client=9.1-r3
Pulsesecure Pulse Secure Desktop Client=9.1-r3.1
and 9 more
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 has Remote Code Execution (RCE) if users can be convinced to connect to a malicious server. This vulnerability only affects Windows PDC.To im...
Pulsesecure Pulse Secure Desktop Client<9.1
Pulsesecure Pulse Secure Desktop Client=9.1-r1
Pulsesecure Pulse Secure Desktop Client=9.1-r2
Pulsesecure Pulse Secure Desktop Client=9.1-r3
Pulsesecure Pulse Secure Desktop Client=9.1-r3.1
Pulsesecure Pulse Secure Desktop Client=9.1-r4
and 8 more
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 could allow the attacker to perform a MITM Attack if end users are convinced to connect to a malicious server.
Pulsesecure Pulse Secure Desktop Client<9.1
Pulsesecure Pulse Secure Desktop Client=9.1-r1
Pulsesecure Pulse Secure Desktop Client=9.1-r2
Pulsesecure Pulse Secure Desktop Client=9.1-r3
Pulsesecure Pulse Secure Desktop Client=9.1-r3.1
Pulsesecure Pulse Secure Desktop Client=9.1-r4
and 8 more
An issue was discovered in Pulse Secure Pulse Connect Secure before 9.1R8. An authenticated attacker can access the admin page console via the end-user web interface because of a rewrite.
Pulsesecure Pulse Connect Secure<=9.1
Pulsesecure Pulse Secure Desktop Client=9.1-r1.0
Pulsesecure Pulse Secure Desktop Client=9.1-r2.0
Pulsesecure Pulse Secure Desktop Client=9.1-r3.0
Pulsesecure Pulse Secure Desktop Client=9.1-r3.1
Pulsesecure Pulse Secure Desktop Client=9.1-r4.0
and 5 more
A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged u...
Pulsesecure Pulse Secure Desktop Client=5.3-r1.0
Pulsesecure Pulse Secure Desktop Client=5.3-r1.1
Pulsesecure Pulse Secure Desktop Client=5.3-r2.0
Pulsesecure Pulse Secure Desktop Client=5.3-r3.0
Pulsesecure Pulse Secure Desktop Client=5.3-r4.1
Pulsesecure Pulse Secure Desktop Client=5.3-r4.2
and 26 more
An information exposure issue where IPv6 DNS traffic would be sent outside of the VPN tunnel (when Traffic Enforcement was enabled) exists in Pulse Secure Pulse Secure Desktop 9.0R1 and below. This is...
Pulsesecure Pulse Secure Desktop Client=4.0-r1.0
Pulsesecure Pulse Secure Desktop Client=4.0-r10.0
Pulsesecure Pulse Secure Desktop Client=4.0-r11.0
Pulsesecure Pulse Secure Desktop Client=4.0-r11.1
Pulsesecure Pulse Secure Desktop Client=4.0-r12.0
Pulsesecure Pulse Secure Desktop Client=4.0-r13.0
and 47 more
In Pulse Secure Pulse Desktop Client and Network Connect, an attacker could access session tokens to replay and spoof sessions, and as a result, gain unauthorized access as an end user, a related issu...
Pulsesecure Pulse Connect Secure>=8.1r1.0<=8.1r14.0
Pulsesecure Pulse Connect Secure>=8.3r1<8.3r7
Pulsesecure Pulse Connect Secure>=9.0r1<9.0r3
Pulsesecure Pulse Secure Desktop Client>=5.0r1.0<5.3r7
Pulsesecure Pulse Secure Desktop Client>=9.0r1<9.0r3
Ivanti Connect Secure>=9.0r1<9.0r3
Pulse Secure Desktop Client 5.3 up to and including R6.0 build 1769 on Windows has Insecure Permissions.
Pulsesecure Pulse Secure Desktop Client=5.3r1
Pulsesecure Pulse Secure Desktop Client=5.3r1.1
Pulsesecure Pulse Secure Desktop Client=5.3r2
Pulsesecure Pulse Secure Desktop Client=5.3r3
Pulsesecure Pulse Secure Desktop Client=5.3r4
Pulsesecure Pulse Secure Desktop Client=5.3r4.1
and 4 more
In Pulse Secure Pulse Desktop Client 5.3RX before 5.3R5 and 9.0R1, there is a Privilege Escalation Vulnerability with Dynamic Certificate Trust.
Pulsesecure Pulse Secure Desktop Client=5.3r1
Pulsesecure Pulse Secure Desktop Client=5.3r1.1
Pulsesecure Pulse Secure Desktop Client=5.3r2
Pulsesecure Pulse Secure Desktop Client=5.3r3
Pulsesecure Pulse Secure Desktop Client=5.3r4
Pulsesecure Pulse Secure Desktop Client=5.3r4.1
and 3 more
The Pulse Secure Desktop (macOS) has a Privilege Escalation Vulnerability.
Pulsesecure Pulse Secure Desktop Client=5.1r1.0
Pulsesecure Pulse Secure Desktop Client=5.1r1.1
Pulsesecure Pulse Secure Desktop Client=5.1r2.0
Pulsesecure Pulse Secure Desktop Client=5.1r3.0
Pulsesecure Pulse Secure Desktop Client=5.1r3.1
Pulsesecure Pulse Secure Desktop Client=5.1r3.2
and 19 more
The Pulse Secure Desktop (macOS) 5.3RX before 5.3R5 and 9.0R1 has a Format String Vulnerability.
Pulsesecure Pulse Secure Desktop Client=5.3r1
Pulsesecure Pulse Secure Desktop Client=5.3r1.1
Pulsesecure Pulse Secure Desktop Client=5.3r2
Pulsesecure Pulse Secure Desktop Client=5.3r3
Pulsesecure Pulse Secure Desktop Client=5.3r4
Pulsesecure Pulse Secure Desktop Client=5.3r4.1
and 3 more
The Pulse Secure Desktop (macOS) 5.3RX before 5.3R5 and 9.0R1 has a Privilege Escalation Vulnerability.
Pulsesecure Pulse Secure Desktop Client=5.3r1
Pulsesecure Pulse Secure Desktop Client=5.3r1.1
Pulsesecure Pulse Secure Desktop Client=5.3r2
Pulsesecure Pulse Secure Desktop Client=5.3r3
Pulsesecure Pulse Secure Desktop Client=5.3r4
Pulsesecure Pulse Secure Desktop Client=5.3r4.1
and 3 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203