Show filters
137 Total Results
Displaying 1-10 of 137
Sort by:
Attacker Value
High

CVE-2019-11539

Disclosure Date: April 26, 2019 (last updated February 28, 2024)
In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before 8.3R7.1, 8.2RX before 8.2R12.1, and 8.1RX before 8.1R15.1 and Pulse Policy Secure version 9.0RX before 9.0R3.2, 5.4RX before 5.4R7.1, 5.3RX before 5.3R12.1, 5.2RX before 5.2R12.1, and 5.1RX before 5.1R15.1, the admin web interface allows an authenticated attacker to inject and execute commands.
Attacker Value
Very High

CVE-2020-8218

Disclosure Date: July 30, 2020 (last updated February 21, 2025)
A code injection vulnerability exists in Pulse Connect Secure <9.1R8 that allows an attacker to crafted a URI to perform an arbitrary code execution via the admin web interface.
Attacker Value
High

CVE-2020-13162

Disclosure Date: June 16, 2020 (last updated February 21, 2025)
A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged users to run a Microsoft Installer executable with elevated privileges.
Attacker Value
Unknown

CVE-2020-8204

Disclosure Date: July 30, 2020 (last updated February 21, 2025)
A cross site scripting (XSS) vulnerability exists in Pulse Connect Secure <9.1R5 on the PSAL Page.
Attacker Value
Low

CVE-2020-15408

Disclosure Date: July 28, 2020 (last updated November 28, 2024)
An issue was discovered in Pulse Secure Pulse Connect Secure before 9.1R8. An authenticated attacker can access the admin page console via the end-user web interface because of a rewrite.
Attacker Value
Unknown

CVE-2025-22662

Disclosure Date: February 04, 2025 (last updated February 05, 2025)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SendPulse SendPulse Email Marketing Newsletter allows Stored XSS. This issue affects SendPulse Email Marketing Newsletter: from n/a through 2.1.5.
0
Attacker Value
Unknown

CVE-2024-55661

Disclosure Date: December 13, 2024 (last updated December 18, 2024)
Laravel Pulse is a real-time application performance monitoring tool and dashboard for Laravel applications. A vulnerability has been discovered in Laravel Pulse prior to version 1.3.1 that could allow remote code execution through the public `remember()` method in the `Laravel\Pulse\Livewire\Concerns\RemembersQueries` trait. This method is accessible via Livewire components and can be exploited to call arbitrary callables within the application. An authenticated user with access to Laravel Pulse dashboard can execute arbitrary code by calling any function or static method in which the callable is a function or static method and the callable has no parameters or no strict parameter types. The vulnerable to component is `remember(callable $query, string $key = '')` method in `Laravel\Pulse\Livewire\Concerns\RemembersQueries`, and the vulnerability affects all Pulse card components that use this trait. Version 1.3.1 contains a patch.
0
Attacker Value
Unknown

CVE-2024-11586

Disclosure Date: November 23, 2024 (last updated January 05, 2025)
Ubuntu's implementation of pulseaudio can be crashed by a malicious program if a bluetooth headset is connected.
0
Attacker Value
Unknown

CVE-2024-9184

Disclosure Date: October 17, 2024 (last updated January 06, 2025)
The SendPulse Free Web Push plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.3.6 due to incorrect use of the wp_kses_allowed_html function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0
Attacker Value
Unknown

CVE-2022-4964

Disclosure Date: January 24, 2024 (last updated January 31, 2024)
Ubuntu's pipewire-pulse in snap grants microphone access even when the snap interface for audio-record is not set.