Show filters
47 Total Results
Displaying 41-47 of 47
Sort by:
Attacker Value
Unknown
CVE-2020-8219
Disclosure Date: July 30, 2020 (last updated February 21, 2025)
An insufficient permission check vulnerability exists in Pulse Connect Secure <9.1R8 that allows an attacker to change the password of a full administrator.
0
Attacker Value
Unknown
CVE-2020-8217
Disclosure Date: July 30, 2020 (last updated February 21, 2025)
A cross site scripting (XSS) vulnerability in Pulse Connect Secure <9.1R8 allowed attackers to exploit in the URL used for Citrix ICA.
0
Attacker Value
Unknown
CVE-2020-8222
Disclosure Date: July 30, 2020 (last updated February 21, 2025)
A path traversal vulnerability exists in Pulse Connect Secure <9.1R8 that allowed an authenticated attacker via the administrator web interface to perform an arbitrary file reading vulnerability through Meeting.
0
Attacker Value
Unknown
CVE-2020-8221
Disclosure Date: July 30, 2020 (last updated February 21, 2025)
A path traversal vulnerability exists in Pulse Connect Secure <9.1R8 which allows an authenticated attacker to read arbitrary files via the administrator web interface.
0
Attacker Value
Unknown
CVE-2020-8220
Disclosure Date: July 30, 2020 (last updated February 21, 2025)
A denial of service vulnerability exists in Pulse Connect Secure <9.1R8 that allows an authenticated attacker to perform command injection via the administrator web which can cause DOS.
0
Attacker Value
Unknown
CVE-2020-8206
Disclosure Date: July 30, 2020 (last updated February 21, 2025)
An improper authentication vulnerability exists in Pulse Connect Secure <9.1RB that allows an attacker with a users primary credentials to bypass the Google TOTP.
0
Attacker Value
Unknown
CVE-2020-12880
Disclosure Date: July 27, 2020 (last updated February 28, 2024)
An issue was discovered in Pulse Policy Secure (PPS) and Pulse Connect Secure (PCS) Virtual Appliance before 9.1R8. By manipulating a certain kernel boot parameter, it can be tricked into dropping into a root shell in a pre-install phase where the entire source code of the appliance is available and can be retrieved. (The source code is otherwise inaccessible because the appliance has its hard disks encrypted, and no root shell is available during normal operation.)
0