Show filters
47 Total Results
Displaying 41-47 of 47
Sort by:
Attacker Value
Unknown

CVE-2020-8219

Disclosure Date: July 30, 2020 (last updated February 21, 2025)
An insufficient permission check vulnerability exists in Pulse Connect Secure <9.1R8 that allows an attacker to change the password of a full administrator.
Attacker Value
Unknown

CVE-2020-8217

Disclosure Date: July 30, 2020 (last updated February 21, 2025)
A cross site scripting (XSS) vulnerability in Pulse Connect Secure <9.1R8 allowed attackers to exploit in the URL used for Citrix ICA.
Attacker Value
Unknown

CVE-2020-8222

Disclosure Date: July 30, 2020 (last updated February 21, 2025)
A path traversal vulnerability exists in Pulse Connect Secure <9.1R8 that allowed an authenticated attacker via the administrator web interface to perform an arbitrary file reading vulnerability through Meeting.
Attacker Value
Unknown

CVE-2020-8221

Disclosure Date: July 30, 2020 (last updated February 21, 2025)
A path traversal vulnerability exists in Pulse Connect Secure <9.1R8 which allows an authenticated attacker to read arbitrary files via the administrator web interface.
Attacker Value
Unknown

CVE-2020-8220

Disclosure Date: July 30, 2020 (last updated February 21, 2025)
A denial of service vulnerability exists in Pulse Connect Secure <9.1R8 that allows an authenticated attacker to perform command injection via the administrator web which can cause DOS.
Attacker Value
Unknown

CVE-2020-8206

Disclosure Date: July 30, 2020 (last updated February 21, 2025)
An improper authentication vulnerability exists in Pulse Connect Secure <9.1RB that allows an attacker with a users primary credentials to bypass the Google TOTP.
Attacker Value
Unknown

CVE-2020-12880

Disclosure Date: July 27, 2020 (last updated February 28, 2024)
An issue was discovered in Pulse Policy Secure (PPS) and Pulse Connect Secure (PCS) Virtual Appliance before 9.1R8. By manipulating a certain kernel boot parameter, it can be tricked into dropping into a root shell in a pre-install phase where the entire source code of the appliance is available and can be retrieved. (The source code is otherwise inaccessible because the appliance has its hard disks encrypted, and no root shell is available during normal operation.)