Show filters
137 Total Results
Displaying 71-80 of 137
Sort by:
Attacker Value
Unknown
CVE-2019-18263
Disclosure Date: April 18, 2019 (last updated November 27, 2024)
An issue was found in Philips Veradius Unity, Pulsera, and Endura Dual WAN Router, Veradius Unity (718132) with wireless option (shipped between 2016-August 2018), Veradius Unity (718132) with ViewForum option (shipped between 2016-August 2018), Pulsera (718095) and Endura (718075) with wireless option (shipped between 26-June-2017 through 07-August 2018), Pulsera (718095) and Endura (718075) with ViewForum option (shipped between 26-June-2017 through 07-August 2018). The router software uses an encryption scheme that is not strong enough for the level of protection required.
0
Attacker Value
Unknown
CVE-2019-11213
Disclosure Date: April 12, 2019 (last updated February 28, 2024)
In Pulse Secure Pulse Desktop Client and Network Connect, an attacker could access session tokens to replay and spoof sessions, and as a result, gain unauthorized access as an end user, a related issue to CVE-2019-1573. (The endpoint would need to be already compromised for exploitation to succeed.) This affects Pulse Desktop Client 5.x before Secure Desktop 5.3R7 and Pulse Desktop Client 9.x before Secure Desktop 9.0R3. It also affects (for Network Connect customers) Pulse Connect Secure 8.1 before 8.1R14, 8.3 before 8.3R7, and 9.0 before 9.0R3.
0
Attacker Value
Unknown
CVE-2018-11002
Disclosure Date: November 29, 2018 (last updated November 27, 2024)
Pulse Secure Desktop Client 5.3 up to and including R6.0 build 1769 on Windows has Insecure Permissions.
0
Attacker Value
Unknown
CVE-2018-18284
Disclosure Date: October 19, 2018 (last updated November 08, 2023)
Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving the 1Policy operator.
0
Attacker Value
Unknown
CVE-2018-7572
Disclosure Date: September 12, 2018 (last updated November 27, 2024)
Pulse Secure Client 9.0R1 and 5.3RX before 5.3R5, when configured to authenticate VPN users during Windows Logon, can allow attackers to bypass Windows authentication and execute commands on the system with the privileges of Pulse Secure Client. The attacker must interrupt the client's network connectivity, and trigger a connection to a crafted proxy server with an invalid SSL certificate that allows certification-manager access, leading to the ability to browse local files and execute local programs.
0
Attacker Value
Unknown
CVE-2018-15865
Disclosure Date: September 06, 2018 (last updated November 27, 2024)
The Pulse Secure Desktop (macOS) has a Privilege Escalation Vulnerability.
0
Attacker Value
Unknown
CVE-2018-15749
Disclosure Date: September 06, 2018 (last updated November 27, 2024)
The Pulse Secure Desktop (macOS) 5.3RX before 5.3R5 and 9.0R1 has a Format String Vulnerability.
0
Attacker Value
Unknown
CVE-2018-14366
Disclosure Date: September 06, 2018 (last updated February 28, 2024)
download.cgi in Pulse Secure Pulse Connect Secure 8.1RX before 8.1R13 and 8.3RX before 8.3R4 and Pulse Policy Secure through 5.2RX before 5.2R10 and 5.4RX before 5.4R4 have an Open Redirect Vulnerability.
0
Attacker Value
Unknown
CVE-2018-6320
Disclosure Date: September 06, 2018 (last updated February 28, 2024)
A vulnerability has been discovered in login.cgi in Pulse Secure Pulse Connect Secure (PCS) 8.1RX before 8.1R12 and 8.3RX before 8.3R2 and Pulse Policy Secure (PPS) 5.2RX before 5.2R9 and 5.4RX before 5.4R2 wherein an http(s) Host header received from the browser is trusted without validation.
0
Attacker Value
Unknown
CVE-2018-15726
Disclosure Date: September 06, 2018 (last updated November 27, 2024)
The Pulse Secure Desktop (macOS) 5.3RX before 5.3R5 and 9.0R1 has a Privilege Escalation Vulnerability.
0