Show filters
93 Total Results
Displaying 1-10 of 93
Sort by:
Attacker Value
High
CVE-2019-11539
Disclosure Date: April 26, 2019 (last updated February 28, 2024)
In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before 8.3R7.1, 8.2RX before 8.2R12.1, and 8.1RX before 8.1R15.1 and Pulse Policy Secure version 9.0RX before 9.0R3.2, 5.4RX before 5.4R7.1, 5.3RX before 5.3R12.1, 5.2RX before 5.2R12.1, and 5.1RX before 5.1R15.1, the admin web interface allows an authenticated attacker to inject and execute commands.
1
Attacker Value
Very High
CVE-2020-8218
Disclosure Date: July 30, 2020 (last updated February 13, 2025)
A code injection vulnerability exists in Pulse Connect Secure <9.1R8 that allows an attacker to crafted a URI to perform an arbitrary code execution via the admin web interface.
1
Attacker Value
High
CVE-2020-13162
Disclosure Date: June 16, 2020 (last updated November 28, 2024)
A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged users to run a Microsoft Installer executable with elevated privileges.
1
Attacker Value
Unknown
CVE-2020-8204
Disclosure Date: July 30, 2020 (last updated February 28, 2024)
A cross site scripting (XSS) vulnerability exists in Pulse Connect Secure <9.1R5 on the PSAL Page.
1
Attacker Value
Low
CVE-2020-15408
Disclosure Date: July 28, 2020 (last updated November 28, 2024)
An issue was discovered in Pulse Secure Pulse Connect Secure before 9.1R8. An authenticated attacker can access the admin page console via the end-user web interface because of a rewrite.
0
Attacker Value
Unknown
CVE-2022-21826
Disclosure Date: September 30, 2022 (last updated February 28, 2024)
Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS.
0
Attacker Value
Unknown
CVE-2021-44720
Disclosure Date: August 12, 2022 (last updated February 28, 2024)
In Ivanti Pulse Secure Pulse Connect Secure (PCS) before 9.1R12, the administrator password is stored in the HTML source code of the "Maintenance > Push Configuration > Targets > Target Name" targets.cgi screen. A read-only administrative user can escalate to a read-write administrative role.
0
Attacker Value
Unknown
CVE-2021-22965
Disclosure Date: November 19, 2021 (last updated February 28, 2024)
A vulnerability in Pulse Connect Secure before 9.1R12.1 could allow an unauthenticated administrator to causes a denial of service when a malformed request is sent to the device.
0
Attacker Value
Unknown
CVE-2021-22933
Disclosure Date: August 16, 2021 (last updated February 28, 2024)
A vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator to perform an arbitrary file delete via a maliciously crafted web request.
0
Attacker Value
Unknown
CVE-2021-22935
Disclosure Date: August 16, 2021 (last updated February 28, 2024)
A vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator to perform command injection via an unsanitized web parameter.
0