Pulse Secure
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Pulse Secure product.
RSS Feeds for Pulse Secure security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Pulse Secure products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Pulse Secure Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 0 vulnerabilities in Pulse Secure. Pulse Secure did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 0 | 0.00 |
| 2022 | 4 | 6.90 |
| 2021 | 13 | 7.69 |
| 2020 | 30 | 6.70 |
| 2019 | 22 | 7.46 |
| 2018 | 18 | 7.19 |
It may take a day or so for new Pulse Secure vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Pulse Secure Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2022-35258 | Dec 05, 2022 |
IVANTI CONNECT SECURE (ICS) DOS Vulnerability (pre-9.1R14.3/15.2/16.2/22.2)An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1. |
|
| CVE-2022-35254 | Dec 05, 2022 |
Ivanti Secure DoS (ICS pre-9.1R14.3, IPS pre-9.1R17, Neurons pre-22.3)An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1. |
|
| CVE-2022-21826 | Sep 30, 2022 |
Pulse Secure 9.115 & Earlier Clientside HTTP Req. Smuggling Causing XSSPulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS. |
|
| CVE-2021-44720 | Aug 12, 2022 |
Ivanti PCS <9.1R12: Password in Targets.cgi Enables ReadOnly Admin to EscalateIn Ivanti Pulse Secure Pulse Connect Secure (PCS) before 9.1R12, the administrator password is stored in the HTML source code of the "Maintenance > Push Configuration > Targets > Target Name" targets.cgi screen. A read-only administrative user can escalate to a read-write administrative role. |
|
| CVE-2021-22965 | Nov 19, 2021 |
A vulnerability in Pulse Connect Secure before 9.1R12.1 couldA vulnerability in Pulse Connect Secure before 9.1R12.1 could allow an unauthenticated administrator to causes a denial of service when a malformed request is sent to the device. |
|
| CVE-2021-22935 | Aug 16, 2021 |
A vulnerability in Pulse Connect Secure before 9.1R12 couldA vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator to perform command injection via an unsanitized web parameter. |
|
| CVE-2021-22937 | Aug 16, 2021 |
A vulnerability in Pulse Connect Secure before 9.1R12 couldA vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator to perform a file write via a maliciously crafted archive uploaded in the administrator web interface. |
|
| CVE-2021-22938 | Aug 16, 2021 |
A vulnerability in Pulse Connect Secure before 9.1R12 couldA vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator to perform command injection via an unsanitized web parameter in the administrator web console. |
|
| CVE-2021-22936 | Aug 16, 2021 |
A vulnerability in Pulse Connect Secure before 9.1R12 couldA vulnerability in Pulse Connect Secure before 9.1R12 could allow a threat actor to perform a cross-site script attack against an authenticated administrator via an unsanitized web parameter. |
|
| CVE-2021-22934 | Aug 16, 2021 |
A vulnerability in Pulse Connect Secure before 9.1R12 couldA vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator or compromised Pulse Connect Secure device in a load-balanced configuration to perform a buffer overflow via a malicious crafted web request. |
|
| CVE-2021-22933 | Aug 16, 2021 |
A vulnerability in Pulse Connect Secure before 9.1R12 couldA vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator to perform an arbitrary file delete via a maliciously crafted web request. |
|
| CVE-2021-22894 | May 27, 2021 |
A buffer overflow vulnerability exists in Pulse Connect Secure before 9.1R11.4A buffer overflow vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to execute arbitrary code as the root user via maliciously crafted meeting room. |
|
| CVE-2021-22899 | May 27, 2021 |
A command injection vulnerability exists in Pulse Connect Secure before 9.1R11.4A command injection vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to perform remote code execution via Windows Resource Profiles Feature |
|
| CVE-2021-22908 | May 27, 2021 |
A buffer overflow vulnerability exists in Windows File Resource Profiles in 9.XA buffer overflow vulnerability exists in Windows File Resource Profiles in 9.X allows a remote authenticated user with privileges to browse SMB shares to execute arbitrary code as the root user. As of version 9.1R3, this permission is not enabled by default. |
|
| CVE-2021-22900 | May 27, 2021 |
A vulnerability allowed multiple unrestricted uploads in Pulse Connect Secure before 9.1R11.4A vulnerability allowed multiple unrestricted uploads in Pulse Connect Secure before 9.1R11.4 that could lead to an authenticated administrator to perform a file write via a maliciously crafted archive upload in the administrator web interface. |
|
| CVE-2021-31922 | May 14, 2021 |
An HTTP Request Smuggling vulnerability in Pulse Secure Virtual Traffic Manager before 21.1 couldAn HTTP Request Smuggling vulnerability in Pulse Secure Virtual Traffic Manager before 21.1 could allow an attacker to smuggle an HTTP request through an HTTP/2 Header. This vulnerability is resolved in 21.1, 20.3R1, 20.2R1, 20.1R2, 19.2R4, and 18.2R3. |
|
| CVE-2021-22893 | Apr 23, 2021 |
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect SecurePulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild. |
|
| CVE-2020-8240 | Oct 28, 2020 |
A vulnerability in the Pulse Secure Desktop Client < 9.1R9A vulnerability in the Pulse Secure Desktop Client < 9.1R9 allows a restricted user on an endpoint machine can use system-level privileges if the Embedded Browser is configured with Credential Provider. This vulnerability only affects Windows PDC if the Embedded Browser is configured with the Credential Provider. |
|
| CVE-2020-8241 | Oct 28, 2020 |
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 couldA vulnerability in the Pulse Secure Desktop Client < 9.1R9 could allow the attacker to perform a MITM Attack if end users are convinced to connect to a malicious server. |
|
| CVE-2020-8239 | Oct 28, 2020 |
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attackA vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack. This fix also requires Server Side Upgrade due to Standalone Host Checker Client (Windows) and Windows PDC. |
|
| CVE-2020-8248 | Oct 28, 2020 |
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 couldA vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to escalate privilege. |
|
| CVE-2020-8249 | Oct 28, 2020 |
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 couldA vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to perform buffer overflow. |
|
| CVE-2020-8250 | Oct 28, 2020 |
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 couldA vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to escalate privilege. |
|
| CVE-2020-8254 | Oct 28, 2020 |
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 has Remote Code Execution (RCE) if usersA vulnerability in the Pulse Secure Desktop Client < 9.1R9 has Remote Code Execution (RCE) if users can be convinced to connect to a malicious server. This vulnerability only affects Windows PDC.To improve the security of connections between Pulse clients and Pulse Connect Secure, see below recommendation(s):Disable Dynamic certificate trust for PDC. |
|
| CVE-2020-8255 | Oct 28, 2020 |
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary file reading vulnerability is fixed using encrypted URL blacklistingA vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary file reading vulnerability is fixed using encrypted URL blacklisting that prevents these messages. |
|
| CVE-2020-8260 | Oct 28, 2020 |
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface couldA vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary code execution using uncontrolled gzip extraction. |
|
| CVE-2020-8261 | Oct 28, 2020 |
A vulnerability in the Pulse Connect Secure / Pulse Policy Secure < 9.1R9 is vulnerable to arbitrary cookie injection.A vulnerability in the Pulse Connect Secure / Pulse Policy Secure < 9.1R9 is vulnerable to arbitrary cookie injection. |
|
| CVE-2020-8262 | Oct 28, 2020 |
A vulnerability in the Pulse Connect Secure / Pulse Policy Secure below 9.1R9 couldA vulnerability in the Pulse Connect Secure / Pulse Policy Secure below 9.1R9 could allow attackers to conduct Cross-Site Scripting (XSS) and Open Redirection for authenticated user web interface. |
|
| CVE-2020-8263 | Oct 28, 2020 |
A vulnerability in the authenticated user web interface of Pulse Connect Secure < 9.1R9 couldA vulnerability in the authenticated user web interface of Pulse Connect Secure < 9.1R9 could allow attackers to conduct Cross-Site Scripting (XSS) through the CGI file. |
|
| CVE-2020-15352 | Oct 27, 2020 |
An XML external entity (XXE) vulnerability in Pulse Connect Secure (PCS) before 9.1R9 and Pulse Policy Secure (PPS) before 9.1R9An XML external entity (XXE) vulnerability in Pulse Connect Secure (PCS) before 9.1R9 and Pulse Policy Secure (PPS) before 9.1R9 allows remote authenticated admins to conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request. |
|
| CVE-2020-8256 | Sep 30, 2020 |
A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface couldA vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could allow an authenticated attacker to gain arbitrary file reading access through Pulse Collaboration via XML External Entity (XXE) vulnerability. |
|
| CVE-2020-8243 | Sep 30, 2020 |
A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface couldA vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could allow an authenticated attacker to upload custom template to perform an arbitrary code execution. |
|
| CVE-2020-8238 | Sep 30, 2020 |
A vulnerability in the authenticated user web interface of Pulse Connect Secure and Pulse Policy Secure < 9.1R8.2 couldA vulnerability in the authenticated user web interface of Pulse Connect Secure and Pulse Policy Secure < 9.1R8.2 could allow attackers to conduct Cross-Site Scripting (XSS). |
|
| CVE-2020-8204 | Jul 30, 2020 |
A cross site scripting (XSS) vulnerability exists in Pulse Connect Secure <9.1R5 on the PSAL Page.A cross site scripting (XSS) vulnerability exists in Pulse Connect Secure <9.1R5 on the PSAL Page. |
|
| CVE-2020-8221 | Jul 30, 2020 |
A path traversal vulnerability exists in Pulse Connect Secure <9.1R8 whichA path traversal vulnerability exists in Pulse Connect Secure <9.1R8 which allows an authenticated attacker to read arbitrary files via the administrator web interface. |
|
| CVE-2020-8206 | Jul 30, 2020 |
An improper authentication vulnerability exists in Pulse Connect Secure <9.1RBAn improper authentication vulnerability exists in Pulse Connect Secure <9.1RB that allows an attacker with a users primary credentials to bypass the Google TOTP. |
|
| CVE-2020-8216 | Jul 30, 2020 |
An information disclosure vulnerability in meeting of Pulse Connect Secure <9.1R8An information disclosure vulnerability in meeting of Pulse Connect Secure <9.1R8 allowed an authenticated end-users to find meeting details, if they know the Meeting ID. |
|
| CVE-2020-8217 | Jul 30, 2020 |
A cross site scripting (XSS) vulnerability in Pulse Connect Secure <9.1R8A cross site scripting (XSS) vulnerability in Pulse Connect Secure <9.1R8 allowed attackers to exploit in the URL used for Citrix ICA. |
|
| CVE-2020-8218 | Jul 30, 2020 |
A code injection vulnerability exists in Pulse Connect Secure <9.1R8A code injection vulnerability exists in Pulse Connect Secure <9.1R8 that allows an attacker to crafted a URI to perform an arbitrary code execution via the admin web interface. |
|
| CVE-2020-8219 | Jul 30, 2020 |
An insufficient permission check vulnerability exists in Pulse Connect Secure <9.1R8An insufficient permission check vulnerability exists in Pulse Connect Secure <9.1R8 that allows an attacker to change the password of a full administrator. |
|
| CVE-2020-8220 | Jul 30, 2020 |
A denial of service vulnerability exists in Pulse Connect Secure <9.1R8A denial of service vulnerability exists in Pulse Connect Secure <9.1R8 that allows an authenticated attacker to perform command injection via the administrator web which can cause DOS. |
|
| CVE-2020-8222 | Jul 30, 2020 |
A path traversal vulnerability exists in Pulse Connect Secure <9.1R8A path traversal vulnerability exists in Pulse Connect Secure <9.1R8 that allowed an authenticated attacker via the administrator web interface to perform an arbitrary file reading vulnerability through Meeting. |
|
| CVE-2020-15408 | Jul 28, 2020 |
An issue was discovered in Pulse Secure Pulse Connect Secure before 9.1R8An issue was discovered in Pulse Secure Pulse Connect Secure before 9.1R8. An authenticated attacker can access the admin page console via the end-user web interface because of a rewrite. |
|
| CVE-2020-12880 | Jul 27, 2020 |
An issue was discovered in Pulse Policy Secure (PPS) and Pulse Connect Secure (PCS) Virtual Appliance before 9.1R8An issue was discovered in Pulse Policy Secure (PPS) and Pulse Connect Secure (PCS) Virtual Appliance before 9.1R8. By manipulating a certain kernel boot parameter, it can be tricked into dropping into a root shell in a pre-install phase where the entire source code of the appliance is available and can be retrieved. (The source code is otherwise inaccessible because the appliance has its hard disks encrypted, and no root shell is available during normal operation.) |
|
| CVE-2020-13162 | Jun 16, 2020 |
A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM)A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged users to run a Microsoft Installer executable with elevated privileges. |
|
| CVE-2020-11581 | Apr 06, 2020 |
An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06. The applet in tncc.jar, executed on macOS, Linux, and Solaris clients when a Host Checker policy is enforced, allows a man-in-the-middle attacker to perform OS command injection attacks (against a client) via shell metacharacters to the doCustomRemediateInstructions method, because Runtime.getRuntime().exec() is used. |
|
| CVE-2020-11582 | Apr 06, 2020 |
An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06. The applet in tncc.jar, executed on macOS, Linux, and Solaris clients when a Host Checker policy is enforced, launches a TCP server that accepts local connections on a random port. This can be reached by local HTTP clients, because up to 25 invalid lines are ignored, and because DNS rebinding can occur. (This server accepts, for example, a setcookie command that might be relevant to CVE-2020-11581 exploitation.) |
|
| CVE-2018-20811 | Jun 28, 2019 |
A hidden RPC service issue was found with Pulse Secure Pulse Connect Secure 8.3RX before 8.3R2 and 8.1RX before 8.1R12.A hidden RPC service issue was found with Pulse Secure Pulse Connect Secure 8.3RX before 8.3R2 and 8.1RX before 8.1R12. |
|
| CVE-2018-20809 | Jun 28, 2019 |
A crafted message can cause the web server to crash with Pulse Secure Pulse Connect Secure (PCS) 8.3RX before 8.3R5 and Pulse Policy Secure 5.4RX before 5.4R5A crafted message can cause the web server to crash with Pulse Secure Pulse Connect Secure (PCS) 8.3RX before 8.3R5 and Pulse Policy Secure 5.4RX before 5.4R5. This is not applicable to PCS 8.1RX. |
|
| CVE-2018-20808 | Jun 28, 2019 |
An XSS issue has been found with rd.cgi in Pulse Secure Pulse Connect Secure 8.3RX before 8.3R3 due to improper header sanitizationAn XSS issue has been found with rd.cgi in Pulse Secure Pulse Connect Secure 8.3RX before 8.3R3 due to improper header sanitization. This is not applicable to 8.1RX. |
|