Pulse Secure Desktop Client
By the Year
In 2024 there have been 0 vulnerabilities in Pulse Secure Desktop Client . Pulse Secure Desktop Client did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 0 | 0.00 |
2022 | 0 | 0.00 |
2021 | 0 | 0.00 |
2020 | 11 | 7.44 |
2019 | 2 | 7.80 |
2018 | 5 | 6.18 |
It may take a day or so for new Pulse Secure Desktop Client vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Pulse Secure Desktop Client Security Vulnerabilities
A vulnerability in the Pulse Secure Desktop Client < 9.1R9
CVE-2020-8240
7.8 - High
- October 28, 2020
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 allows a restricted user on an endpoint machine can use system-level privileges if the Embedded Browser is configured with Credential Provider. This vulnerability only affects Windows PDC if the Embedded Browser is configured with the Credential Provider.
A vulnerability in the authenticated user web interface of Pulse Connect Secure < 9.1R9 could
CVE-2020-8263
5.4 - Medium
- October 28, 2020
A vulnerability in the authenticated user web interface of Pulse Connect Secure < 9.1R9 could allow attackers to conduct Cross-Site Scripting (XSS) through the CGI file.
XSS
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could
CVE-2020-8260
7.2 - High
- October 28, 2020
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary code execution using uncontrolled gzip extraction.
Unrestricted File Upload
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary file reading vulnerability is fixed using encrypted URL blacklisting
CVE-2020-8255
4.9 - Medium
- October 28, 2020
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary file reading vulnerability is fixed using encrypted URL blacklisting that prevents these messages.
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 has Remote Code Execution (RCE) if users
CVE-2020-8254
8.8 - High
- October 28, 2020
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 has Remote Code Execution (RCE) if users can be convinced to connect to a malicious server. This vulnerability only affects Windows PDC.To improve the security of connections between Pulse clients and Pulse Connect Secure, see below recommendation(s):Disable Dynamic certificate trust for PDC.
Directory traversal
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could
CVE-2020-8250
7.8 - High
- October 28, 2020
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to escalate privilege.
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could
CVE-2020-8249
7.8 - High
- October 28, 2020
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to perform buffer overflow.
Classic Buffer Overflow
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could
CVE-2020-8248
7.8 - High
- October 28, 2020
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to escalate privilege.
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 could
CVE-2020-8241
7.5 - High
- October 28, 2020
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 could allow the attacker to perform a MITM Attack if end users are convinced to connect to a malicious server.
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack
CVE-2020-8239
9.8 - Critical
- October 28, 2020
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack. This fix also requires Server Side Upgrade due to Standalone Host Checker Client (Windows) and Windows PDC.
A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM)
CVE-2020-13162
7 - High
- June 16, 2020
A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged users to run a Microsoft Installer executable with elevated privileges.
TOCTTOU
An information exposure issue where IPv6 DNS traffic
CVE-2018-20812
7.5 - High
- June 28, 2019
An information exposure issue where IPv6 DNS traffic would be sent outside of the VPN tunnel (when Traffic Enforcement was enabled) exists in Pulse Secure Pulse Secure Desktop 9.0R1 and below. This is applicable only to dual-stack (IPv4/IPv6) endpoints.
Information Disclosure
In Pulse Secure Pulse Desktop Client and Network Connect
CVE-2019-11213
8.1 - High
- April 12, 2019
In Pulse Secure Pulse Desktop Client and Network Connect, an attacker could access session tokens to replay and spoof sessions, and as a result, gain unauthorized access as an end user, a related issue to CVE-2019-1573. (The endpoint would need to be already compromised for exploitation to succeed.) This affects Pulse Desktop Client 5.x before Secure Desktop 5.3R7 and Pulse Desktop Client 9.x before Secure Desktop 9.0R3. It also affects (for Network Connect customers) Pulse Connect Secure 8.1 before 8.1R14, 8.3 before 8.3R7, and 9.0 before 9.0R3.
Session Fixation
Pulse Secure Desktop Client 5.3 up to and including R6.0 build 1769 on Windows has Insecure Permissions.
CVE-2018-11002
5.5 - Medium
- November 29, 2018
Pulse Secure Desktop Client 5.3 up to and including R6.0 build 1769 on Windows has Insecure Permissions.
Incorrect Permission Assignment for Critical Resource
The Pulse Secure Desktop (macOS) 5.3RX before 5.3R5 and 9.0R1 has a Privilege Escalation Vulnerability.
CVE-2018-15726
5.3 - Medium
- September 06, 2018
The Pulse Secure Desktop (macOS) 5.3RX before 5.3R5 and 9.0R1 has a Privilege Escalation Vulnerability.
Shell injection
The Pulse Secure Desktop (macOS) 5.3RX before 5.3R5 and 9.0R1 has a Format String Vulnerability.
CVE-2018-15749
5.5 - Medium
- September 06, 2018
The Pulse Secure Desktop (macOS) 5.3RX before 5.3R5 and 9.0R1 has a Format String Vulnerability.
Use of Externally-Controlled Format String
The Pulse Secure Desktop (macOS) has a Privilege Escalation Vulnerability.
CVE-2018-15865
7.8 - High
- September 06, 2018
The Pulse Secure Desktop (macOS) has a Privilege Escalation Vulnerability.
In Pulse Secure Pulse Desktop Client 5.3RX before 5.3R5 and 9.0R1
CVE-2018-16261
6.8 - Medium
- September 06, 2018
In Pulse Secure Pulse Desktop Client 5.3RX before 5.3R5 and 9.0R1, there is a Privilege Escalation Vulnerability with Dynamic Certificate Trust.
Improper Certificate Validation
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Pulse Secure Desktop Client or by Pulse Secure? Click the Watch button to subscribe.