8.8
CVE-2017-11455
- EPSS 0.56%
- Published 29.08.2017 15:29:00
- Last modified 20.04.2025 01:37:25
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
diag.cgi in Pulse Connect Secure 8.2R1 through 8.2R5, 8.1R1 through 8.1R10 and Pulse Policy Secure 5.3R1 through 5.3R5, 5.2R1 through 5.2R8, and 5.1R1 through 5.1R10 allow remote attackers to hijack the authentication of administrators for requests to start tcpdump, related to the lack of anti-CSRF tokens.
Data is provided by the National Vulnerability Database (NVD)
Ivanti ≫ Connect Secure Version8.1
Pulsesecure ≫ Pulse Connect Secure Version8.1r1.0
Pulsesecure ≫ Pulse Connect Secure Version8.2r1.0
Pulsesecure ≫ Pulse Connect Secure Version8.2r1.1
Pulsesecure ≫ Pulse Connect Secure Version8.2r2.0
Pulsesecure ≫ Pulse Connect Secure Version8.2r3.0
Pulsesecure ≫ Pulse Connect Secure Version8.2r3.1
Pulsesecure ≫ Pulse Connect Secure Version8.2r4.0
Pulsesecure ≫ Pulse Connect Secure Version8.2r4.1
Pulsesecure ≫ Pulse Connect Secure Version8.2r5.0
Pulsesecure ≫ Pulse Policy Secure Version5.1r1.0
Pulsesecure ≫ Pulse Policy Secure Version5.1r1.1
Pulsesecure ≫ Pulse Policy Secure Version5.1r2.0
Pulsesecure ≫ Pulse Policy Secure Version5.1r2.1
Pulsesecure ≫ Pulse Policy Secure Version5.1r3.0
Pulsesecure ≫ Pulse Policy Secure Version5.1r3.2
Pulsesecure ≫ Pulse Policy Secure Version5.1r4.0
Pulsesecure ≫ Pulse Policy Secure Version5.1r5.0
Pulsesecure ≫ Pulse Policy Secure Version5.1r6.0
Pulsesecure ≫ Pulse Policy Secure Version5.1r7.0
Pulsesecure ≫ Pulse Policy Secure Version5.1r7.1
Pulsesecure ≫ Pulse Policy Secure Version5.1r8.0
Pulsesecure ≫ Pulse Policy Secure Version5.1r9.1
Pulsesecure ≫ Pulse Policy Secure Version5.1r10
Pulsesecure ≫ Pulse Policy Secure Version5.2r1.0
Pulsesecure ≫ Pulse Policy Secure Version5.2r2.0
Pulsesecure ≫ Pulse Policy Secure Version5.2r3.0
Pulsesecure ≫ Pulse Policy Secure Version5.2r3.2
Pulsesecure ≫ Pulse Policy Secure Version5.2r4.0
Pulsesecure ≫ Pulse Policy Secure Version5.2r5.0
Pulsesecure ≫ Pulse Policy Secure Version5.2r6.0
Pulsesecure ≫ Pulse Policy Secure Version5.2r7.0
Pulsesecure ≫ Pulse Policy Secure Version5.2r7.1
Pulsesecure ≫ Pulse Policy Secure Version5.2r8.0
Pulsesecure ≫ Pulse Policy Secure Version5.3r1.0
Pulsesecure ≫ Pulse Policy Secure Version5.3r1.1
Pulsesecure ≫ Pulse Policy Secure Version5.3r2.0
Pulsesecure ≫ Pulse Policy Secure Version5.3r3.0
Pulsesecure ≫ Pulse Policy Secure Version5.3r3.1
Pulsesecure ≫ Pulse Policy Secure Version5.3r4.0
Pulsesecure ≫ Pulse Policy Secure Version5.3r4.1
Pulsesecure ≫ Pulse Policy Secure Version5.3r5.0
Pulsesecure ≫ Pulse Policy Secure Version5.3r5.1
Pulsesecure ≫ Pulse Policy Secure Version5.3r5.2
Pulsesecure ≫ Pulse Policy Secure Version5.3r6.0
Pulsesecure ≫ Pulse Policy Secure Version5.3r7.0
Pulsesecure ≫ Pulse Policy Secure Version5.3r8.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.56% | 0.673 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.