Pulsesecure

Pulse Connect Secure

57 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.83%
  • Veröffentlicht 27.08.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:42

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.

  • EPSS 2.27%
  • Veröffentlicht 27.08.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:41

In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code.

  • EPSS 0.21%
  • Veröffentlicht 10.05.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:15:48

Pulse Secure Pulse Connect Secure 8.1.x before 8.1R14, 8.2.x before 8.2R11, and 8.3.x before 8.3R5 do not properly process nested XML entities, which allows remote attackers to cause a denial of service (memory consumption and memory errors) via a cr...

  • EPSS 9.87%
  • Veröffentlicht 16.01.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:32

A stack-based Buffer Overflow Vulnerability exists in the web server in Pulse Secure Pulse Connect Secure (PCS) before 8.3R4 and Pulse Policy Secure (PPS) before 5.4R4, leading to memory corruption and possibly remote code execution.

  • EPSS 0.26%
  • Veröffentlicht 16.01.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:19:02

A cross site scripting issue has been found in custompage.cgi in Pulse Secure Pulse Connect Secure (PCS) before 8.0R17.0, 8.1.x before 8.1R13, 8.2.x before 8.2R9, and 8.3.x before 8.3R3 and Pulse Policy Secure (PPS) before 5.2R10, 5.3.x before 5.3R9,...

  • EPSS 0.56%
  • Veröffentlicht 29.08.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

diag.cgi in Pulse Connect Secure 8.2R1 through 8.2R5, 8.1R1 through 8.1R10 and Pulse Policy Secure 5.3R1 through 5.3R5, 5.2R1 through 5.2R8, and 5.1R1 through 5.1R10 allow remote attackers to hijack the authentication of administrators for requests t...

  • EPSS 0.15%
  • Veröffentlicht 12.07.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Pulse Connect Secure 8.3R1 has CSRF in logout.cgi. The logout function of the admin panel is not protected by any CSRF tokens, thus allowing an attacker to logout a user by making them visit a malicious web page.

  • EPSS 0.39%
  • Veröffentlicht 12.07.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Pulse Connect Secure 8.3R1 has Reflected XSS in launchHelp.cgi. The helpLaunchPage parameter is reflected in an IFRAME element, if the value contains two quotes. It properly sanitizes quotes and tags, so one cannot simply close the src with a quote a...

  • EPSS 0.24%
  • Veröffentlicht 12.07.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Pulse Connect Secure 8.3R1 has Reflected XSS in adminservercacertdetails.cgi. In the admin panel, the certid parameter of adminservercacertdetails.cgi is reflected in the application's response and is not properly sanitized, allowing an attacker to i...

  • EPSS 0.15%
  • Veröffentlicht 12.07.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Pulse Connect Secure 8.3R1 has CSRF in diag.cgi. In the panel, the diag.cgi file is responsible for running commands such as ping, ping6, traceroute, traceroute6, nslookup, arp, and Portprobe. These functions do not have any protections against CSRF....