Page 13 of 97 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 96EXPL: 0

A crafted message can cause the web server to crash with Pulse Secure Pulse Connect Secure (PCS) 8.3RX before 8.3R5 and Pulse Policy Secure 5.4RX before 5.4R5. This is not applicable to PCS 8.1RX. Un mensaje manipulado puede provocar que el servidor web se bloquee con Pulse Secure Pulse Connect Secure (PCS) versión 8.3RX en versiones anteriores a 8.3R5 y Pulse Policy Secure versión 5.4RX versiones anteriores a 5.4R5. Esto no es aplicable a PCS versión 8.1RX. • https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

Certain Secure Access SA Series SSL VPN products (originally developed by Juniper Networks but now sold and supported by Pulse Secure, LLC) allow privilege escalation, as demonstrated by Secure Access SSL VPN SA-4000 5.1R5 (build 9627) 4.2 Release (build 7631). This occurs because appropriate controls are not performed. Specifically, it is possible for a readonly user to change the administrator user password by making a local copy of the /dana-admin/user/update.cgi page, changing the "user" value, and saving the changes. Ciertos productos SSL VPN Secure Access, de la serie SA (desarrollados originariamente por Juniper Networks, pero vendidos y soportados actualmente por Pulse Secure, LLC), permiten el escalado de privilegios, tal y como queda demostrado con Secure Access SSL VPN SA-4000 5.1R5 (build 9627) 4.2 Release (build 7631). Esto ocurre debido a que no se realizan los controles apropiados. • http://seclists.org/fulldisclosure/2018/Dec/37 http://www.securityfocus.com/bid/106289 • CWE-269: Improper Privilege Management •

CVSS: 5.4EPSS: 0%CPEs: 3EXPL: 0

A stored cross-site scripting (XSS) vulnerability in the web administration user interface of Pulse Secure Virtual Traffic Manager may allow a remote authenticated attacker to inject web script or HTML via a crafted website and steal sensitive data and credentials. Affected releases are Pulse Secure Virtual Traffic Manager 9.9 versions prior to 9.9r2 and 10.4r1. Una vulnerabilidad de Cross-Site Scripting (XSS) persistente en la interfaz web de usuario administrador de Pulse Secure Virtual Traffic Manager podría permitir que un atacante autenticado remoto inyecte scripts web o HTML mediante un sitio web manipulado y robe datos sensibles y credenciales. Las versiones afectadas de Pulse Secure Virtual Traffic Manager son las 9.9 anteriores a la 9.9r2 y la 10.4r1. • https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

Pulse Secure Virtual Traffic Manager 9.9 versions prior to 9.9r2 and 10.4r1 allow a remote authenticated user to obtain sensitive historical activity information by leveraging incorrect permission validation. Pulse Secure Virtual Traffic Manager, en versiones 9.9 anteriores a la 9.9r2 y la 10.4r1 permiten que un usuario autenticado remoto obtenga información sensible del historial de actividades aprovechando la validación incorrecta de permisos. • https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.8EPSS: 0%CPEs: 10EXPL: 1

Pulse Secure Desktop Client 5.3 up to and including R6.0 build 1769 on Windows has Insecure Permissions. Pulse Secure Desktop Client desde la versión 5.3 hasta la R6.0 build 1769 en Windows tiene permisos no seguros. • http://www.securityfocus.com/bid/106054 https://www.themissinglink.com.au/security-advisories-cve-2017-16878-0 • CWE-732: Incorrect Permission Assignment for Critical Resource •