
CVE-2020-8956
https://notcve.org/view.php?id=CVE-2020-8956
27 Oct 2020 — Pulse Secure Desktop Client 9.0Rx before 9.0R5 and 9.1Rx before 9.1R4 on Windows reveals users' passwords if Save Settings is enabled. Pulse Secure Desktop Client versiones 9.0Rx anteriores a 9.0R5 y versiones 9.1Rx anteriores a 9.1R4 en Windows, revela unas contraseñas de unos usuarios si Save Settings está habilitado • https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 • CWE-521: Weak Password Requirements •

CVE-2020-15408
https://notcve.org/view.php?id=CVE-2020-15408
28 Jul 2020 — An issue was discovered in Pulse Secure Pulse Connect Secure before 9.1R8. An authenticated attacker can access the admin page console via the end-user web interface because of a rewrite. Se detectó un problema en Pulse Secure Pulse Connect Secure versiones anteriores a 9.1R8. Un atacante autenticado puede acceder a la consola de la página admin por medio de la interfaz web del usuario final debido a una reescritura • https://kb.pulsesecure.net/?atype=sa •

CVE-2020-13162 – Pulse Secure Client for Windows Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2020-13162
16 Jun 2020 — A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged users to run a Microsoft Installer executable with elevated privileges. Una vulnerabilidad de tipo time-of-check time-of-use en el archivo PulseSecureService.exe en Pulse Secure Client versiones anteriores a 9.1.6 hasta 5.3 R70 para Windows (que se ejecuta como NT AUTHORITY/SYSTEM), permite a los usuarios sin pr... • https://packetstorm.news/files/id/159065 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2019-11213
https://notcve.org/view.php?id=CVE-2019-11213
12 Apr 2019 — In Pulse Secure Pulse Desktop Client and Network Connect, an attacker could access session tokens to replay and spoof sessions, and as a result, gain unauthorized access as an end user, a related issue to CVE-2019-1573. (The endpoint would need to be already compromised for exploitation to succeed.) This affects Pulse Desktop Client 5.x before Secure Desktop 5.3R7 and Pulse Desktop Client 9.x before Secure Desktop 9.0R3. It also affects (for Network Connect customers) Pulse Connect Secure 8.1 before 8.1R14,... • https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44114 • CWE-384: Session Fixation •

CVE-2018-20812
https://notcve.org/view.php?id=CVE-2018-20812
16 Mar 2019 — An information exposure issue where IPv6 DNS traffic would be sent outside of the VPN tunnel (when Traffic Enforcement was enabled) exists in Pulse Secure Pulse Secure Desktop 9.0R1 and below. This is applicable only to dual-stack (IPv4/IPv6) endpoints. Existe un problema de exposición a la información donde el tráfico DNS de IPv6 se enviaría fuera del túnel VPN (cuando se habilitó la aplicación de tráfico) en Pulse Secure Pulse Secure Desktop 9.0R1 e inferior. Esto se aplica solo a los puntos finales de do... • https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2018-11002
https://notcve.org/view.php?id=CVE-2018-11002
29 Nov 2018 — Pulse Secure Desktop Client 5.3 up to and including R6.0 build 1769 on Windows has Insecure Permissions. Pulse Secure Desktop Client desde la versión 5.3 hasta la R6.0 build 1769 en Windows tiene permisos no seguros. • http://www.securityfocus.com/bid/106054 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2018-18284 – ghostscript: 1Policy operator allows a sandbox protection bypass
https://notcve.org/view.php?id=CVE-2018-18284
18 Oct 2018 — Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving the 1Policy operator. Artifex Ghostscript 9.25 y anteriores permite que los atacantes omitan un mecanismo de protección de sandbox mediante vectores relacionados con el operador 1Policy. Several vulnerabilities were discovered in Ghostscript, the GPL PostScript/PDF interpreter, which may result in denial of service, disclosure of existence and size of arbitrary files, or the execution of arbi... • http://git.ghostscript.com/?p=ghostpdl.git%3Bh=8d19fdf63f91f50466b08f23e2d93d37a4c5ea0b •

CVE-2018-7572
https://notcve.org/view.php?id=CVE-2018-7572
12 Sep 2018 — Pulse Secure Client 9.0R1 and 5.3RX before 5.3R5, when configured to authenticate VPN users during Windows Logon, can allow attackers to bypass Windows authentication and execute commands on the system with the privileges of Pulse Secure Client. The attacker must interrupt the client's network connectivity, and trigger a connection to a crafted proxy server with an invalid SSL certificate that allows certification-manager access, leading to the ability to browse local files and execute local programs. Pulse... • https://www.mdsec.co.uk/2018/09/advisory-cve-2018-7572-pulse-secure-client-authentication-bypass • CWE-287: Improper Authentication •

CVE-2018-16261
https://notcve.org/view.php?id=CVE-2018-16261
06 Sep 2018 — In Pulse Secure Pulse Desktop Client 5.3RX before 5.3R5 and 9.0R1, there is a Privilege Escalation Vulnerability with Dynamic Certificate Trust. Pulse Secure Pulse Desktop Client, en versiones 5.3RX anteriores a la 5.3R5 y versión 9.0R1, tiene una vulnerabilidad de escalada de privilegios con Dynamic Certificate Trust. • https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 • CWE-295: Improper Certificate Validation •

CVE-2018-15865
https://notcve.org/view.php?id=CVE-2018-15865
06 Sep 2018 — The Pulse Secure Desktop (macOS) has a Privilege Escalation Vulnerability. Pulse Secure Desktop (macOS) tiene una vulnerabilidad de escalada de privilegios. • https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 •