CVE-2018-15865
https://notcve.org/view.php?id=CVE-2018-15865
The Pulse Secure Desktop (macOS) has a Privilege Escalation Vulnerability. Pulse Secure Desktop (macOS) tiene una vulnerabilidad de escalada de privilegios. • https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 •
CVE-2018-15749
https://notcve.org/view.php?id=CVE-2018-15749
The Pulse Secure Desktop (macOS) 5.3RX before 5.3R5 and 9.0R1 has a Format String Vulnerability. Pulse Secure Desktop (macOS), en versiones 5.3RX anteriores a la 5.3R5 y versión 9.0R1, tiene una vulnerabilidad de cadena de formato. • https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 • CWE-134: Use of Externally-Controlled Format String •
CVE-2018-15726
https://notcve.org/view.php?id=CVE-2018-15726
The Pulse Secure Desktop (macOS) 5.3RX before 5.3R5 and 9.0R1 has a Privilege Escalation Vulnerability. Pulse Secure Desktop (macOS), en versiones 5.3RX anteriores a la 5.3R5 y versión 9.0R1, tiene una vulnerabilidad de escalada de privilegios. • https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2018-16261
https://notcve.org/view.php?id=CVE-2018-16261
In Pulse Secure Pulse Desktop Client 5.3RX before 5.3R5 and 9.0R1, there is a Privilege Escalation Vulnerability with Dynamic Certificate Trust. Pulse Secure Pulse Desktop Client, en versiones 5.3RX anteriores a la 5.3R5 y versión 9.0R1, tiene una vulnerabilidad de escalada de privilegios con Dynamic Certificate Trust. • https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 • CWE-295: Improper Certificate Validation •
CVE-2016-2408
https://notcve.org/view.php?id=CVE-2016-2408
Pulse Secure Desktop before 5.2R2 and Pulse Secure Installer Service before 8.2R2 and below for Windows allow restricted users to gain privileges via unspecified vectors. Pulse Secure Desktop anterior a la versión 5.2R2 y Pulse Secure Installer Service anterior a versión 8.2R2 y anteriores para Windows permiten a los usuarios restringidos obtener privilegios a través de vectores no especificados • http://www.securityfocus.com/bid/92692 http://www.securitytracker.com/id/1036474 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40241 • CWE-264: Permissions, Privileges, and Access Controls •