
CVE-2018-7572
https://notcve.org/view.php?id=CVE-2018-7572
12 Sep 2018 — Pulse Secure Client 9.0R1 and 5.3RX before 5.3R5, when configured to authenticate VPN users during Windows Logon, can allow attackers to bypass Windows authentication and execute commands on the system with the privileges of Pulse Secure Client. The attacker must interrupt the client's network connectivity, and trigger a connection to a crafted proxy server with an invalid SSL certificate that allows certification-manager access, leading to the ability to browse local files and execute local programs. Pulse... • https://www.mdsec.co.uk/2018/09/advisory-cve-2018-7572-pulse-secure-client-authentication-bypass • CWE-287: Improper Authentication •

CVE-2018-16261
https://notcve.org/view.php?id=CVE-2018-16261
06 Sep 2018 — In Pulse Secure Pulse Desktop Client 5.3RX before 5.3R5 and 9.0R1, there is a Privilege Escalation Vulnerability with Dynamic Certificate Trust. Pulse Secure Pulse Desktop Client, en versiones 5.3RX anteriores a la 5.3R5 y versión 9.0R1, tiene una vulnerabilidad de escalada de privilegios con Dynamic Certificate Trust. • https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 • CWE-295: Improper Certificate Validation •

CVE-2018-15726
https://notcve.org/view.php?id=CVE-2018-15726
06 Sep 2018 — The Pulse Secure Desktop (macOS) 5.3RX before 5.3R5 and 9.0R1 has a Privilege Escalation Vulnerability. Pulse Secure Desktop (macOS), en versiones 5.3RX anteriores a la 5.3R5 y versión 9.0R1, tiene una vulnerabilidad de escalada de privilegios. • https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2018-15749
https://notcve.org/view.php?id=CVE-2018-15749
06 Sep 2018 — The Pulse Secure Desktop (macOS) 5.3RX before 5.3R5 and 9.0R1 has a Format String Vulnerability. Pulse Secure Desktop (macOS), en versiones 5.3RX anteriores a la 5.3R5 y versión 9.0R1, tiene una vulnerabilidad de cadena de formato. • https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 • CWE-134: Use of Externally-Controlled Format String •