The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Pulse Connect Secure

Linux kernel: denial of service via TCP SACK Low MSS Panic
An attacker can send malicious TCP SACK Low MSS Panic packets to Linux kernel, in order to trigger a denial of service...
1074268, 1442037, ARUBA-PSA-2020-010, CERTFR-2019-AVI-276, CERTFR-2019-AVI-277, CERTFR-2019-AVI-278, CERTFR-2019-AVI-298, CERTFR-2019-AVI-303, CERTFR-2019-AVI-309, CERTFR-2019-AVI-429, CERTFR-2019-AVI-458, CERTFR-2019-AVI-561, CERTFR-2019-AVI-597, CERTFR-2020-AVI-575, cpujan2020, CTX256725, CVE-2019-11477, DLA-1823-1, DLA-1824-1, DSA-2019-117, DSA-4465-1, FEDORA-2019-6c3d89b3d0, FEDORA-2019-914542e05c, FG-IR-19-180, K78234183, openSUSE-SU-2019:1570-1, openSUSE-SU-2019:1571-1, openSUSE-SU-2019:1579-1, PAN-SA-2019-0013, RHSA-2019:1479-01, RHSA-2019:1480-01, RHSA-2019:1481-01, RHSA-2019:1482-01, RHSA-2019:1483-01, RHSA-2019:1484-01, RHSA-2019:1485-01, RHSA-2019:1486-01, RHSA-2019:1487-01, RHSA-2019:1488-01, RHSA-2019:1489-01, RHSA-2019:1490-01, RHSA-2019:1602-01, SA44193, SB10287, sk156192, SSA-462066, SSB-439005, SUSE-SU-2019:14089-1, SUSE-SU-2019:1527-1, SUSE-SU-2019:1529-1, SUSE-SU-2019:1530-1, SUSE-SU-2019:1532-1, SUSE-SU-2019:1533-1, SUSE-SU-2019:1534-1, SUSE-SU-2019:1535-1, SUSE-SU-2019:1536-1, SUSE-SU-2019:1550-1, SUSE-SU-2019:1692-1, SUSE-SU-2019:2430-1, SUSE-SU-2019:2450-1, SUSE-SU-2019:2950-1, SYMSA1492, Synology-SA-19:28, USN-4017-1, USN-4017-2, VIGILANCE-VUL-29543, VMSA-2019-0010, VMSA-2019-0010.1, VU#905115
Linux kernel: denial of service via TCP SACK Low MSS Resource
An attacker can trigger a fatal error via TCP SACK Low MSS Resource of the Linux kernel, in order to trigger a denial of service...
1074268, 6365341, ARUBA-PSA-2020-010, CERTFR-2019-AVI-277, CERTFR-2019-AVI-278, CERTFR-2019-AVI-298, CERTFR-2019-AVI-300, CERTFR-2019-AVI-429, CERTFR-2019-AVI-458, CERTFR-2019-AVI-597, CERTFR-2020-AVI-575, CERTFR-2021-AVI-146, cpujan2020, CVE-2019-11479, DLA-1823-1, DLA-1824-1, DSA-2019-117, DSA-4465-1, FEDORA-2019-6c3d89b3d0, FEDORA-2019-914542e05c, FG-IR-19-180, K35421172, openSUSE-SU-2019:1570-1, openSUSE-SU-2019:1571-1, openSUSE-SU-2019:1579-1, PAN-SA-2019-0013, RHSA-2019:1479-01, RHSA-2019:1480-01, RHSA-2019:1481-01, RHSA-2019:1482-01, RHSA-2019:1483-01, RHSA-2019:1484-01, RHSA-2019:1485-01, RHSA-2019:1486-01, RHSA-2019:1487-01, RHSA-2019:1488-01, RHSA-2019:1489-01, RHSA-2019:1490-01, RHSA-2019:1602-01, SA44193, SB10287, sk156192, SSA-462066, SSB-439005, SUSE-SU-2019:14089-1, SUSE-SU-2019:1527-1, SUSE-SU-2019:1529-1, SUSE-SU-2019:1530-1, SUSE-SU-2019:1532-1, SUSE-SU-2019:1533-1, SUSE-SU-2019:1534-1, SUSE-SU-2019:1535-1, SUSE-SU-2019:1536-1, SUSE-SU-2019:1550-1, SUSE-SU-2019:1692-1, SUSE-SU-2019:2430-1, SYMSA1492, Synology-SA-19:28, USN-4041-1, USN-4041-2, VIGILANCE-VUL-29546, VU#905115
Linux kernel: denial of service via TCP SACK Fragmented Retransmission Queue
An attacker can trigger a fatal error via TCP SACK Fragmented Retransmission Queue of the Linux kernel, in order to trigger a denial of service...
1074268, ARUBA-PSA-2020-010, CERTFR-2019-AVI-276, CERTFR-2019-AVI-277, CERTFR-2019-AVI-278, CERTFR-2019-AVI-298, CERTFR-2019-AVI-303, CERTFR-2019-AVI-309, CERTFR-2019-AVI-337, CERTFR-2019-AVI-429, CERTFR-2019-AVI-458, CERTFR-2019-AVI-597, CERTFR-2020-AVI-575, cpujan2020, CTX256725, CVE-2019-11478, DLA-1823-1, DLA-1824-1, DSA-2019-117, DSA-4465-1, FEDORA-2019-6c3d89b3d0, FEDORA-2019-914542e05c, FG-IR-19-180, K26618426, openSUSE-SU-2019:1570-1, openSUSE-SU-2019:1571-1, openSUSE-SU-2019:1579-1, PAN-SA-2019-0013, RHSA-2019:1479-01, RHSA-2019:1480-01, RHSA-2019:1481-01, RHSA-2019:1482-01, RHSA-2019:1483-01, RHSA-2019:1484-01, RHSA-2019:1485-01, RHSA-2019:1486-01, RHSA-2019:1487-01, RHSA-2019:1488-01, RHSA-2019:1489-01, RHSA-2019:1490-01, RHSA-2019:1602-01, SA44193, SB10287, sk156192, SSA-462066, SSB-439005, SUSE-SU-2019:14089-1, SUSE-SU-2019:1527-1, SUSE-SU-2019:1529-1, SUSE-SU-2019:1530-1, SUSE-SU-2019:1532-1, SUSE-SU-2019:1533-1, SUSE-SU-2019:1534-1, SUSE-SU-2019:1535-1, SUSE-SU-2019:1536-1, SUSE-SU-2019:1550-1, SUSE-SU-2019:1692-1, SUSE-SU-2019:1851-1, SUSE-SU-2019:1855-1, SUSE-SU-2019:2430-1, SUSE-SU-2019:2450-1, SYMSA1492, Synology-SA-19:28, USN-4017-1, USN-4017-2, VIGILANCE-VUL-29544, VMSA-2019-0010, VMSA-2019-0010.1, VU#905115
Pulse Secure Connect Secure: multiple vulnerabilities
An attacker can use several vulnerabilities of Pulse Secure Connect Secure...
CVE-2019-11507, CVE-2019-11508, CVE-2019-11509, CVE-2019-11510, CVE-2019-11538, CVE-2019-11539, CVE-2019-11540, CVE-2019-11541, CVE-2019-11542, CVE-2019-11543, SA44101, VIGILANCE-VUL-29143, VU#927237
Pulse Connect Secure, Pulse Secure Desktop: information disclosure via Session Cookies Reading
An attacker can bypass access restrictions to data via Session Cookies Reading of Pulse Connect Secure and Pulse Secure Desktop, in order to obtain sensitive information...
CVE-2019-11213, SA44114, VIGILANCE-VUL-29033, VU#192371
jQuery Core: privilege escalation via Object.prototype Pollution
An attacker can bypass restrictions via Object.prototype Pollution of jQuery Core, in order to escalate his privileges...
bulletinoct2019, cpuapr2020, cpuapr2021, cpujan2020, cpujul2019, cpujul2020, cpuoct2019, cpuoct2020, CST-7312, CVE-2019-11358, DLA-1797-1, DLA-2118-1, DRUPAL-SA-CORE-2019-005, DRUPAL-SA-CORE-2019-006, DSA-4460-1, EZSA-2019-005, FEDORA-2019-2a0ce0c58c, FEDORA-2019-a06dffab1c, FEDORA-2019-f563e66380, NTAP-20190919-0001, openSUSE-SU-2019:1839-1, openSUSE-SU-2019:1872-1, RHSA-2019:1456-01, RHSA-2020:3936-01, RHSA-2020:4670-01, RHSA-2020:4847-01, SA44601, Synology-SA-19:19, VIGILANCE-VUL-29030
Pulse Connect Secure: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Pulse Connect Secure, in order to run JavaScript code in the context of the web site...
CVE-2018-20807, SA43730, VIGILANCE-VUL-28114
tcpdump: out-of-bounds memory reading via print_prefix
An attacker can force a read at an invalid address via print_prefix() of tcpdump, in order to trigger a denial of service, or to obtain sensitive information...
763, bulletinjul2019, CVE-2018-19519, CVE-2019-1010220, FEDORA-2019-6db0d5b9d9, FEDORA-2019-85d92df70f, FEDORA-2019-d06bc63433, openSUSE-SU-2018:4144-1, openSUSE-SU-2018:4252-1, openSUSE-SU-2019:1964-1, openSUSE-SU-2019:2344-1, openSUSE-SU-2019:2348-1, RHSA-2019:3976-01, RHSA-2020:1604-01, SA44516, SUSE-SU-2018:4131-1, SUSE-SU-2018:4149-1, SUSE-SU-2019:2087-1, SUSE-SU-2019:2088-1, SUSE-SU-2019:2674-1, SUSE-SU-2020:3360-1, USN-4252-1, USN-4252-2, VIGILANCE-VUL-28029
Pulse Secure Desktop Client: privilege escalation via Insecure ACLs
An attacker can bypass restrictions via Insecure ACLs of Pulse Secure Desktop Client, in order to escalate his privileges...
CVE-2018-11002, SA44073-2019-03, VIGILANCE-VUL-27925
Ghostscript: code execution via 1Policy Operator
An attacker can use a vulnerability via 1Policy Operator of Ghostscript, in order to run code...
bulletinjan2019, CVE-2018-18284, DLA-1552-1, DSA-4336-1, FEDORA-2019-077a3f23c0, FEDORA-2019-82acb29c1b, openSUSE-SU-2018:4138-1, openSUSE-SU-2018:4140-1, RHSA-2018:3834-01, SA44101, SUSE-SU-2018:4087-1, SUSE-SU-2018:4090-1, USN-3803-1, VIGILANCE-VUL-27597
Our database contains other pages. You can request a free trial to read them.