CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

pulsesecure

pulse_secure_desktop_client

18 known vulnerabilities · sorted by CVSS score

CVE-2020-8239
CRITICAL9.8

A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack. This fix also requires Server Side Upgrade due to Standalone Host Checker Client (Windows) and Windows PDC.

pulsesecure / pulse_secure_desktop_client+13
Network
Published Oct 28, 2020
CVE-2020-8254
HIGH8.8

A vulnerability in the Pulse Secure Desktop Client < 9.1R9 has Remote Code Execution (RCE) if users can be convinced to connect to a malicious server. This vulnerability only affects Windows PDC.To improve the security of connections between Pulse clients and Pulse Connect Secure, see below recommendation(s):Disable Dynamic certificate trust for PDC.

pulsesecure / pulse_secure_desktop_client+13
Network
Published Oct 28, 2020
CVE-2019-11213
HIGH8.1

In Pulse Secure Pulse Desktop Client and Network Connect, an attacker could access session tokens to replay and spoof sessions, and as a result, gain unauthorized access as an end user, a related issue to CVE-2019-1573. (The endpoint would need to be already compromised for exploitation to succeed.) This affects Pulse Desktop Client 5.x before Secure Desktop 5.3R7 and Pulse Desktop Client 9.x before Secure Desktop 9.0R3. It also affects (for Network Connect customers) Pulse Connect Secure 8.1 before 8.1R14, 8.3 before 8.3R7, and 9.0 before 9.0R3.

ivanti / connect_secure+4
Network
Published Apr 12, 2019
CVE-2020-8250
HIGH7.8

A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to escalate privilege.

pulsesecure / pulse_secure_desktop_client+14
Local
Published Oct 28, 2020
CVE-2020-8249
HIGH7.8

A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to perform buffer overflow.

pulsesecure / pulse_secure_desktop_client+13
Local
Published Oct 28, 2020
CVE-2020-8240
HIGH7.8

A vulnerability in the Pulse Secure Desktop Client < 9.1R9 allows a restricted user on an endpoint machine can use system-level privileges if the Embedded Browser is configured with Credential Provider. This vulnerability only affects Windows PDC if the Embedded Browser is configured with the Credential Provider.

pulsesecure / pulse_secure_desktop_client+13
Local
Published Oct 28, 2020
CVE-2018-15865
HIGH7.8

The Pulse Secure Desktop (macOS) has a Privilege Escalation Vulnerability.

pulsesecure / pulse_secure_desktop_client+24
Local
Published Sep 6, 2018
CVE-2020-8248
HIGH7.8

A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to escalate privilege.

pulsesecure / pulse_secure_desktop_client+13
Local
Published Oct 28, 2020
CVE-2020-8241
HIGH7.5

A vulnerability in the Pulse Secure Desktop Client < 9.1R9 could allow the attacker to perform a MITM Attack if end users are convinced to connect to a malicious server.

pulsesecure / pulse_secure_desktop_client+13
Network
Published Oct 28, 2020
CVE-2018-20812
HIGH7.5

An information exposure issue where IPv6 DNS traffic would be sent outside of the VPN tunnel (when Traffic Enforcement was enabled) exists in Pulse Secure Pulse Secure Desktop 9.0R1 and below. This is applicable only to dual-stack (IPv4/IPv6) endpoints.

pulsesecure / pulse_secure_desktop_client+52
Network
Published Jun 28, 2019
CVE-2020-13162
HIGH7.0

A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged users to run a Microsoft Installer executable with elevated privileges.

pulsesecure / pulse_secure_desktop_client+31
Local
Published Jun 16, 2020
CVE-2018-16261
MEDIUM6.8

In Pulse Secure Pulse Desktop Client 5.3RX before 5.3R5 and 9.0R1, there is a Privilege Escalation Vulnerability with Dynamic Certificate Trust.

pulsesecure / pulse_secure_desktop_client+8
Physical
Published Sep 6, 2018
CVE-2018-15749
MEDIUM5.5

The Pulse Secure Desktop (macOS) 5.3RX before 5.3R5 and 9.0R1 has a Format String Vulnerability.

pulsesecure / pulse_secure_desktop_client+8
Local
Published Sep 6, 2018
CVE-2018-11002
MEDIUM5.5

Pulse Secure Desktop Client 5.3 up to and including R6.0 build 1769 on Windows has Insecure Permissions.

pulsesecure / pulse_secure_desktop_client+9
Local
Published Nov 29, 2018
CVE-2020-8263
MEDIUM5.4

A vulnerability in the authenticated user web interface of Pulse Connect Secure < 9.1R9 could allow attackers to conduct Cross-Site Scripting (XSS) through the CGI file.

pulsesecure / pulse_secure_desktop_client+13
Network
Published Oct 28, 2020
CVE-2018-15726
MEDIUM5.3

The Pulse Secure Desktop (macOS) 5.3RX before 5.3R5 and 9.0R1 has a Privilege Escalation Vulnerability.

pulsesecure / pulse_secure_desktop_client+8
Local
Published Sep 6, 2018
CVE-2020-8255
MEDIUM4.9

A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary file reading vulnerability is fixed using encrypted URL blacklisting that prevents these messages.

pulsesecure / pulse_secure_desktop_client+14
Network
Published Oct 28, 2020
CVE-2020-15408
LOW3.7

An issue was discovered in Pulse Secure Pulse Connect Secure before 9.1R8. An authenticated attacker can access the admin page console via the end-user web interface because of a rewrite.

pulsesecure / pulse_connect_secure+10
Network
Published Jul 28, 2020