CVE-2018-20812
28.06.2019, 18:15
An information exposure issue where IPv6 DNS traffic would be sent outside of the VPN tunnel (when Traffic Enforcement was enabled) exists in Pulse Secure Pulse Secure Desktop 9.0R1 and below. This is applicable only to dual-stack (IPv4/IPv6) endpoints.Enginsight
Vendor | Product | Version |
---|---|---|
pulsesecure | pulse_secure_desktop_client | 4.0:r1.0 |
pulsesecure | pulse_secure_desktop_client | 4.0:r10.0 |
pulsesecure | pulse_secure_desktop_client | 4.0:r11.0 |
pulsesecure | pulse_secure_desktop_client | 4.0:r11.1 |
pulsesecure | pulse_secure_desktop_client | 4.0:r12.0 |
pulsesecure | pulse_secure_desktop_client | 4.0:r13.0 |
pulsesecure | pulse_secure_desktop_client | 4.0:r2.0 |
pulsesecure | pulse_secure_desktop_client | 4.0:r3.0 |
pulsesecure | pulse_secure_desktop_client | 4.0:r4.0 |
pulsesecure | pulse_secure_desktop_client | 4.0:r5.0 |
pulsesecure | pulse_secure_desktop_client | 4.0:r6.0 |
pulsesecure | pulse_secure_desktop_client | 4.0:r7.0 |
pulsesecure | pulse_secure_desktop_client | 4.0:r8.0 |
pulsesecure | pulse_secure_desktop_client | 4.0:r9.0 |
pulsesecure | pulse_secure_desktop_client | 4.0:r9.1 |
pulsesecure | pulse_secure_desktop_client | 4.0:r9.2 |
pulsesecure | pulse_secure_desktop_client | 5.1:r1.0 |
pulsesecure | pulse_secure_desktop_client | 5.1:r1.1 |
pulsesecure | pulse_secure_desktop_client | 5.1:r10.0 |
pulsesecure | pulse_secure_desktop_client | 5.1:r11.0 |
pulsesecure | pulse_secure_desktop_client | 5.1:r11.1 |
pulsesecure | pulse_secure_desktop_client | 5.1:r12.0 |
pulsesecure | pulse_secure_desktop_client | 5.1:r13.0 |
pulsesecure | pulse_secure_desktop_client | 5.1:r14.0 |
pulsesecure | pulse_secure_desktop_client | 5.1:r2.0 |
pulsesecure | pulse_secure_desktop_client | 5.1:r3.0 |
pulsesecure | pulse_secure_desktop_client | 5.1:r3.1 |
pulsesecure | pulse_secure_desktop_client | 5.1:r4.0 |
pulsesecure | pulse_secure_desktop_client | 5.1:r5.1 |
pulsesecure | pulse_secure_desktop_client | 5.1:r6.0 |
pulsesecure | pulse_secure_desktop_client | 5.1:r7.0 |
pulsesecure | pulse_secure_desktop_client | 5.1:r8.0 |
pulsesecure | pulse_secure_desktop_client | 5.1:r9.0 |
pulsesecure | pulse_secure_desktop_client | 5.1:r9.1 |
pulsesecure | pulse_secure_desktop_client | 5.1r:r |
pulsesecure | pulse_secure_desktop_client | 5.1r:r |
pulsesecure | pulse_secure_desktop_client | 5.3:r1 |
pulsesecure | pulse_secure_desktop_client | 5.3:r1.1 |
pulsesecure | pulse_secure_desktop_client | 5.3:r2 |
pulsesecure | pulse_secure_desktop_client | 5.3:r3 |
pulsesecure | pulse_secure_desktop_client | 5.3:r4 |
pulsesecure | pulse_secure_desktop_client | 5.3:r4.1 |
pulsesecure | pulse_secure_desktop_client | 5.3:r4.2 |
pulsesecure | pulse_secure_desktop_client | 5.3:r5 |
pulsesecure | pulse_secure_desktop_client | 5.3:r5.2 |
pulsesecure | pulse_secure_desktop_client | 5.3:r6 |
pulsesecure | pulse_secure_desktop_client | 5.3:r7 |
pulsesecure | pulse_secure_desktop_client | 9.0:r1 |
pulsesecure | pulse_secure_desktop_client | 9.0:r2 |
pulsesecure | pulse_secure_desktop_client | 9.0:r2.1 |
pulsesecure | pulse_secure_desktop_client | 9.0:r3 |
pulsesecure | pulse_secure_desktop_client | 9.0:r3.2 |
pulsesecure | pulse_secure_desktop_client | 9.0:r4 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration