CVE-2020-8255
28.10.2020, 13:15
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary file reading vulnerability is fixed using encrypted URL blacklisting that prevents these messages.Enginsight
Vendor | Product | Version |
---|---|---|
pulsesecure | pulse_secure_desktop_client | 𝑥 < 9.1 |
pulsesecure | pulse_secure_desktop_client | 9.1 |
pulsesecure | pulse_secure_desktop_client | 9.1:r1 |
pulsesecure | pulse_secure_desktop_client | 9.1:r2 |
pulsesecure | pulse_secure_desktop_client | 9.1:r3 |
pulsesecure | pulse_secure_desktop_client | 9.1:r3.1 |
pulsesecure | pulse_secure_desktop_client | 9.1:r4 |
pulsesecure | pulse_secure_desktop_client | 9.1:r4.1 |
pulsesecure | pulse_secure_desktop_client | 9.1:r4.2 |
pulsesecure | pulse_secure_desktop_client | 9.1:r5 |
pulsesecure | pulse_secure_desktop_client | 9.1:r6 |
pulsesecure | pulse_secure_desktop_client | 9.1:r7 |
pulsesecure | pulse_secure_desktop_client | 9.1:r7.1 |
pulsesecure | pulse_secure_desktop_client | 9.1:r8 |
pulsesecure | pulse_secure_desktop_client | 9.1:r8.2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration