![]() ![]() ![]() The attacker could then leverage CVE-2019-11539, an authenticated command injecton vulnerability, to execute arbitrary commands on the SSL VPN. ![]() This can allow an attacker to obtain an authenticated HTTP session with the SSL VPN web application. A remote, unauthenticated attacker can exploit this issue, via a specially crafted HTTP request, to access arbitrary files on the remote host. Description The instance of Pulse Secure (formerly Juniper Networks JunOS Pulse) Pulse Connect Secure SSL VPN running on the remote host is affected by a path traversal vulnerability. Synopsis The remote web application server is affected by a path traversal vulnerability. Severity display preferences can be toggled in the settings dropdown. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. The calculated severity for Plugins has been updated to use CVSS v3 by default.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |