![pulse secure debian 4.13 pulse secure debian 4.13](https://distrowatch.com/images/ktyxqzobhgijab/kodachi.png)
![pulse secure debian 4.13 pulse secure debian 4.13](https://www.libarts.colostate.edu/clait/wp-content/uploads/sites/14/2020/03/pulse_manualinstallersMAC.png)
PULSE SECURE DEBIAN 4.13 CODE
A successful attack can lead to command injection and arbitrary code execution. This signature detects attempts to exploit a known vulnerability against Watchguard XCS.
![pulse secure debian 4.13 pulse secure debian 4.13](https://debian-handbook.info/browse/stable/images/inst-partman.png)
HTTP:SQL:INJ:HEADER-COOKIE-WCS - HTTP: Watchguard XCS SQL Injection Severity: HIGH Description: HTTP: Drupal Core Form Rendering Remote Code ExecutionÄetails of the signatures included within this bulletin:
PULSE SECURE DEBIAN 4.13 WINDOWS
HTTP: Microsoft Windows CVE-2019-1458 Elevation Of Privilege TCP: Linux and FreeBSD SACK and MSS Denial of Service