### [CVE-2021-22899](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22899) ![](https://img.shields.io/static/v1?label=Product&message=Pulse%20Connect%20Secure&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=Fixed%20in%209.1R11.4%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Command%20Injection%20-%20Generic%20(CWE-77)&color=brightgreen) ### Description A command injection vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to perform remote code execution via Windows Resource Profiles Feature ### POC #### Reference - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY #### Github - https://github.com/ARPSyndicate/cve-scores - https://github.com/ARPSyndicate/cvemon - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors