-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathbibliography.bib
93 lines (93 loc) · 3.55 KB
/
bibliography.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
@misc{BadPackets:online,
author = {},
title = {Over 14,500 Pulse Secure VPN endpoints vulnerable to CVE-2019-11510 – Bad Packets},
howpublished = {\url{https://badpackets.net/over-14500-pulse-secure-vpn-endpoints-vulnerable-to-cve-2019-11510/}},
month = {},
year = {},
note = {(Accessed on 05/10/2021)}
}
@misc{Heise:online,
author = {},
title = {Jetzt patchen! Attacken auf VPN-Server mit Pulse Connect Secure | heise online},
howpublished = {\url{https://www.heise.de/security/meldung/Jetzt-patchen-Attacken-auf-VPN-Server-mit-Pulse-Connect-Secure-4506605.html}},
month = {},
year = {},
note = {(Accessed on 05/10/2021)}
}
@misc{Tenable1:online,
author = {},
title = {CVE-2019-11510: Critical Pulse Connect Secure Vulnerability Used in Sodinokibi Ransomware Attacks - Blog | Tenable},
howpublished = {\url{https://de.tenable.com/blog/cve-2019-11510-critical-pulse-connect-secure-vulnerability-used-in-sodinokibi-ransomware}},
month = {},
year = {},
note = {(Accessed on 05/10/2021)}
}
@misc{Tenable2:online,
author = {},
title = {CVE-2019-11510: Proof of Concept Available for Arbitrary File Disclosure in Pulse Connect Secure - Blog | Tenable},
howpublished = {\url{https://de.tenable.com/blog/cve-2019-11510-proof-of-concept-available-for-arbitrary-file-disclosure-in-pulse-connect-secure}},
month = {},
year = {},
note = {(Accessed on 05/10/2021)}
}
@misc{BlackHatPresentation:online,
author = {},
title = {Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs},
howpublished = {\url{https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf}},
month = {},
year = {},
note = {(Accessed on 05/10/2021)}
}
@misc{CWE22-Definition:online,
author = {},
title = {CWE - CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (4.4)},
howpublished = {\url{http://cwe.mitre.org/data/definitions/22.html}},
month = {},
year = {},
note = {(Accessed on 05/10/2021)}
}
@misc{NVDCVE:online,
author = {},
title = {NVD - CVE-2019-11510},
howpublished = {\url{https://nvd.nist.gov/vuln/detail/CVE-2019-11510}},
month = {},
year = {},
note = {(Accessed on 05/10/2021)}
}
@misc{OWASP-PathTraversal:online,
author = {},
title = {Path Traversal | OWASP},
howpublished = {\url{https://owasp.org/www-community/attacks/Path_Traversal}},
month = {},
year = {},
note = {(Accessed on 05/10/2021)}
}
@misc{AWAKE:online,
author = {},
title = {Pulse VPN Vulnerability Analysis (CVE-2019-11510) | Awake Security},
howpublished = {\url{https://awakesecurity.com/blog/pulse-vpn-vulnerability-analysis-cve-2019-11510/}},
month = {},
year = {},
note = {(Accessed on 05/11/2021)}
}
@misc{Schneider-Folie-2,
author = {Dr. Jürgen Schneider},
title = {IT-Sicherheit - Dr Juergen Schneider - DHBW Mannheim - Angewandte Informatik - SS 2021 - 2 - Angriffe und Schwachstellen},
year = {2021}
}
@misc{NVDCVSSv30:online,
author = {},
title = {NVD - CVSS v3 Calculator},
howpublished = {\url{https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator}},
month = {},
year = {},
note = {(Accessed on 05/17/2021)}
}
@misc{ExploitExample:online,
author = {},
title = {Pulse Secure 8.1R15.1/8.2/8.3/9.0 SSL VPN - Arbitrary File Disclosure (Metasploit) - Multiple webapps Exploit},
howpublished = {\url{https://www.exploit-db.com/exploits/47297}},
month = {},
year = {},
note = {(Accessed on 05/17/2021)}
}