-
Notifications
You must be signed in to change notification settings - Fork 9
/
Copy pathPulse Secure CVE-2021-22893.opml
25 lines (25 loc) · 1.11 KB
/
Pulse Secure CVE-2021-22893.opml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
<?xml version="1.0" encoding="UTF-8"?>
<opml version="1.0">
<head>
<title>Pulse Secure CVE-2021-22893</title>
</head>
<body>
<outline text="Pulse Secure CVE-2021-22893"><outline text="Victims"><outline text="US"></outline>
<outline text="EU"></outline>
</outline>
<outline text="Advisories"><outline text="PulseSecure"><outline text="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/"></outline>
<outline text="https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44755/?kA13Z000000fzZV"></outline>
</outline>
<outline text="CISA"><outline text="https://us-cert.cisa.gov/ncas/alerts/aa21-110a"></outline>
</outline>
</outline>
<outline text="Detection"><outline text="PulseSecure"><outline text="Pulse Connect Secure Integrity Tool"></outline>
</outline>
</outline>
<outline text="implants"><outline text="SLOWPULSE, RADIALPULSE, PULSECHECK, THINBLOOD, PULSEJUMP, HARDPULSE"><outline text="FireEye"><outline text="https://www.fireeye.com/blog/threat-research/2021/04/suspected-apt-actors-leverage-bypass-techniques-pulse-secure-zero-day.html"></outline>
</outline>
</outline>
</outline>
</outline>
</body>
</opml>