From 006ec4099a2ba6fb12f6668070f2871624b2bfc2 Mon Sep 17 00:00:00 2001 From: Mrxn Date: Thu, 17 Feb 2022 00:08:06 +0800 Subject: [PATCH] =?UTF-8?q?add=20NoPacScan=EF=BC=9A=E5=8F=88=E4=B8=80?= =?UTF-8?q?=E4=B8=AA=20Python=20=E7=9A=84CVE-2021-42287/CVE-2021-42278?= =?UTF-8?q?=E6=89=AB=E6=8F=8F=E5=B7=A5=E5=85=B7?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 5322c18..b97c7f4 100644 --- a/README.md +++ b/README.md @@ -412,7 +412,7 @@ - [VMware_vCenter:VMware vCenter版本小于7.0.2.00100的未授权任意文件读取+SSRF+XSS](https://github.com/l0ggg/VMware_vCenter) -- [noPac:CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter(Microsoft Windows Active Directory 权限许可和访问控制问题漏洞)](https://github.com/cube0x0/noPac)|[Python 版本noPac](https://github.com/Ridter/noPac) +- [noPac:CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter(Microsoft Windows Active Directory 权限许可和访问控制问题漏洞)](https://github.com/cube0x0/noPac)|[Python 版本noPac](https://github.com/Ridter/noPac)|[NoPacScan:又一个 Python 的CVE-2021-42287/CVE-2021-42278扫描工具](https://github.com/knightswd/NoPacScan) - [CVE-2022-21907](https://github.com/nu11secur1ty/Windows10Exploits/tree/master/2022/CVE-2022-21907)|[CVE-2022-21907:Windows HTTP协议栈远程代码执行漏洞(有待验证)](https://github.com/antx-code/CVE-2022-21907)|[PowerShell 版本CVE-2022-21907:Windows HTTP协议栈远程代码执行漏洞检查工具](https://github.com/mauricelambert/CVE-2022-21907)