From 0434fe35d4e42a298ab8ca75c0e9bfc933c4acf1 Mon Sep 17 00:00:00 2001 From: Mrxn Date: Wed, 26 Feb 2020 23:17:15 +0800 Subject: [PATCH] =?UTF-8?q?add=20CVE-2020-0688=EF=BC=9A=E5=BE=AE=E8=BD=AFE?= =?UTF-8?q?XCHANGE=E6=9C=8D=E5=8A=A1=E7=9A=84=E8=BF=9C=E7=A8=8B=E4=BB=A3?= =?UTF-8?q?=E7=A0=81=E6=89=A7=E8=A1=8C=E6=BC=8F=E6=B4=9E?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 57924f4..eabdab8 100644 --- a/README.md +++ b/README.md @@ -154,6 +154,7 @@ - [CVE-2020-0728-Windows Modules Installer Service 信息泄露漏洞](https://github.com/irsl/CVE-2020-0728/) - [CVE-2020-0618: 微软 SQL Server Reporting Services远程代码执行(RCE)漏洞](https://www.mdsec.co.uk/2020/02/cve-2020-0618-rce-in-sql-server-reporting-services-ssrs/)|[GitHub验证POC(其实前文的分析文章也有)](https://github.com/euphrat1ca/CVE-2020-0618) - [CVE-2020-0767Microsoft ChakraCore脚本引擎【Edge浏览器中的一个开源的ChakraJavaScript脚本引擎的核心部分】安全漏洞](https://github.com/phoenhex/files/blob/master/pocs/cve-2020-0767.js) +- [CVE-2020-0688:微软EXCHANGE服务的远程代码执行漏洞](https://github.com/random-robbie/cve-2020-0688) ## tools-[小工具集合](./tools)