From 060d3468296d9aae9ce1328a4ec8dfe47c883e4b Mon Sep 17 00:00:00 2001 From: mr-xn Date: Tue, 14 Jan 2020 22:00:38 +0800 Subject: [PATCH] =?UTF-8?q?add=20Mysql=20Client=20=E4=BB=BB=E6=84=8F?= =?UTF-8?q?=E6=96=87=E4=BB=B6=E8=AF=BB=E5=8F=96=E6=94=BB=E5=87=BB=E9=93=BE?= =?UTF-8?q?=E6=8B=93=E5=B1=95?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 515f1c3..e5d5897 100644 --- a/README.md +++ b/README.md @@ -103,6 +103,7 @@ - [WDJACMS1.5.2模板注入漏洞](./WDJACMS1.5.2模板注入漏洞.md) - [CVE-2019-19781-Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway](https://github.com/projectzeroindia/CVE-2019-19781) - [CVE-2019-19781.nse---use Nmap check Citrix ADC Remote Code Execution](https://github.com/cyberstruggle/DeltaGroup/tree/master/CVE-2019-19781) +- [Mysql Client 任意文件读取攻击链拓展](https://paper.seebug.org/1112/) ## 提权辅助相关