From 0a11adddd4dd0d411fe8e6b181209a0691c60d8b Mon Sep 17 00:00:00 2001 From: Mrxn Date: Wed, 11 Mar 2020 10:41:35 +0800 Subject: [PATCH] =?UTF-8?q?add=20Windows-CVE-2020-0796=EF=BC=9A=E7=96=91?= =?UTF-8?q?=E4=BC=BC=E5=BE=AE=E8=BD=AFSMBv3=E5=8D=8F=E8=AE=AE=E2=80=9C?= =?UTF-8?q?=E8=A0=95=E8=99=AB=E7=BA=A7=E2=80=9D=E6=BC=8F=E6=B4=9E?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index e5c39a6..216b980 100644 --- a/README.md +++ b/README.md @@ -168,6 +168,7 @@ - [CVE-2020-0674: Internet Explorer远程代码执行漏洞检测](https://github.com/binaryfigments/CVE-2020-0674) - [CVE-2020-8794: OpenSMTPD 远程命令执行漏洞](./CVE-2020-8794-OpenSMTPD%20远程命令执行漏洞.md) - [Linux平台-CVE-2020-8597: PPPD 远程代码执行漏洞](https://github.com/marcinguy/CVE-2020-8597) +- [Windows-CVE-2020-0796:疑似微软SMBv3协议“蠕虫级”漏洞](https://cert.360.cn/warning/detail?id=04f6a686db24fcfa478498f55f3b79ef)|[相关讨论](https://linustechtips.com/main/topic/1163724-smbv3-remote-code-execution-cve-2020-0796/) ## tools-[小工具集合](./tools)