From 12e4963e64dcdbdab3bf3cd2dd70ccb890e23477 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E4=B8=9C=E6=96=B9=E6=9C=89=E9=B1=BC=E5=90=8D=E4=B8=BA?= =?UTF-8?q?=E5=92=B8?= Date: Fri, 23 Dec 2022 10:34:17 +0800 Subject: [PATCH] =?UTF-8?q?add=20=E3=80=90Linux=20=E6=8F=90=E6=9D=83?= =?UTF-8?q?=E3=80=91CVE-2022-2602?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Linux io_uring子系统UAF漏洞漏洞利用POC,可用于本地提权 --- README.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/README.md b/README.md index d3a2808..bc67c73 100644 --- a/README.md +++ b/README.md @@ -467,6 +467,8 @@ - [【Linux提权】CVE-2021-3490:Linux kernel 缓冲区错误漏洞](https://github.com/chompie1337/Linux_LPE_eBPF_CVE-2021-3490) +- [【Linux 提权】CVE-2022-2602: Linux io_uring子系统UAF漏洞漏洞利用POC,可用于本地提权](https://github.com/LukeGix/CVE-2022-2602) + - [CVE-2021-34473:Microsoft Exchange Server Remote Code Execution](https://github.com/phamphuqui1998/CVE-2021-34473)|[proxyshell-auto:自动化的ProxyShell漏洞利用](https://github.com/Udyz/proxyshell-auto) - [【Linux 提权】CVE-2021-33909:Linux kernel 本地提权漏洞](https://github.com/ChrisTheCoolHut/CVE-2021-33909) @@ -553,6 +555,7 @@ - [CVE-2022-28672: Foxit PDF Reader Remote Code Execution Exploit](https://github.com/hacksysteam/CVE-2022-28672) + ## tools-小工具集版本合 - [java环境下任意文件下载情况自动化读取源码的小工具](https://github.com/Artemis1029/Java_xmlhack)