From 1f6fd14be90922b4431b335cec86dac99df3c3b0 Mon Sep 17 00:00:00 2001 From: Mrxn Date: Thu, 17 Nov 2022 18:52:43 +0800 Subject: [PATCH] =?UTF-8?q?add=20ProxyNotShell-PoC=EF=BC=9APoC=20for=20CVE?= =?UTF-8?q?-2022-41040=20and=20CVE-2022-41082=20Microsoft=20Exchange=20Ser?= =?UTF-8?q?ver=20RCE?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This reverts commit bd01969a4e7f06756610cd6365e1a315daf65933. --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index c6b1bd6..ac367eb 100644 --- a/README.md +++ b/README.md @@ -546,7 +546,7 @@ - [CVE-2022-34718:TCP/IP RCE POC](https://github.com/numencyber/VulnerabilityPoC/blob/main/CVE-2022-34718/poc.cpp)|[分析](https://medium.com/@numencyberlabs/analysis-and-summary-of-tcp-ip-protocol-remote-code-execution-vulnerability-cve-2022-34718-8fcc28538acf) -- [ProxyNotShell-PoC:PoC for CVE-2022-41040 and CVE-2022-41082 Microsoft Exchange Server RCE](https://github.com/Mr-xn/ProxyNotShell-PoC) +- [ProxyNotShell-PoC:PoC for CVE-2022-41040 and CVE-2022-41082 Microsoft Exchange Server RCE](https://github.com/testanull/ProxyNotShell-PoC) ## tools-小工具集版本合