From 60571130a933f2f1521cd3bbcd2f00f8de8d6451 Mon Sep 17 00:00:00 2001 From: Mrxn Date: Fri, 28 Feb 2020 14:41:07 +0800 Subject: [PATCH] =?UTF-8?q?add=20CVE-2020-0688=5FEXP---=E5=8F=A6=E4=B8=80?= =?UTF-8?q?=E4=B8=AA=E6=BC=8F=E6=B4=9E=E6=A3=80=E6=B5=8B=E5=88=A9=E7=94=A8?= =?UTF-8?q?=E8=84=9A=E6=9C=AC?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 3df207c..0371b8f 100644 --- a/README.md +++ b/README.md @@ -154,7 +154,7 @@ - [CVE-2020-0728-Windows Modules Installer Service 信息泄露漏洞](https://github.com/irsl/CVE-2020-0728/) - [CVE-2020-0618: 微软 SQL Server Reporting Services远程代码执行(RCE)漏洞](https://www.mdsec.co.uk/2020/02/cve-2020-0618-rce-in-sql-server-reporting-services-ssrs/)|[GitHub验证POC(其实前文的分析文章也有)](https://github.com/euphrat1ca/CVE-2020-0618) - [CVE-2020-0767Microsoft ChakraCore脚本引擎【Edge浏览器中的一个开源的ChakraJavaScript脚本引擎的核心部分】安全漏洞](https://github.com/phoenhex/files/blob/master/pocs/cve-2020-0767.js) -- [CVE-2020-0688:微软EXCHANGE服务的远程代码执行漏洞](https://github.com/random-robbie/cve-2020-0688) +- [CVE-2020-0688:微软EXCHANGE服务的远程代码执行漏洞](https://github.com/random-robbie/cve-2020-0688)|[CVE-2020-0688_EXP---另一个漏洞检测利用脚本](https://github.com/Yt1g3r/CVE-2020-0688_EXP) ## tools-[小工具集合](./tools)