From 83052de059d46fa2a4329807b1914939f9678b99 Mon Sep 17 00:00:00 2001 From: Mrxn Date: Sun, 31 May 2020 22:55:06 +0800 Subject: [PATCH] =?UTF-8?q?add=20=E3=80=90Windows=E6=8F=90=E6=9D=83?= =?UTF-8?q?=E3=80=91CVE-2020-1066-EXP?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index bd628b4..22092eb 100644 --- a/README.md +++ b/README.md @@ -184,6 +184,7 @@ - [【Windows bypass UAC】UACME-一种集成了60多种Bypass UAC的方法](https://github.com/hfiref0x/UACME) - [CVE-2020–1088: Windows wersvc.dll 任意文件删除本地提权漏洞分析](https://medium.com/csis-techblog/cve-2020-1088-yet-another-arbitrary-delete-eop-a00b97d8c3e2) - [【Windows提权】CVE-2019-0863-Windows中错误报告机制导致的提权-EXP](https://github.com/sailay1996/WerTrigger) +- [【Windows提权】CVE-2020-1066-EXP](https://github.com/cbwang505/CVE-2020-1066-EXP) ## PC