From e5c3e53d67fb97e864b8a987bd84b7bc4e886638 Mon Sep 17 00:00:00 2001 From: Mrxn Date: Thu, 21 May 2020 11:41:43 +0800 Subject: [PATCH] =?UTF-8?q?add=20=E3=80=90Windows=E6=8F=90=E6=9D=83?= =?UTF-8?q?=E3=80=91CVE-2019-0863-Windows=E4=B8=AD=E9=94=99=E8=AF=AF?= =?UTF-8?q?=E6=8A=A5=E5=91=8A=E6=9C=BA=E5=88=B6=E5=AF=BC=E8=87=B4=E7=9A=84?= =?UTF-8?q?=E6=8F=90=E6=9D=83-EXP?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 8142490..0ff3b95 100644 --- a/README.md +++ b/README.md @@ -182,6 +182,7 @@ - [【Windows提权】-CVE-2020-1048 | PrintDemon本地提权漏洞-漏洞影响自1996年以来发布(Windows NT 4)的所有Windows版本](https://github.com/ionescu007/PrintDemon) - [【Windows bypass UAC】UACME-一种集成了60多种Bypass UAC的方法](https://github.com/hfiref0x/UACME) - [CVE-2020–1088: Windows wersvc.dll 任意文件删除本地提权漏洞分析](https://medium.com/csis-techblog/cve-2020-1088-yet-another-arbitrary-delete-eop-a00b97d8c3e2) +- [【Windows提权】CVE-2019-0863-Windows中错误报告机制导致的提权-EXP](https://github.com/sailay1996/WerTrigger) ## PC