From 42fdeacdc6a957bfc8bc9de15c5828a8fbdf9b49 Mon Sep 17 00:00:00 2001 From: Mrxn Date: Thu, 4 Jun 2020 18:57:01 +0800 Subject: [PATCH] =?UTF-8?q?add=20CVE-2020-9484=EF=BC=9AApache=20Tomcat=20S?= =?UTF-8?q?ession=20=E5=8F=8D=E5=BA=8F=E5=88=97=E5=8C=96=E4=BB=A3=E7=A0=81?= =?UTF-8?q?=E6=89=A7=E8=A1=8C=E6=BC=8F=E6=B4=9E?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 6f2658b..af4ddbe 100644 --- a/README.md +++ b/README.md @@ -154,6 +154,7 @@ - [Fastjson <= 1.2.47 远程命令执行漏洞利用工具及方法](https://github.com/CaijiOrz/fastjson-1.2.47-RCE) - [SpringBoot_Actuator_RCE](https://github.com/jas502n/SpringBoot_Actuator_RCE) - [jizhicms(极致CMS)v1.7.1代码审计-任意文件上传getshell+sql注入+反射XSS](./books/jizhicms(极致CMS)v1.7.1代码审计引发的思考.pdf) +- [CVE-2020-9484:Apache Tomcat Session 反序列化代码执行漏洞](./tools/CVE-2020-9484.tgz) ## 提权辅助相关