From 5ceeedcf30a0bbf877c3a900f3d3dae929a0e67f Mon Sep 17 00:00:00 2001 From: Mrxn Date: Thu, 26 Mar 2020 17:09:18 +0800 Subject: [PATCH] =?UTF-8?q?add=20Django=5FCVE-2020-9402=5FGeo=5FSQL?= =?UTF-8?q?=E6=B3=A8=E5=85=A5=E5=88=86=E6=9E=90&CVE-2020-10189=5FZoho=5FMa?= =?UTF-8?q?nageEngine=5FDesktop=5FCentral=5F10=E5=8F=8D=E5=BA=8F=E5=88=97?= =?UTF-8?q?=E5=8C=96=E8=BF=9C=E7=A8=8B=E4=BB=A3=E7=A0=81=E6=89=A7=E8=A1=8C?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/README.md b/README.md index 6cad327..ee61984 100644 --- a/README.md +++ b/README.md @@ -307,6 +307,8 @@ - [渗透测试神器Cobalt Strike使用教程](./books/渗透测试神器Cobalt%20Strike使用教程.pdf) - [Cobalt Strike的teamserver在Windows上快速启动脚本](./books/CS_teamserver_win.md) - [ThinkPHP v6.0.0_6.0.1 任意文件操作漏洞分析](./books/ThinkPHP%20v6.0.0_6.0.1%20任意文件操作漏洞分析.pdf) +- [Django_CVE-2020-9402_Geo_SQL注入分析](./books/Django_CVE-2020-9402_Geo_SQL注入分析.pdf) +- [CVE-2020-10189_Zoho_ManageEngine_Desktop_Central_10反序列化远程代码执行](./books/CVE-2020-10189_Zoho_ManageEngine_Desktop_Central_10反序列化远程代码执行.pdf) ## 说明