From c8b994417c7b92645e155588a9bd1a168dd6dbe5 Mon Sep 17 00:00:00 2001 From: mr-xn Date: Thu, 16 Jan 2020 22:07:10 +0800 Subject: [PATCH] =?UTF-8?q?add=20CVE-2020-2696=20=E2=80=93=20Local=20privi?= =?UTF-8?q?lege=20escalation=20via=20CDE=20dtsession?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index c4ddc7d..fef2e76 100644 --- a/README.md +++ b/README.md @@ -119,6 +119,7 @@ - [Linux提权-CVE-2019-13272 A linux kernel Local Root Privilege Escalation vulnerability with PTRACE_TRACEME](https://github.com/jiayy/android_vuln_poc-exp/tree/master/EXP-CVE-2019-13272-aarch64) - [Linux权限提升辅助一键检测工具](https://github.com/mzet-/linux-exploit-suggester) - [将powershell脚本直接注入到进程中执行来绕过对powershell.exe的限制](https://github.com/EmpireProject/PSInject) +- [CVE-2020-2696 – Local privilege escalation via CDE dtsession](https://github.com/0xdea/exploits/blob/master/solaris/raptor_dtsession_ipa.c) ## PC