From dbaffa7293a77a4d7dcc53f2fa338bda44034c5f Mon Sep 17 00:00:00 2001 From: Mrxn Date: Mon, 15 Jun 2020 15:09:09 +0800 Subject: [PATCH] =?UTF-8?q?add=20MS=20Windows=20OLE=20=E8=BF=9C=E7=A8=8B?= =?UTF-8?q?=E4=BB=A3=E7=A0=81=E6=89=A7=E8=A1=8C=E6=BC=8F=E6=B4=9E(CVE-2020?= =?UTF-8?q?-1281)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 524f675..f8b255f 100644 --- a/README.md +++ b/README.md @@ -222,6 +222,7 @@ - [【免杀】Cobalt Strike插件,用于快速生成免杀的可执行文件](https://github.com/hack2fun/BypassAV) - [CVE-2020-0674:Internet Explorer UAF 漏洞exp【在64位的win7测试了IE 8, 9, 10, and 11】](https://github.com/maxpl0it/CVE-2020-0674-Exploit) - [SMBGhost_AutomateExploitation-SMBGhost (CVE-2020-0796) Automate Exploitation and Detection](https://github.com/Barriuso/SMBGhost_AutomateExploitation) +- [MS Windows OLE 远程代码执行漏洞(CVE-2020-1281)](https://github.com/guhe120/Windows-EoP/tree/master/CVE-2020-1281) ## tools-小工具集合