diff --git a/MS17-010/README.md b/MS17-010/README.md index aacdf42..f5c7d3b 100644 --- a/MS17-010/README.md +++ b/MS17-010/README.md @@ -19,7 +19,9 @@ msf exploit(ms17_010_eternalblue) > run ``` ## References + * [Windows2012上如何通过攻击ETERNALBLUE获得Meterpreter反弹](https://mp.weixin.qq.com/s?__biz=MzI5MzY2MzM0Mw%3D%3D&mid=2247483946&idx=1&sn=cbe2e5a08470d699daeb74d7904581c7&scene=45#wechat_redirect) * [MS17-017: Microsoft Windows 7 SP1 x86 Privilege Escalation Vulnerability](https://securityonline.info/ms17-017-microsoft-windows-7-sp1-x86-privilege-escalation-vulnerability/) * [AutoBlue-MS17-010 - an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010 AKA EternalBlue](https://github.com/3ndG4me/AutoBlue-MS17-010) * [MS17-010 EternalSynergy / EternalRomance / EternalChampion aux+exploit modules #9473](https://github.com/rapid7/metasploit-framework/pull/9473) +* [worawit/MS17-010](https://github.com/worawit/MS17-010) diff --git a/README.md b/README.md index 775fe2c..011b15e 100644 --- a/README.md +++ b/README.md @@ -7,8 +7,15 @@ windows-kernel-exploits *** #### 漏洞列表 + ##### #Security Bulletin   #KB     #Description    #Operating System   +- [CVE-2021-33739](https://github.com/mavillon1/CVE-2021-33739-POC) [Microsoft DWM Core Library Elevation of Privilege Vulnerability] (Windows 10, 20) +- [CVE-2021-1732](https://github.com/KaLendsi/CVE-2021-1732-Exploit) [Windows Win32k Elevation of Privilege Vulnerability] (Windows 10, 2019/20H2) +- [CVE-2020-0787](https://github.com/cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION) [Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability] (Windows 7/8/10, 2008/2012/2016/2019) +- [CVE-2020-0796](https://github.com/danigargu/CVE-2020-0796) [A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'] (Windows 1903/1909) +- [CVE-2019-1458](https://github.com/unamer/CVE-2019-1458) [An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory] (Windows 7/8/10/2008/2012/2016) +- [CVE-2019-0803](https://github.com/ExpLife0011/CVE-2019-0803) [An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory] (Windows 7/8/10/2008/2012/2016/2019) - [CVE-2018-8639](https://github.com/ze0r/CVE-2018-8639-exp) [An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory] (Windows 7/8/10/2008/2012/2016) - [CVE-2018-1038](https://gist.github.com/xpn/3792ec34d712425a5c47caf5677de5fe) [Windows Kernel Elevation of Privilege Vulnerability] (Windows 7 SP1/Windows Server 2008 R2 SP1) - [CVE-2018-0743](https://github.com/saaramar/execve_exploit) [Windows Subsystem for Linux Elevation of Privilege Vulnerability] (Windows 10 version 1703/Windows 10 version 1709/Windows Server version 1709) @@ -76,6 +83,7 @@ windows-kernel-exploits + **ourren**(sina weibo @ourren) + **hx**(sina weibo @hx) + **Bearcat**(github @Bearcat) ++ **CaledoniaProject**(github @CaledoniaProject) ### 免责说明