diff --git a/MS17-010/README.md b/MS17-010/README.md index aacdf42..f5c7d3b 100644 --- a/MS17-010/README.md +++ b/MS17-010/README.md @@ -19,7 +19,9 @@ msf exploit(ms17_010_eternalblue) > run ``` ## References + * [Windows2012上如何通过攻击ETERNALBLUE获得Meterpreter反弹](https://mp.weixin.qq.com/s?__biz=MzI5MzY2MzM0Mw%3D%3D&mid=2247483946&idx=1&sn=cbe2e5a08470d699daeb74d7904581c7&scene=45#wechat_redirect) * [MS17-017: Microsoft Windows 7 SP1 x86 Privilege Escalation Vulnerability](https://securityonline.info/ms17-017-microsoft-windows-7-sp1-x86-privilege-escalation-vulnerability/) * [AutoBlue-MS17-010 - an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010 AKA EternalBlue](https://github.com/3ndG4me/AutoBlue-MS17-010) * [MS17-010 EternalSynergy / EternalRomance / EternalChampion aux+exploit modules #9473](https://github.com/rapid7/metasploit-framework/pull/9473) +* [worawit/MS17-010](https://github.com/worawit/MS17-010) diff --git a/README.md b/README.md index 0004bf7..011b15e 100644 --- a/README.md +++ b/README.md @@ -9,6 +9,9 @@ windows-kernel-exploits #### 漏洞列表 ##### #Security Bulletin   #KB     #Description    #Operating System   + +- [CVE-2021-33739](https://github.com/mavillon1/CVE-2021-33739-POC) [Microsoft DWM Core Library Elevation of Privilege Vulnerability] (Windows 10, 20) +- [CVE-2021-1732](https://github.com/KaLendsi/CVE-2021-1732-Exploit) [Windows Win32k Elevation of Privilege Vulnerability] (Windows 10, 2019/20H2) - [CVE-2020-0787](https://github.com/cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION) [Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability] (Windows 7/8/10, 2008/2012/2016/2019) - [CVE-2020-0796](https://github.com/danigargu/CVE-2020-0796) [A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'] (Windows 1903/1909) - [CVE-2019-1458](https://github.com/unamer/CVE-2019-1458) [An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory] (Windows 7/8/10/2008/2012/2016)