From 3bdece7bd217aa9dec288df7f303c4b5d0056d27 Mon Sep 17 00:00:00 2001 From: Aaron Lewis Date: Sun, 12 Jul 2020 10:47:18 +0800 Subject: [PATCH 1/3] Update README.md --- MS17-010/README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/MS17-010/README.md b/MS17-010/README.md index aacdf42..f5c7d3b 100644 --- a/MS17-010/README.md +++ b/MS17-010/README.md @@ -19,7 +19,9 @@ msf exploit(ms17_010_eternalblue) > run ``` ## References + * [Windows2012上如何通过攻击ETERNALBLUE获得Meterpreter反弹](https://mp.weixin.qq.com/s?__biz=MzI5MzY2MzM0Mw%3D%3D&mid=2247483946&idx=1&sn=cbe2e5a08470d699daeb74d7904581c7&scene=45#wechat_redirect) * [MS17-017: Microsoft Windows 7 SP1 x86 Privilege Escalation Vulnerability](https://securityonline.info/ms17-017-microsoft-windows-7-sp1-x86-privilege-escalation-vulnerability/) * [AutoBlue-MS17-010 - an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010 AKA EternalBlue](https://github.com/3ndG4me/AutoBlue-MS17-010) * [MS17-010 EternalSynergy / EternalRomance / EternalChampion aux+exploit modules #9473](https://github.com/rapid7/metasploit-framework/pull/9473) +* [worawit/MS17-010](https://github.com/worawit/MS17-010) From 06b208e316ba1601905214bc9a53e01a637c2646 Mon Sep 17 00:00:00 2001 From: CaledoniaProject Date: Tue, 9 Mar 2021 18:55:12 +0800 Subject: [PATCH 2/3] Update README.md --- README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/README.md b/README.md index 0004bf7..3f51698 100644 --- a/README.md +++ b/README.md @@ -9,6 +9,8 @@ windows-kernel-exploits #### 漏洞列表 ##### #Security Bulletin   #KB     #Description    #Operating System   + +- [CVE-2021-1732](https://github.com/KaLendsi/CVE-2021-1732-Exploit) [Windows Win32k Elevation of Privilege Vulnerability] (Windows 10, 2019/20H2) - [CVE-2020-0787](https://github.com/cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION) [Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability] (Windows 7/8/10, 2008/2012/2016/2019) - [CVE-2020-0796](https://github.com/danigargu/CVE-2020-0796) [A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'] (Windows 1903/1909) - [CVE-2019-1458](https://github.com/unamer/CVE-2019-1458) [An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory] (Windows 7/8/10/2008/2012/2016) From 2b944b52ee30f8833a21f0805d2627ca1f15383a Mon Sep 17 00:00:00 2001 From: CaledoniaProject Date: Fri, 11 Jun 2021 23:29:15 +0000 Subject: [PATCH 3/3] Update README.md --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 3f51698..011b15e 100644 --- a/README.md +++ b/README.md @@ -10,6 +10,7 @@ windows-kernel-exploits ##### #Security Bulletin   #KB     #Description    #Operating System   +- [CVE-2021-33739](https://github.com/mavillon1/CVE-2021-33739-POC) [Microsoft DWM Core Library Elevation of Privilege Vulnerability] (Windows 10, 20) - [CVE-2021-1732](https://github.com/KaLendsi/CVE-2021-1732-Exploit) [Windows Win32k Elevation of Privilege Vulnerability] (Windows 10, 2019/20H2) - [CVE-2020-0787](https://github.com/cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION) [Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability] (Windows 7/8/10, 2008/2012/2016/2019) - [CVE-2020-0796](https://github.com/danigargu/CVE-2020-0796) [A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'] (Windows 1903/1909)