You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2
Original file line number
Diff line number
Diff line change
@@ -9,6 +9,8 @@ windows-kernel-exploits
9
9
#### 漏洞列表
10
10
11
11
##### #Security Bulletin #KB #Description #Operating System
12
+
13
+
-[CVE-2021-1732](https://github.com/KaLendsi/CVE-2021-1732-Exploit)[Windows Win32k Elevation of Privilege Vulnerability] (Windows 10, 2019/20H2)
12
14
-[CVE-2020-0787](https://github.com/cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION)[Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability] (Windows 7/8/10, 2008/2012/2016/2019)
13
15
-[CVE-2020-0796](https://github.com/danigargu/CVE-2020-0796)[A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'] (Windows 1903/1909)
14
16
-[CVE-2019-1458](https://github.com/unamer/CVE-2019-1458)[An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory] (Windows 7/8/10/2008/2012/2016)
0 commit comments