mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-23 06:39:42 +02:00
70 lines
3.1 KiB
Markdown
70 lines
3.1 KiB
Markdown
### [CVE-2015-1635](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1635)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability."
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/131463/Microsoft-Windows-HTTP.sys-Proof-Of-Concept.html
|
|
- https://www.exploit-db.com/exploits/36773/
|
|
- https://www.exploit-db.com/exploits/36776/
|
|
|
|
#### Github
|
|
- https://github.com/20142995/pocsuite3
|
|
- https://github.com/ACIC-Africa/metasploitable3
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/Aquilao/Toy-Box
|
|
- https://github.com/Cappricio-Securities/CVE-2015-1635
|
|
- https://github.com/H3xL00m/CVE-2015-1635
|
|
- https://github.com/H3xL00m/CVE-2015-1635-POC
|
|
- https://github.com/Olysyan/MSS
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
|
- https://github.com/SkinAir/ms15-034-Scan
|
|
- https://github.com/Sp3c73rSh4d0w/CVE-2015-1635
|
|
- https://github.com/Sp3c73rSh4d0w/CVE-2015-1635-POC
|
|
- https://github.com/Zx7ffa4512-Python/Project-CVE-2015-1635
|
|
- https://github.com/aedoo/CVE-2015-1635-POC
|
|
- https://github.com/ahm3dhany/IDS-Evasion
|
|
- https://github.com/akusilvennoinen/cybersecuritybase-project-2
|
|
- https://github.com/b1gbroth3r/shoMe
|
|
- https://github.com/bongbongco/MS15-034
|
|
- https://github.com/c0d3cr4f73r/CVE-2015-1635
|
|
- https://github.com/c0d3cr4f73r/CVE-2015-1635-POC
|
|
- https://github.com/crypticdante/CVE-2015-1635
|
|
- https://github.com/crypticdante/CVE-2015-1635-POC
|
|
- https://github.com/halencarjunior/MS15_034
|
|
- https://github.com/hanc00l/some_pocsuite
|
|
- https://github.com/hktalent/TOP
|
|
- https://github.com/hktalent/bug-bounty
|
|
- https://github.com/jamesb5959/HTTP.sys-Windows-Exec
|
|
- https://github.com/jiangminghua/Vulnerability-Remote-Code-Execution
|
|
- https://github.com/k4u5h41/CVE-2015-1635
|
|
- https://github.com/k4u5h41/CVE-2015-1635-POC
|
|
- https://github.com/kh4sh3i/exchange-penetration-testing
|
|
- https://github.com/leoambrus/CheckersNomisec
|
|
- https://github.com/limkokholefork/CVE-2015-1635
|
|
- https://github.com/lnick2023/nicenice
|
|
- https://github.com/n3ov4n1sh/CVE-2015-1635
|
|
- https://github.com/n3ov4n1sh/CVE-2015-1635-POC
|
|
- https://github.com/neu5ron/cve_2015-1635
|
|
- https://github.com/qazbnm456/awesome-cve-poc
|
|
- https://github.com/reph0r/Poc-Exp-Tools
|
|
- https://github.com/reph0r/Shooting-Range
|
|
- https://github.com/reph0r/poc-exp
|
|
- https://github.com/reph0r/poc-exp-tools
|
|
- https://github.com/shipcod3/HTTPsys_rce
|
|
- https://github.com/technion/erlvulnscan
|
|
- https://github.com/twekkis/cybersecuritybase-project2
|
|
- https://github.com/u0pattern/Remove-IIS-RIIS
|
|
- https://github.com/w01ke/CVE-2015-1635-POC
|
|
- https://github.com/wiredaem0n/chk-ms15-034
|
|
- https://github.com/xPaw/HTTPsys
|
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
|
|