### [CVE-2015-1701](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1701) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability." ### POC #### Reference - http://seclists.org/fulldisclosure/2020/May/34 - https://www.exploit-db.com/exploits/37049/ - https://www.exploit-db.com/exploits/37367/ #### Github - https://github.com/0xcyberpj/windows-exploitation - https://github.com/0xpetros/windows-privilage-escalation - https://github.com/55-AA/CVE-2015-0057 - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/WindowsElevation - https://github.com/Anonymous-Family/CVE-2015-1701 - https://github.com/Anonymous-Family/CVE-2015-1701-download - https://github.com/Ascotbe/Kernelhub - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/CrackerCat/Kernel-Security-Development - https://github.com/Cruxer8Mech/Idk - https://github.com/Err0r-ICA/Pentest-Tips - https://github.com/ExpLife0011/awesome-windows-kernel-security-development - https://github.com/FULLSHADE/WindowsExploitationResources - https://github.com/GhostTroops/TOP - https://github.com/IAmAnubhavSaini/wes.py3 - https://github.com/IMCG/awesome-c - https://github.com/JERRY123S/all-poc - https://github.com/MustafaNafizDurukan/WindowsKernelExploitationResources - https://github.com/NitroA/windowsexpoitationresources - https://github.com/NullArray/WinKernel-Resources - https://github.com/Ondrik8/exploit - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/Singhsanjeev617/A-Red-Teamer-diaries - https://github.com/SoulSec/Resource-Threat-Intelligence - https://github.com/TamilHackz/windows-exploitation - https://github.com/YSheldon/New - https://github.com/ambynotcoder/C-libraries - https://github.com/binkeys/k8tools - https://github.com/blackend/Diario-RedTem - https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/fei9747/WindowsElevation - https://github.com/gaearrow/windows-lpe-lite - https://github.com/hfiref0x/CVE-2015-1701 - https://github.com/hktalent/TOP - https://github.com/howknows/awesome-windows-security-development - https://github.com/ihebski/A-Red-Teamer-diaries - https://github.com/jbmihoub/all-poc - https://github.com/liuhe3647/Windows - https://github.com/lushtree-cn-honeyzhao/awesome-c - https://github.com/lyshark/Windows-exploits - https://github.com/nvwa-xt/spider - https://github.com/pandazheng/Threat-Intelligence-Analyst - https://github.com/pr0code/https-github.com-ExpLife0011-awesome-windows-kernel-security-development - https://github.com/pravinsrc/NOTES-windows-kernel-links - https://github.com/puckiestyle/A-Red-Teamer-diaries - https://github.com/rayhan0x01/reverse-shell-able-exploit-pocs - https://github.com/tronghieu220403/Common-Vulnerabilities-and-Exposures-Reports - https://github.com/tufanturhan/Red-Teamer-Diaries - https://github.com/weeka10/-hktalent-TOP - https://github.com/whitfieldsdad/cisa_kev - https://github.com/wyrover/win-sys - https://github.com/ycdxsb/WindowsPrivilegeEscalation