mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
3.2 KiB
3.2 KiB
CVE-2015-1635
Description
HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability."
POC
Reference
- http://packetstormsecurity.com/files/131463/Microsoft-Windows-HTTP.sys-Proof-Of-Concept.html
- https://www.exploit-db.com/exploits/36773/
- https://www.exploit-db.com/exploits/36776/
Github
- https://github.com/20142995/pocsuite3
- https://github.com/ACIC-Africa/metasploitable3
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Aquilao/Toy-Box
- https://github.com/Cappricio-Securities/CVE-2015-1635
- https://github.com/H3xL00m/CVE-2015-1635
- https://github.com/H3xL00m/CVE-2015-1635-POC
- https://github.com/N3rdyN3xus/CVE-2015-1635
- https://github.com/N3rdyN3xus/CVE-2015-1635-POC
- https://github.com/Olysyan/MSS
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/SkinAir/ms15-034-Scan
- https://github.com/Sp3c73rSh4d0w/CVE-2015-1635
- https://github.com/Sp3c73rSh4d0w/CVE-2015-1635-POC
- https://github.com/Zx7ffa4512-Python/Project-CVE-2015-1635
- https://github.com/aedoo/CVE-2015-1635-POC
- https://github.com/ahm3dhany/IDS-Evasion
- https://github.com/akusilvennoinen/cybersecuritybase-project-2
- https://github.com/b1gbroth3r/shoMe
- https://github.com/bongbongco/MS15-034
- https://github.com/c0d3cr4f73r/CVE-2015-1635
- https://github.com/c0d3cr4f73r/CVE-2015-1635-POC
- https://github.com/crypticdante/CVE-2015-1635
- https://github.com/crypticdante/CVE-2015-1635-POC
- https://github.com/halencarjunior/MS15_034
- https://github.com/hanc00l/some_pocsuite
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/jamesb5959/HTTP.sys-Windows-Exec
- https://github.com/jiangminghua/Vulnerability-Remote-Code-Execution
- https://github.com/k4u5h41/CVE-2015-1635
- https://github.com/k4u5h41/CVE-2015-1635-POC
- https://github.com/kh4sh3i/exchange-penetration-testing
- https://github.com/leoambrus/CheckersNomisec
- https://github.com/limkokholefork/CVE-2015-1635
- https://github.com/lnick2023/nicenice
- https://github.com/n3ov4n1sh/CVE-2015-1635
- https://github.com/n3ov4n1sh/CVE-2015-1635-POC
- https://github.com/neu5ron/cve_2015-1635
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/reph0r/Poc-Exp-Tools
- https://github.com/reph0r/Shooting-Range
- https://github.com/reph0r/poc-exp
- https://github.com/reph0r/poc-exp-tools
- https://github.com/shipcod3/HTTPsys_rce
- https://github.com/technion/erlvulnscan
- https://github.com/twekkis/cybersecuritybase-project2
- https://github.com/u0pattern/Remove-IIS-RIIS
- https://github.com/w01ke/CVE-2015-1635-POC
- https://github.com/wiredaem0n/chk-ms15-034
- https://github.com/xPaw/HTTPsys
- https://github.com/xbl3/awesome-cve-poc_qazbnm456