mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
3.5 KiB
3.5 KiB
CVE-2015-1701
Description
Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."
POC
Reference
- http://seclists.org/fulldisclosure/2020/May/34
- https://www.exploit-db.com/exploits/37049/
- https://www.exploit-db.com/exploits/37367/
Github
- https://github.com/0xcyberpj/windows-exploitation
- https://github.com/0xpetros/windows-privilage-escalation
- https://github.com/55-AA/CVE-2015-0057
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Anonymous-Family/CVE-2015-1701
- https://github.com/Anonymous-Family/CVE-2015-1701-download
- https://github.com/Ascotbe/Kernelhub
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/CrackerCat/Kernel-Security-Development
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Err0r-ICA/Pentest-Tips
- https://github.com/ExpLife0011/awesome-windows-kernel-security-development
- https://github.com/FULLSHADE/WindowsExploitationResources
- https://github.com/GhostTroops/TOP
- https://github.com/IAmAnubhavSaini/wes.py3
- https://github.com/IMCG/awesome-c
- https://github.com/JERRY123S/all-poc
- https://github.com/MustafaNafizDurukan/WindowsKernelExploitationResources
- https://github.com/NitroA/windowsexpoitationresources
- https://github.com/NullArray/WinKernel-Resources
- https://github.com/Ondrik8/exploit
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Singhsanjeev617/A-Red-Teamer-diaries
- https://github.com/SoulSec/Resource-Threat-Intelligence
- https://github.com/TamilHackz/windows-exploitation
- https://github.com/YSheldon/New
- https://github.com/ambynotcoder/C-libraries
- https://github.com/binkeys/k8tools
- https://github.com/blackend/Diario-RedTem
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/fei9747/WindowsElevation
- https://github.com/gaearrow/windows-lpe-lite
- https://github.com/hfiref0x/CVE-2015-1701
- https://github.com/hktalent/TOP
- https://github.com/howknows/awesome-windows-security-development
- https://github.com/ihebski/A-Red-Teamer-diaries
- https://github.com/jbmihoub/all-poc
- https://github.com/liuhe3647/Windows
- https://github.com/lushtree-cn-honeyzhao/awesome-c
- https://github.com/lyshark/Windows-exploits
- https://github.com/nvwa-xt/spider
- https://github.com/pandazheng/Threat-Intelligence-Analyst
- https://github.com/pr0code/https-github.com-ExpLife0011-awesome-windows-kernel-security-development
- https://github.com/pravinsrc/NOTES-windows-kernel-links
- https://github.com/puckiestyle/A-Red-Teamer-diaries
- https://github.com/rayhan0x01/reverse-shell-able-exploit-pocs
- https://github.com/tronghieu220403/Common-Vulnerabilities-and-Exposures-Reports
- https://github.com/tufanturhan/Red-Teamer-Diaries
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/whitfieldsdad/cisa_kev
- https://github.com/wyrover/win-sys
- https://github.com/ycdxsb/WindowsPrivilegeEscalation