Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2015-1635

Description

HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability."

POC

Reference

- http://packetstormsecurity.com/files/131463/Microsoft-Windows-HTTP.sys-Proof-Of-Concept.html

- https://www.exploit-db.com/exploits/36773/

- https://www.exploit-db.com/exploits/36776/

Github

- https://github.com/0xwh1pl4sh/CVE-2015-1635

- https://github.com/0xwh1pl4sh/CVE-2015-1635-POC

- https://github.com/20142995/pocsuite3

- https://github.com/ACIC-Africa/metasploitable3

- https://github.com/ARPSyndicate/cvemon

- https://github.com/Aquilao/Toy-Box

- https://github.com/Cappricio-Securities/CVE-2015-1635

- https://github.com/CybVulnHunter/nmap-guidelines

- https://github.com/H3xL00m/CVE-2015-1635

- https://github.com/H3xL00m/CVE-2015-1635-POC

- https://github.com/N-Tech01/TIPS-school-vulnerability-report

- https://github.com/N-Tech01/bug-report-03

- https://github.com/N3rdyN3xus/CVE-2015-1635

- https://github.com/N3rdyN3xus/CVE-2015-1635-POC

- https://github.com/Navarath01/TIPS-school-vulnerability-report

- https://github.com/NyxByt3/CVE-2015-1635

- https://github.com/NyxByt3/CVE-2015-1635-POC

- https://github.com/Olysyan/MSS

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/SkinAir/ms15-034-Scan

- https://github.com/Sp3c73rSh4d0w/CVE-2015-1635

- https://github.com/Sp3c73rSh4d0w/CVE-2015-1635-POC

- https://github.com/Zx7ffa4512-Python/Project-CVE-2015-1635

- https://github.com/aedoo/CVE-2015-1635-POC

- https://github.com/ahm3dhany/IDS-Evasion

- https://github.com/akusilvennoinen/cybersecuritybase-project-2

- https://github.com/b1gbroth3r/shoMe

- https://github.com/bongbongco/MS15-034

- https://github.com/c0d3cr4f73r/CVE-2015-1635

- https://github.com/c0d3cr4f73r/CVE-2015-1635-POC

- https://github.com/crypticdante/CVE-2015-1635

- https://github.com/crypticdante/CVE-2015-1635-POC

- https://github.com/h3x0v3rl0rd/CVE-2015-1635

- https://github.com/h3x0v3rl0rd/CVE-2015-1635-POC

- https://github.com/h3xcr4ck3r/CVE-2015-1635

- https://github.com/h3xcr4ck3r/CVE-2015-1635-POC

- https://github.com/halencarjunior/MS15_034

- https://github.com/hanc00l/some_pocsuite

- https://github.com/hktalent/TOP

- https://github.com/hktalent/bug-bounty

- https://github.com/j4nk3/PoC-Heaven

- https://github.com/jamesb5959/HTTP.sys-Windows-Exec

- https://github.com/jiangminghua/Vulnerability-Remote-Code-Execution

- https://github.com/k4u5h41/CVE-2015-1635

- https://github.com/k4u5h41/CVE-2015-1635-POC

- https://github.com/kh4sh3i/exchange-penetration-testing

- https://github.com/leoambrus/CheckersNomisec

- https://github.com/limkokholefork/CVE-2015-1635

- https://github.com/lnick2023/nicenice

- https://github.com/n0-traces/cve_monitor

- https://github.com/n3ov4n1sh/CVE-2015-1635

- https://github.com/n3ov4n1sh/CVE-2015-1635-POC

- https://github.com/n3rdh4x0r/CVE-2015-1635

- https://github.com/n3rdh4x0r/CVE-2015-1635-POC

- https://github.com/neu5ron/cve_2015-1635

- https://github.com/qazbnm456/awesome-cve-poc

- https://github.com/reph0r/Poc-Exp-Tools

- https://github.com/reph0r/Shooting-Range

- https://github.com/reph0r/poc-exp

- https://github.com/reph0r/poc-exp-tools

- https://github.com/seerat-sawhney/DIGITAL-FORENSICS-REPORT

- https://github.com/shipcod3/HTTPsys_rce

- https://github.com/tanjiti/sec_profile

- https://github.com/technion/erlvulnscan

- https://github.com/twekkis/cybersecuritybase-project2

- https://github.com/u0pattern/Remove-IIS-RIIS

- https://github.com/w01ke/CVE-2015-1635-POC

- https://github.com/wiredaem0n/chk-ms15-034

- https://github.com/xPaw/HTTPsys

- https://github.com/xbl3/awesome-cve-poc_qazbnm456