# N/A
## 漏洞概述
HTTP.sys组件在微软的部分Windows版本中存在一个漏洞,允许远程攻击者通过精心构造的HTTP请求执行任意代码。
## 影响版本
- Windows 7 SP1
- Windows Server 2008 R2 SP1
- Windows 8
- Windows 8.1
- Windows Server 2012
- Windows Server 2012 R2
## 漏洞细节
该漏洞存在于HTTP.sys组件中,攻击者可以通过发送特定格式的HTTP请求来触发该漏洞,并在目标系统上执行任意代码。
## 漏洞影响
远程攻击者可以利用该漏洞在系统上执行任意代码,从而可能获得对系统的完全控制权,造成严重的安全威胁。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | 🔥 A checker site for MS15-034 / CVE-2015-1635 | https://github.com/xPaw/HTTPsys | POC详情 |
2 | CVE-2015-1635,MS15-034 | https://github.com/Zx7ffa4512-Python/Project-CVE-2015-1635 | POC详情 |
3 | Concurrent network scanner for CVE-2015-1635 | https://github.com/technion/erlvulnscan | POC详情 |
4 | Quick and dirty .py for checking (CVE-2015-1635) MS15-034 + DoS attack option | https://github.com/wiredaem0n/chk-ms15-034 | POC详情 |
5 | CVE-2015-1635 | https://github.com/u0pattern/Remove-IIS-RIIS | POC详情 |
6 | CVE-2015-1635 | https://github.com/bongbongco/MS15-034 | POC详情 |
7 | MS15-034 HTTP.sys 远程执行代码检测脚本(MS15-034 HTTP.sys remote execution code poc script) | https://github.com/aedoo/CVE-2015-1635-POC | POC详情 |
8 | MS15-034: HTTP.sys (IIS) DoS | https://github.com/limkokholefork/CVE-2015-1635 | POC详情 |
9 | None | https://github.com/crypticdante/CVE-2015-1635-POC | POC详情 |
10 | None | https://github.com/crypticdante/CVE-2015-1635 | POC详情 |
11 | CVE-2015-1635-POC,指定IP与端口验证HTTP.sys漏洞是否存在 | https://github.com/w01ke/CVE-2015-1635-POC | POC详情 |
12 | ms15-034 or CVE-2015-1635 批量扫描 | https://github.com/SkinAir/ms15-034-Scan | POC详情 |
13 | None | https://github.com/H3xL00m/CVE-2015-1635-POC | POC详情 |
14 | None | https://github.com/H3xL00m/CVE-2015-1635 | POC详情 |
15 | None | https://github.com/n3ov4n1sh/CVE-2015-1635-POC | POC详情 |
16 | None | https://github.com/n3ov4n1sh/CVE-2015-1635 | POC详情 |
17 | None | https://github.com/c0d3cr4f73r/CVE-2015-1635-POC | POC详情 |
18 | None | https://github.com/c0d3cr4f73r/CVE-2015-1635 | POC详情 |
19 | Microsoft Windows 'HTTP.sys' - Remote Code Execution | https://github.com/Cappricio-Securities/CVE-2015-1635 | POC详情 |
20 | None | https://github.com/Sp3c73rSh4d0w/CVE-2015-1635-POC | POC详情 |
21 | None | https://github.com/Sp3c73rSh4d0w/CVE-2015-1635 | POC详情 |
22 | None | https://github.com/0xwh1pl4sh/CVE-2015-1635-POC | POC详情 |
23 | None | https://github.com/0xwh1pl4sh/CVE-2015-1635 | POC详情 |
24 | None | https://github.com/N3rdyN3xus/CVE-2015-1635-POC | POC详情 |
25 | None | https://github.com/N3rdyN3xus/CVE-2015-1635 | POC详情 |
26 | None | https://github.com/NyxByt3/CVE-2015-1635-POC | POC详情 |
27 | None | https://github.com/NyxByt3/CVE-2015-1635 | POC详情 |
28 | None | https://github.com/h3xcr4ck3r/CVE-2015-1635-POC | POC详情 |
29 | None | https://github.com/h3xcr4ck3r/CVE-2015-1635 | POC详情 |
30 | None | https://github.com/n3rdh4x0r/CVE-2015-1635-POC | POC详情 |
31 | None | https://github.com/n3rdh4x0r/CVE-2015-1635 | POC详情 |
32 | HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability." | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2015/CVE-2015-1635.yaml | POC详情 |
33 | None | https://github.com/h3x0v3rl0rd/CVE-2015-1635-POC | POC详情 |
34 | None | https://github.com/h3x0v3rl0rd/CVE-2015-1635 | POC详情 |
暂无评论