CVE-2015-1635
CRITICAL KEV NUCLEIMS15-034 HTTP Protocol Stack Request Handling Denial-of-Service
Title source: metasploitDescription
HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability."
Exploits (21)
exploitdb
WORKING POC
by laurent gaffie · pythondoswindows
https://www.exploit-db.com/exploits/36776
nomisec
SCANNER
2 stars
by Zx7ffa4512-Python · dos
https://github.com/Zx7ffa4512-Python/Project-CVE-2015-1635
nomisec
SCANNER
1 stars
by Cappricio-Securities · poc
https://github.com/Cappricio-Securities/CVE-2015-1635
metasploit
WORKING POC
by Bill Finlayson, sinn3r · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb
metasploit
WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/ms15_034_http_sys_memory_dump.rb
Nuclei Templates (1)
Microsoft Windows 'HTTP.sys' - Remote Code Execution
CRITICALVERIFIEDby Phillipo
Shodan:
"Microsoft-IIS" "2015" || "microsoft-iis" "2015" || cpe:"cpe:2.3:o:microsoft:windows_7"
References (8)
Scores
CVSS v3
9.8
EPSS
0.9431
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2022-02-10
VulnCheck KEV
2021-04-12
InTheWild.io
2022-02-10
ENISA EUVD
EUVD-2015-1765
CWE
CWE-94
Status
published
Products (6)
microsoft/windows_7
microsoft/windows_8
microsoft/windows_8.1
microsoft/windows_server_2008
r2 sp1 (2 CPE variants)
microsoft/windows_server_2012
microsoft/windows_server_2012
r2
Published
Apr 14, 2015
KEV Added
Feb 10, 2022
Tracked Since
Feb 18, 2026