From 1d436a48377ffd3f7bac828cd0970243e44604f6 Mon Sep 17 00:00:00 2001 From: aron Date: Wed, 24 Feb 2021 14:28:24 +0100 Subject: [PATCH] Add CVE-2015-1635 --- cves/2015/CVE-2015-1635.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 cves/2015/CVE-2015-1635.yaml diff --git a/cves/2015/CVE-2015-1635.yaml b/cves/2015/CVE-2015-1635.yaml new file mode 100644 index 0000000000..05038cda23 --- /dev/null +++ b/cves/2015/CVE-2015-1635.yaml @@ -0,0 +1,23 @@ +id: cve-2015-1635 + +info: + name: CVE-2015-1635 + author: thomas_from_offensity + severity: critical + description: Vulnerability in Windows HTTP.sys Could Allow Remote Code Execution + +requests: + - method: GET + path: + - "{{BaseURL}}" + headers: + Range: "bytes=0-18446744073709551615" + matchers-condition: and + matchers: + - type: status + status: + - 416 + - type: regex + regex: + - "Requested Range Not Satisfiable" + part: all \ No newline at end of file