尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/panyu6325/CVE-2015-1805 | POC详情 |
| 2 | CVE-2015-1805 root tool | https://github.com/dosomder/iovyroot | POC详情 |
| 3 | None | https://github.com/FloatingGuy/cve-2015-1805 | POC详情 |
| 4 | A root tool based on the [CVE-2015-1805 vulnerability](https://access.redhat.com/security/cve/cve-2015-1805) It supports 32 and 64bit, get sys call table address via swi. | https://github.com/mobilelinux/iovy_root_research | POC详情 |
| 5 | AndroRAT is a capability that can be used to inject a root exploit as a silent installation to perform a malicious task on the device. This AndroRAT is designed to exploit CVE-2015-1805, a vulnerability that was discovered and made public in 2016. | https://github.com/ireshchaminda1/Android-Privilege-Escalation-Remote-Access-Vulnerability-CVE-2015-1805 | POC详情 |
未找到公开 POC。
登录以生成 AI POC

| CVE-2015-2897 | Sierra Wireless ALEOS 信息泄露漏洞 | |
| CVE-2015-2980 | Yodobashi Camera Yodobashi for Android 信息泄露漏洞 | |
| CVE-2015-2744 | Mozilla Firefox OS Gaia 跨站脚本漏洞 | |
| CVE-2015-2745 | Mozilla Firefox OS Gaia 跨站脚本漏洞 | |
| CVE-2015-4494 | Mozilla Firefox OS 信息泄露漏洞 | |
| CVE-2015-4495 | 多款Mozilla产品PDF阅读器安全漏洞 | |
| CVE-2015-5960 | Mozilla Firefox OS 安全绕过漏洞 | |
| CVE-2015-5961 | Mozilla Firefox OS 权限许可和访问控制漏洞 | |
| CVE-2015-5962 | Mozilla Firefox OS graphics layer 数字错误漏洞 |
暂无评论