Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/panyu6325/CVE-2015-1805 | POC Details |
| 2 | CVE-2015-1805 root tool | https://github.com/dosomder/iovyroot | POC Details |
| 3 | None | https://github.com/FloatingGuy/cve-2015-1805 | POC Details |
| 4 | A root tool based on the [CVE-2015-1805 vulnerability](https://access.redhat.com/security/cve/cve-2015-1805) It supports 32 and 64bit, get sys call table address via swi. | https://github.com/mobilelinux/iovy_root_research | POC Details |
| 5 | AndroRAT is a capability that can be used to inject a root exploit as a silent installation to perform a malicious task on the device. This AndroRAT is designed to exploit CVE-2015-1805, a vulnerability that was discovered and made public in 2016. | https://github.com/ireshchaminda1/Android-Privilege-Escalation-Remote-Access-Vulnerability-CVE-2015-1805 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2015-2897 | Sierra Wireless ALEOS 信息泄露漏洞 | |
| CVE-2015-2980 | Yodobashi Camera Yodobashi for Android 信息泄露漏洞 | |
| CVE-2015-2744 | Mozilla Firefox OS Gaia 跨站脚本漏洞 | |
| CVE-2015-2745 | Mozilla Firefox OS Gaia 跨站脚本漏洞 | |
| CVE-2015-4494 | Mozilla Firefox OS 信息泄露漏洞 | |
| CVE-2015-4495 | 多款Mozilla产品PDF阅读器安全漏洞 | |
| CVE-2015-5960 | Mozilla Firefox OS 安全绕过漏洞 | |
| CVE-2015-5961 | Mozilla Firefox OS 权限许可和访问控制漏洞 | |
| CVE-2015-5962 | Mozilla Firefox OS graphics layer 数字错误漏洞 |
No comments yet