Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This is my SNP project where my ID is IT19366128 | https://github.com/SR7-HACKING/LINUX-VULNERABILITY-CVE-2015-1328 | POC Details |
| 2 | compiled CVE-2015-1328 | https://github.com/notlikethis/CVE-2015-1328 | POC Details |
| 3 | kernel exploit | https://github.com/0x1ns4n3/CVE-2015-1328-GoldenEye | POC Details |
| 4 | None | https://github.com/BlackFrog-hub/cve-2015-1328 | POC Details |
| 5 | kernel exploit | https://github.com/elit3pwner/CVE-2015-1328-GoldenEye | POC Details |
| 6 | CVE: 2015-1328 On python test | https://github.com/YastrebX/CVE-2015-1328 | POC Details |
| 7 | None | https://github.com/devtz007/overlayfs_CVE-2015-1328 | POC Details |
| 8 | None | https://github.com/1mgR00T/CVE-2015-1328 | POC Details |
| 9 | Custom vulnerable VM (Ubuntu 14.04) designed for teaching multi-stage penetration testing. Features 10 interconnected challenges across Forensics, Web Exploitation (SQLi, XSS), Cryptography, and Kernel Exploitation (OverlayFS/CVE-2015-1328) to achieve full root compromise. | https://github.com/thieveshkar/RootQuest-CTF-Box-Multi-Stage-Exploitation-VM | POC Details |
| 10 | A Proof of Concept (PoC) exploit for CVE-2015-1328 | https://github.com/0xf1d0/CVE-2015-1328 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet