Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/panyu6325/CVE-2015-1805 | POC Details |
| 2 | CVE-2015-1805 root tool | https://github.com/dosomder/iovyroot | POC Details |
| 3 | None | https://github.com/FloatingGuy/cve-2015-1805 | POC Details |
| 4 | A root tool based on the [CVE-2015-1805 vulnerability](https://access.redhat.com/security/cve/cve-2015-1805) It supports 32 and 64bit, get sys call table address via swi. | https://github.com/mobilelinux/iovy_root_research | POC Details |
| 5 | AndroRAT is a capability that can be used to inject a root exploit as a silent installation to perform a malicious task on the device. This AndroRAT is designed to exploit CVE-2015-1805, a vulnerability that was discovered and made public in 2016. | https://github.com/ireshchaminda1/Android-Privilege-Escalation-Remote-Access-Vulnerability-CVE-2015-1805 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet