Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/betalphafai/cve-2015-3636_crash | POC Details |
| 2 | CVE-2015-3636 exploit | https://github.com/askk/libping_unhash_exploit_POC | POC Details |
| 3 | None | https://github.com/ludongxu/cve-2015-3636 | POC Details |
| 4 | PoC code for 32 bit Android OS | https://github.com/fi01/CVE-2015-3636 | POC Details |
| 5 | CVE-2015-3636 exploit | https://github.com/android-rooting-tools/libpingpong_exploit | POC Details |
| 6 | root with CVE-2015-3636 | https://github.com/debugfan/rattle_root | POC Details |
| 7 | Expolit for android (goldfish kernel v3.10.0+) on arm64 with PXN&SELinux Bypassed. Based on fi01's code. | https://github.com/a7vinx/CVE-2015-3636 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet