Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | PoC - Binary patches for CVE-2015-3864 (NOT for production, use at your own risk) | https://github.com/pwnaccelerator/stagefright-cve-2015-3864 | POC Details |
| 2 | Python script to generate a malicious MP4 file and start a CherryPy web server hosting a simple HTML page with the embedded file. Exploits another Stagefright vulnerability, the integer overflow (CVE-2015-3864). | https://github.com/eudemonics/scaredycat | POC Details |
| 3 | just some research notes | https://github.com/HenryVHuang/CVE-2015-3864 | POC Details |
| 4 | None | https://github.com/Bhathiya404/Exploiting-Stagefright-Vulnerability-CVE-2015-3864 | POC Details |
| 5 | year 2 semester 1 Systems and Network Programming Assignment | https://github.com/Cmadhushanka/CVE-2015-3864-Exploitation | POC Details |
No public POC found.
Login to generate AI POCNo comments yet