尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Google Inc. | Android | 4.4.4 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Blueborne CVE-2017-0781 Android heap overflow vulnerability | https://github.com/ojasookert/CVE-2017-0781 | POC详情 |
| 2 | Android Blueborne RCE CVE-2017-0781 | https://github.com/marcinguy/android712-blueborne | POC详情 |
| 3 | Simple detection tool for Blueborne vulnerability found on Android devices --- CVE-2017-0781. | https://github.com/mjancek/BlueborneDetection | POC详情 |
| 4 | BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities. Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found. Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-1000251) can be found (for Amazon Echo, and Samsung Gear S3). Under 'l2cap_infra' a general testing framework to send and receive raw l2cap messages (using scapy) can be found. Under 'nRF24_BDADDR_Sniffer' a tool to capture bluetooth mac addresses (BDADDR) over the air, using a nRF24L01 chip For more details on BlueBorne, you may read the full technical white paper available here: https://www.armis.com/blueborne/ In addition a several detailed blog posts on the exploitation of these vulnerability can be found here: https://www.armis.com/blog/ =============== Dependencies: | https://github.com/CrackSoft900/Blue-Borne | POC详情 |
| 5 | Bash que instala los sploit CVE-2017-0781 y CVE-2017-0785 y lo necesario para su usos. | https://github.com/CarlosDelRosario7/sploit-bX | POC详情 |
| 6 | Learn what is BlueJam CVE-2017-0781 | https://github.com/DamianSuess/Learn.BlueJam | POC详情 |
| 7 | Android Blueborne RCE CVE-2017-0781 | https://github.com/X3eRo0/android712-blueborne | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论