尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | Android | Kernel | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/timwr/CVE-2019-2215 | POC详情 |
| 2 | None | https://github.com/raystyle/CVE-2019-2215 | POC详情 |
| 3 | Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215 | https://github.com/kangtastic/cve-2019-2215 | POC详情 |
| 4 | CVE 2019-2215 Android Binder Use After Free | https://github.com/marcinguy/CVE-2019-2215 | POC详情 |
| 5 | Temproot for Bravia TV via CVE-2019-2215. | https://github.com/LIznzn/CVE-2019-2215 | POC详情 |
| 6 | Android privilege escalation via an use-after-free in binder.c | https://github.com/DimitriFourny/cve-2019-2215 | POC详情 |
| 7 | android-kernel-exploitation-ashfaq-CVE-2019-2215 docker setup for mac users | https://github.com/qre0ct/android-kernel-exploitation-ashfaq-CVE-2019-2215 | POC详情 |
| 8 | Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215 | https://github.com/sharif-dev/AndroidKernelVulnerability | POC详情 |
| 9 | PoC for old Binder vulnerability (based on P0 exploit) | https://github.com/c3r34lk1ll3r/CVE-2019-2215 | POC详情 |
| 10 | Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215 | https://github.com/Byte-Master-101/CVE-2019-2215 | POC详情 |
| 11 | CVE-2019-2215 | https://github.com/mufidmb38/CVE-2019-2215 | POC详情 |
| 12 | Android Ransomware Development - AES256 encryption + CVE-2019-2215 (reverse root shell) + Data Exfiltration | https://github.com/nicchongwb/Rootsmart-v2.0 | POC详情 |
| 13 | for kernel 3.18.x | https://github.com/enceka/cve-2019-2215-3.18 | POC详情 |
| 14 | Exploit for Bad Binder | https://github.com/elbiazo/CVE-2019-2215 | POC详情 |
| 15 | Android Kernel Vulnerability (CVE-2019-2215) temporary root PoC | https://github.com/jsirichai/CVE-2019-2215 | POC详情 |
| 16 | Exploit for CVE-2019-2215 (bad binder) for Huawei P20 Lite | https://github.com/willboka/CVE-2019-2215-HuaweiP20Lite | POC详情 |
| 17 | This is a bad-binder exploit affecting the android binder IPC system that was used in the wild discovered by P0 | https://github.com/mutur4/CVE-2019-2215 | POC详情 |
| 18 | Android Ransomware Development - AES256 encryption + CVE-2019-2215 (reverse root shell) + Data Exfiltration | https://github.com/CrackerCat/Rootsmart-v2.0 | POC详情 |
| 19 | CVE 2019-2215 Android Binder Use After Free | https://github.com/ATorNinja/CVE-2019-2215 | POC详情 |
| 20 | None | https://github.com/raymontag/CVE-2019-2215 | POC详情 |
| 21 | Unlock your Huawei device with ADB (CVE-2019-2215) | https://github.com/R0rt1z2/huawei-unlock | POC详情 |
| 22 | Android Kernel Vulnerability (CVE-2019-2215) temporary root PoC | https://github.com/stevejubx/CVE-2019-2215 | POC详情 |
| 23 | Andriod binder bug record | https://github.com/XiaozaYa/CVE-2019-2215 | POC详情 |
| 24 | CVE-2019-2215 poc for Huawei hardened kernel | https://github.com/llccd/TempRoot-Huawei | POC详情 |
| 25 | None | https://github.com/0xbinder/android-kernel-exploitation-cve-2019-2215 | POC详情 |
| 26 | This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder subsystem. | https://github.com/0xbinder/android-kernel-exploitation-lab | POC详情 |
| 27 | None | https://github.com/mouseos/cve-2019-2215_SH-M08 | POC详情 |
| 28 | for kernel 3.18.x | https://github.com/Enceka/cve-2019-2215-3.18 | POC详情 |
| 29 | demo CVE-2019-2215 (Bad Binder) for Android Q | https://github.com/i-redbyte/android-badbinder-demo | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论