Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | Android | Kernel | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/timwr/CVE-2019-2215 | POC Details |
| 2 | None | https://github.com/raystyle/CVE-2019-2215 | POC Details |
| 3 | Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215 | https://github.com/kangtastic/cve-2019-2215 | POC Details |
| 4 | CVE 2019-2215 Android Binder Use After Free | https://github.com/marcinguy/CVE-2019-2215 | POC Details |
| 5 | Temproot for Bravia TV via CVE-2019-2215. | https://github.com/LIznzn/CVE-2019-2215 | POC Details |
| 6 | Android privilege escalation via an use-after-free in binder.c | https://github.com/DimitriFourny/cve-2019-2215 | POC Details |
| 7 | android-kernel-exploitation-ashfaq-CVE-2019-2215 docker setup for mac users | https://github.com/qre0ct/android-kernel-exploitation-ashfaq-CVE-2019-2215 | POC Details |
| 8 | Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215 | https://github.com/sharif-dev/AndroidKernelVulnerability | POC Details |
| 9 | PoC for old Binder vulnerability (based on P0 exploit) | https://github.com/c3r34lk1ll3r/CVE-2019-2215 | POC Details |
| 10 | Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215 | https://github.com/Byte-Master-101/CVE-2019-2215 | POC Details |
| 11 | CVE-2019-2215 | https://github.com/mufidmb38/CVE-2019-2215 | POC Details |
| 12 | Android Ransomware Development - AES256 encryption + CVE-2019-2215 (reverse root shell) + Data Exfiltration | https://github.com/nicchongwb/Rootsmart-v2.0 | POC Details |
| 13 | for kernel 3.18.x | https://github.com/enceka/cve-2019-2215-3.18 | POC Details |
| 14 | Exploit for Bad Binder | https://github.com/elbiazo/CVE-2019-2215 | POC Details |
| 15 | Android Kernel Vulnerability (CVE-2019-2215) temporary root PoC | https://github.com/jsirichai/CVE-2019-2215 | POC Details |
| 16 | Exploit for CVE-2019-2215 (bad binder) for Huawei P20 Lite | https://github.com/willboka/CVE-2019-2215-HuaweiP20Lite | POC Details |
| 17 | This is a bad-binder exploit affecting the android binder IPC system that was used in the wild discovered by P0 | https://github.com/mutur4/CVE-2019-2215 | POC Details |
| 18 | Android Ransomware Development - AES256 encryption + CVE-2019-2215 (reverse root shell) + Data Exfiltration | https://github.com/CrackerCat/Rootsmart-v2.0 | POC Details |
| 19 | CVE 2019-2215 Android Binder Use After Free | https://github.com/ATorNinja/CVE-2019-2215 | POC Details |
| 20 | None | https://github.com/raymontag/CVE-2019-2215 | POC Details |
| 21 | Unlock your Huawei device with ADB (CVE-2019-2215) | https://github.com/R0rt1z2/huawei-unlock | POC Details |
| 22 | Android Kernel Vulnerability (CVE-2019-2215) temporary root PoC | https://github.com/stevejubx/CVE-2019-2215 | POC Details |
| 23 | Andriod binder bug record | https://github.com/XiaozaYa/CVE-2019-2215 | POC Details |
| 24 | CVE-2019-2215 poc for Huawei hardened kernel | https://github.com/llccd/TempRoot-Huawei | POC Details |
| 25 | None | https://github.com/0xbinder/android-kernel-exploitation-cve-2019-2215 | POC Details |
| 26 | This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder subsystem. | https://github.com/0xbinder/android-kernel-exploitation-lab | POC Details |
| 27 | None | https://github.com/mouseos/cve-2019-2215_SH-M08 | POC Details |
| 28 | for kernel 3.18.x | https://github.com/Enceka/cve-2019-2215-3.18 | POC Details |
| 29 | demo CVE-2019-2215 (Bad Binder) for Android Q | https://github.com/i-redbyte/android-badbinder-demo | POC Details |
No public POC found.
Login to generate AI POCNo comments yet