Skip to content

Instantly share code, notes, and snippets.

@tdec
tdec / gist:128751d818e9753364a72086b961390b
Last active June 23, 2023 20:41
Bluetooth vulnerabilities
Vulnerabilities published by Bluetooth SIG, Android, Apple, Intel and Qualcomm security bulletins, published at security conferences or as master thesis. If any are missing, thanks for pointing me to them !
Todo: macOS
Year | Name | CVE
2020 | Blurtooth: Exploiting Cross-Transport Key Derivation | 2020-15802
2020 | Pairing Method Confusion | 2020-10134
2020 | BIAS: Bluetooth Impersonation Attacks | 2020-10135
2020 | BlueRepli | ?
2020 | BLESA: Bluetooth Low energy spoofing attacks | 2020-9770
@bojieli
bojieli / CVE-2015-5477.c
Created July 29, 2015 16:36
CVE-2015-5477 POC
/* CVE-2015-5477 POC
* An error in handling TKEY queries can cause named to exit with a REQUIRE assertion failure
* Affected software: ISC named (bind) 9.1.0 -> 9.8.x, 9.9.0->9.9.7-P1, 9.10.0->9.10.2-P2
*
* Copyleft Bojie Li <bojieli@gmail.com>
*
* Free to modify and redistribute this program.
* Use at your own risk and you are responsible for what you are doing.
*/
#include<stdio.h>