This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* CVE-2015-5477 POC | |
* An error in handling TKEY queries can cause named to exit with a REQUIRE assertion failure | |
* Affected software: ISC named (bind) 9.1.0 -> 9.8.x, 9.9.0->9.9.7-P1, 9.10.0->9.10.2-P2 | |
* | |
* Copyleft Bojie Li <bojieli@gmail.com> | |
* | |
* Free to modify and redistribute this program. | |
* Use at your own risk and you are responsible for what you are doing. | |
*/ | |
#include<stdio.h> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Vulnerabilities published by Bluetooth SIG, Android, Apple, Intel and Qualcomm security bulletins, published at security conferences or as master thesis. If any are missing, thanks for pointing me to them ! | |
Todo: macOS | |
Year | Name | CVE | |
2020 | Blurtooth: Exploiting Cross-Transport Key Derivation | 2020-15802 | |
2020 | Pairing Method Confusion | 2020-10134 | |
2020 | BIAS: Bluetooth Impersonation Attacks | 2020-10135 | |
2020 | BlueRepli | ? | |
2020 | BLESA: Bluetooth Low energy spoofing attacks | 2020-9770 |