"%" means not tested by me personally.
- syscall.sh: Linux ARMv7/AArch64/x86/x86_64 ABI and syscall tables
- Binary Ninja: interactive native code disassembler, decompiler, and debugger
"%" means not tested by me personally.
Vulnerabilities published by Bluetooth SIG, Android, Apple, Intel and Qualcomm security bulletins, published at security conferences or as master thesis. If any are missing, thanks for pointing me to them ! | |
Todo: macOS | |
Year | Name | CVE | |
2020 | Blurtooth: Exploiting Cross-Transport Key Derivation | 2020-15802 | |
2020 | Pairing Method Confusion | 2020-10134 | |
2020 | BIAS: Bluetooth Impersonation Attacks | 2020-10135 | |
2020 | BlueRepli | ? | |
2020 | BLESA: Bluetooth Low energy spoofing attacks | 2020-9770 |