EvilZone

Hacking and Security => Mobile Hacking => Topic started by: Resistor on May 26, 2015, 12:44:43 AM

Title: Is there a good database site of mobile OS vulnerabilities?
Post by: Resistor on May 26, 2015, 12:44:43 AM
I'm a cyber security student and I'm working on an assignment for a wireless and mobile device security class. I'm needing to find vulnerabilities/exploits that were published in 2015, even if only more information on known vulns, for Windows Phone OS, iOS, Android, and Blackberry OS, and I'm having the hardest fucking time finding something on Windows Phone.

Anyone know of a good vulnerability database for mobile OS?

Is the most recent thing for Windows Phone the 2014 mobile pwn2own cookie ex filtration? Has there been no new vulns at all in 2015? Seriously, fuck this operating system!
Title: Re: Is there a good database site of mobile OS vulnerabilities?
Post by: Kenose on July 23, 2015, 04:32:56 PM
https://web.nvd.nist.gov/view/vuln/search
Title: Re: Is there a good database site of mobile OS vulnerabilities?
Post by: bolzano_1989 on October 04, 2015, 05:24:09 PM
https://www.cvedetails.com/vulnerability-list/vendor_id-1224/product_id-19997/Google-Android.html
https://www.cvedetails.com/vulnerability-list/vendor_id-49/product_id-15556/Apple-Iphone-Os.html
http://www.cvedetails.com/vulnerability-list/vendor_id-26/product_id-23230/Microsoft-Windows-Phone.html
http://www.cvedetails.com/vulnerability-list/vendor_id-8356/product_id-25529/Blackberry-Blackberry-Os.html
Title: Re: Is there a good database site of mobile OS vulnerabilities?
Post by: null_scientist_44 on October 05, 2015, 07:02:07 PM
Beyond that there is:

Exploit-db.com (http://Exploit-db.com)
http://www.securityfocus.com (http://www.securityfocus.com)
and
https://packetstormsecurity.com/ (https://packetstormsecurity.com/)

Edit: Thank you for CVEDetails btw, hadn't seen this one in A LONG time!
Title: Re: Is there a good database site of mobile OS vulnerabilities?
Post by: zgubidan on October 11, 2015, 11:27:14 AM
Maybe you can find something interesting in materials from Hacking Team. I think that they use vulnerabilities to break into moblie phones