Skip to content

ucam-cl-dtg/android-vulnerabilities

Folders and files

NameName
Last commit message
Last commit date

Latest commit

author
Daniel Thomas
Jul 7, 2020
5a5158e · Jul 7, 2020
Aug 21, 2019
Jul 7, 2020
Jul 5, 2019
Oct 7, 2015
Dec 3, 2013
Jan 22, 2020
Aug 21, 2019
Nov 4, 2014
Aug 2, 2019
Aug 20, 2019
Sep 9, 2014
Oct 7, 2015
Jan 22, 2020
Apr 11, 2016
Sep 9, 2014
Aug 18, 2014
Sep 9, 2014
Jan 22, 2020
Aug 15, 2014
Jan 22, 2020
Oct 8, 2015
Jan 22, 2020
Sep 9, 2014
Sep 9, 2014

Repository files navigation

AndroidVulnerabilities.org

The https://androidvulnerabilities.org/ website and source data.

To run

  • Download Poole and set it up on your system
  • Clone this repository onto your system
  • In the root directory of this repository, run:
    • poole.py --build --md-ext=markdown.extensions.extra to build the source code (may take a long time)
    • poole.py --serve to run the website
  • Then go to [http://localhost:8080] to view the site

Other utilities

  • The web scraper (tools/scraper/scraper.py) will take vulnerability details from Google's Android Security Bulletins. Please see tools/scraper/README.md for more details.
  • Graph analysis tools:
    • analyser.py plots a month-by-month matrix of how different Android versions can be exploited
    • actual_usage.py uses the Google Play Dashboard usage data to estimate the number of devices which can be exploited in different ways over time
    • device_analyzer_usage.py does a similar process using data gathered by the Device Analyzer project
    • scorer.py plots an overall vulnerability score over time for different versions of Android

Data on vulnerability storage format is in input/vulnerabilities.