IGRSoft/KisMac2

Why does this contain a TIFF exploit?

methodbox opened this issue · 1 comments

Seems fishy and popped up during the build process.

Let me know when you've cleaned this.

Hi,

According to the xcode project, during build time, it's running a script file called : OUIToVendorDB.py
In this one, it tries to download a file from this url: http://standards-oui.ieee.org/oui.txt , parsing it and store the data inside a local file: placed in the project directory: Resources/Generic/vendor.db

The txt file is a really big list gathering broadcast devices' vendors informations