Why does this contain a TIFF exploit?
methodbox opened this issue · 1 comments
methodbox commented
Seems fishy and popped up during the build process.
Let me know when you've cleaned this.
havocked commented
Hi,
According to the xcode project, during build time, it's running a script file called : OUIToVendorDB.py
In this one, it tries to download a file from this url: http://standards-oui.ieee.org/oui.txt
, parsing it and store the data inside a local file: placed in the project directory: Resources/Generic/vendor.db
The txt file is a really big list gathering broadcast devices' vendors informations