...
Although not directly a violation of this rule, the Android Master Key vulnerability (insecure use of ZipEntry
) is related to this rule. Another attack vector, found by a researcher in China, is also related to this rule.
...
...
Although not directly a violation of this rule, the Android Master Key vulnerability (insecure use of ZipEntry
) is related to this rule. Another attack vector, found by a researcher in China, is also related to this rule.
...