You hope?
If your "vulnerability" is stored plaintext passwords, there is not much
you can do besides implementing SCRAM-SHA1 authentication on client and
server or some OAuth derivate.

Regards
Dominik

On 09/04/2014 03:53 PM, Anant Shrivastava wrote:
> I hope its not this specfic issue :
> 
> https://code.google.com/p/android/issues/detail?id=10809
> 
> 
> 
> Anant Shrivastava
> Web : http://anantshri.info
> 
> 
> On Thu, Sep 4, 2014 at 7:02 PM, Dominik Schuermann <
> [email protected]> wrote:
> 
>> Mail to [email protected]
>>
>> On 09/04/2014 01:36 PM, Zawad wrote:
>>> Hello there,
>>> I have recently found a vulnerability in Android's default Email App
>> (4.2.2
>>> Jellybean). I don't it if it is updated. But I want to notify the android
>>> security team about it. But can you please tell me the way?
>>> I don't want to post it here as it will not be a good idea because
>> everyone
>>> can read it. So, please show me the way to report the vulnerability
>>> directly to Android Security team for a better and more secure Android
>>> Email App
>>>
>>> Thankyou!
>>>
>>
>>
> 

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to