-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04026812
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04026812
Version: 2
HPSBGN02942
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2807-1 secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
November 30, 2013
* Proceedings published by Springer.
** Papers submitted for indexation by ISI, SCOPUS, DBLP, etc.
*** Extended versions of best papers published in ISI/SCI/JCR journals.
**
Document Title:
===
Photo Transfer Wifi 1.4.4 iOS - Multiple Web Vulnerabilities
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1153
Release Date:
=
2013-12-02
Vulnerability Laboratory ID (VL-ID):
Mario Vilas mvi...@gmail.com wrote:
This may be a silly question, so I apologize in advance, but that would
exactly be the advantage here? Using a NULL pointer is in most (if not all)
those cases undocumented behavior to begin with. Unless I'm missing
something, the problem is not so much
Hi @ll,
the Win32 API is full of idiosyncrasies resp. surprising and inconsistent,
poorly tested and documented behaviour.
Just to pick one: NULL pointer as string argument.
0. lstrlen(NULL)
lstrcat(NULL, ...) and lstrcat(..., NULL)
lstrcmp(NULL, ...) and lstrcmp(..., NULL)