2 results (0.001 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Genymotion Desktop v3.2.1 was discovered to contain a DLL hijacking vulnerability which allows attackers to escalate privileges and execute arbitrary code via a crafted binary. Se ha detectado que Genymotion Desktop versión v3.2.1, contiene una vulnerabilidad de secuestro de DLL que permite a atacantes escalar privilegios y ejecutar código arbitrario por medio de un binario diseñado • https://github.com/SaumyajeetDas/Vulnerability/blob/main/Genymotion/GenymotionDesktop.md • CWE-427: Uncontrolled Search Path Element •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

Genymotion Desktop through 3.2.0 leaks the host's clipboard data to the Android application by default. NOTE: the vendor's position is that this is intended behavior that can be changed through the Settings > Device screen ** EN DISPUTA ** Genymotion Desktop versiones hasta 3.2.0, filtra los datos del portapapeles del host a la aplicación de Android por defecto. NOTA: la posición del proveedor es que este es un comportamiento previsto que se puede cambiar por medio de la pantalla Settings > Device • https://docs.genymotion.com/desktop/latest/02_Application.html https://github.com/eybisi/misc/tree/main/clipwatch https://twitter.com/0xabc0/status/1363788023956185090 https://twitter.com/0xabc0/status/1363855602477387783 https://twitter.com/0xabc0/status/1363856804602671104 https://www.genymotion.com/download https://www.youtube.com/watch?v=Tod8Q6sf0P8 • CWE-312: Cleartext Storage of Sensitive Information •