Menu
![]() ![]() This vulnerability was discovered and reported by security researcher Nick Cano in April and was fixed in BlueStacks 4., which was released on May 27th, 2019 along with an advisory. These functions could then be used for a variety of different attacks ranging from remote code execution to information disclosure. In BlueStacks versions earlier than v4., a DNS rebinding vulnerability existed that allowed attackers to gain access to the emulator's IPC functions. Vulnerabilities in the BlueStacks Android emulator were fixed at the end of May that allowed attackers to perform remote code execution, information disclosure, and to steal backups of the VM and its data. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |