CVE-2023-42799
- EPSS 0.53%
- Veröffentlicht 14.12.2023 17:15:07
- Zuletzt bearbeitet 21.11.2024 08:23:10
Moonlight-common-c contains the core GameStream client code shared between Moonlight clients. Moonlight-common-c is vulnerable to buffer overflow starting in commit 50c0a51b10ecc5b3415ea78c21d96d679e2288f9 due to unmitigated usage of unsafe C functio...
CVE-2023-42800
- EPSS 0.65%
- Veröffentlicht 14.12.2023 17:15:07
- Zuletzt bearbeitet 21.11.2024 08:23:10
Moonlight-common-c contains the core GameStream client code shared between Moonlight clients. Moonlight-common-c is vulnerable to buffer overflow starting in commit 50c0a51b10ecc5b3415ea78c21d96d679e2288f9 due to unmitigated usage of unsafe C functio...
CVE-2023-42801
- EPSS 0.36%
- Veröffentlicht 14.12.2023 17:15:07
- Zuletzt bearbeitet 21.11.2024 08:23:11
Moonlight-common-c contains the core GameStream client code shared between Moonlight clients. Moonlight-common-c is vulnerable to buffer overflow starting in commit f57bd745b4cbed577ea654fad4701bea4d38b44c. A malicious game streaming server could exp...
CVE-2020-11024
- EPSS 0.22%
- Veröffentlicht 29.04.2020 21:15:11
- Zuletzt bearbeitet 21.11.2024 04:56:36
In Moonlight iOS/tvOS before 4.0.1, the pairing process is vulnerable to a man-in-the-middle attack. The bug has been fixed in Moonlight v4.0.1 for iOS and tvOS.