Autore: Angelo Barbosa

CVE-2023-42801 | moonlight-stream moonlight-common-c GameStream Client buffer overflow (GHSA-f3h8-j898-5h5v)

A vulnerability, which was classified as critical, has been found in moonlight-stream moonlight-common-c. Affected by this issue is some unknown functionality of the component GameStream Client. The manipulation leads to buffer overflow. This vulnerability is handled as CVE-2023-42801. The attack may be launched remotely. There is no exploit available. It is recommended to apply a patch to fix this...

Per saperne di più

CVE-2023-42800 | moonlight-stream moonlight-common-c GameStream Client buffer overflow (GHSA-4927-23jw-rq62)

A vulnerability classified as critical was found in moonlight-stream moonlight-common-c. Affected by this vulnerability is an unknown functionality of the component GameStream Client. The manipulation leads to buffer overflow. This vulnerability is known as CVE-2023-42800. The attack can be launched remotely. There is no exploit available. It is recommended to apply a patch to fix this...

Per saperne di più

CVE-2023-42799 | moonlight-stream moonlight-common-c GameStream Client buffer overflow (GHSA-r8cf-45f4-vf8m)

A vulnerability classified as critical has been found in moonlight-stream moonlight-common-c. Affected is an unknown function of the component GameStream Client. The manipulation leads to buffer overflow. This vulnerability is traded as CVE-2023-42799. It is possible to launch the attack remotely. There is no exploit available. It is recommended to apply a patch to fix this...

Per saperne di più

CVE-2023-50269 | Squid Web Proxy up to 2.7.STABLE9/5.9/6.5 HTTP Request Parser X-Forwarded-For recursion

A vulnerability was found in Squid Web Proxy up to 2.7.STABLE9/5.9/6.5. It has been rated as critical. This issue affects some unknown processing of the component HTTP Request Parser. The manipulation of the argument X-Forwarded-For leads to uncontrolled recursion. The identification of this vulnerability is CVE-2023-50269. The attack may be initiated remotely. There is no exploit available. It is recommended to upgrade the affected...

Per saperne di più