VAR-202004-2184

Vulnerability from variot - Updated: 2023-12-18 13:47

In Moonlight iOS/tvOS before 4.0.1, the pairing process is vulnerable to a man-in-the-middle attack. The bug has been fixed in Moonlight v4.0.1 for iOS and tvOS. Moonlight iOS/tvOS Exists in a certificate validation vulnerability.Information may be obtained and tampered with. Moonlight is an open source implementation of the NVIDIA GameStream protocol based on iOS and tvOS platforms. It is mainly used to stream game video to supported devices.

There are security vulnerabilities in Moonlight versions prior to 4.0.1 (iOS/tvOS). An attacker can use this vulnerability to induce an attacker to connect to a server controlled by the attacker by implementing a man-in-the-middle attack

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202004-2184",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "moonlight",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "moonlight stream",
        "version": "4.0.1"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "moonlight stream",
        "version": "4.0.1"
      },
      {
        "model": "moonlight",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "moonlight",
        "version": "4.0.1"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "0.1.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "0.2.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "0.2.1"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "0.2.2"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "0.3.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "0.3.1"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "0.3.2"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "0.4.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "0.4.1"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "0.9.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "0.9.1"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "0.9.2"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "1.0.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "1.0.1"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "1.0.2"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "1.0.3"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "1.0.4"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "1.1.2"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "1.1.3"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "1.1.4"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "1.2.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "1.3.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "1.4.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "1.5.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "1.6.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "1.7.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "1.8.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "2.0.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "2.1.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "2.2.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "2.3.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "2.4.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "2.5.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "2.6.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "2.7.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "2.8.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "3.0.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "3.2.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "3.3.0"
      },
      {
        "model": "moonlight",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "moonlight stream",
        "version": "4.0.0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-27237"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-11024"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005057"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-11024"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:moonlight-stream:moonlight:*:*:*:*:*:iphone_os:*:*",
                "cpe_name": [],
                "versionEndExcluding": "4.0.1",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:moonlight-stream:moonlight:*:*:*:*:*:tvos:*:*",
                "cpe_name": [],
                "versionEndExcluding": "4.0.1",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-11024"
      }
    ]
  },
  "cve": "CVE-2020-11024",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.9,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-005057",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "CNVD-2020-27237",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULMON",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "CVE-2020-11024",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.1,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "impactScore": 5.8,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "author": "security-advisories@github.com",
            "availabilityImpact": "LOW",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 0.3,
            "impactScore": 5.3,
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:L",
            "version": "3.1"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 8.2,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-005057",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Changed",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2020-11024",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "security-advisories@github.com",
            "id": "CVE-2020-11024",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2020-005057",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-27237",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202004-2422",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2020-11024",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-27237"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-11024"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005057"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-11024"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-11024"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202004-2422"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Moonlight iOS/tvOS before 4.0.1, the pairing process is vulnerable to a man-in-the-middle attack. The bug has been fixed in Moonlight v4.0.1 for iOS and tvOS. Moonlight iOS/tvOS Exists in a certificate validation vulnerability.Information may be obtained and tampered with. Moonlight is an open source implementation of the NVIDIA GameStream protocol based on iOS and tvOS platforms. It is mainly used to stream game video to supported devices. \n\r\n\r\nThere are security vulnerabilities in Moonlight versions prior to 4.0.1 (iOS/tvOS). An attacker can use this vulnerability to induce an attacker to connect to a server controlled by the attacker by implementing a man-in-the-middle attack",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-11024"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005057"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-27237"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-11024"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-11024",
        "trust": 3.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005057",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-27237",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202004-2422",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-11024",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-27237"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-11024"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005057"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-11024"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202004-2422"
      }
    ]
  },
  "id": "VAR-202004-2184",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-27237"
      }
    ],
    "trust": 1.2666667
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-27237"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:47:31.775000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Merge pull request #405 from loki-47-6F-64/master",
        "trust": 0.8,
        "url": "https://github.com/moonlight-stream/moonlight-ios/commit/b0149b2fe9125a77ee11fe133382673694b6e8cc"
      },
      {
        "title": "Don\u0027t send PIN to GFE #405",
        "trust": 0.8,
        "url": "https://github.com/moonlight-stream/moonlight-ios/pull/405"
      },
      {
        "title": "Moonlight iOS/tvOS pairing process is vulnerable to man-in-the-middle attack",
        "trust": 0.8,
        "url": "https://github.com/moonlight-stream/moonlight-ios/security/advisories/ghsa-g298-gp8q-h6j3"
      },
      {
        "title": "Patch for Moonlight Trust Management Issue Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/216893"
      },
      {
        "title": "Moonlight Repair measures for trust management problem vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=117932"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-27237"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005057"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202004-2422"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-295",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005057"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-11024"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "https://github.com/moonlight-stream/moonlight-ios/commit/b0149b2fe9125a77ee11fe133382673694b6e8cc"
      },
      {
        "trust": 1.7,
        "url": "https://github.com/moonlight-stream/moonlight-ios/pull/405"
      },
      {
        "trust": 1.7,
        "url": "https://github.com/moonlight-stream/moonlight-ios/security/advisories/ghsa-g298-gp8q-h6j3"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11024"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-11024"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/295.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/181265"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2020-11024"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005057"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-11024"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202004-2422"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-27237"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-11024"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005057"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-11024"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202004-2422"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-05-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-27237"
      },
      {
        "date": "2020-04-29T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-11024"
      },
      {
        "date": "2020-06-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-005057"
      },
      {
        "date": "2020-04-29T21:15:11.807000",
        "db": "NVD",
        "id": "CVE-2020-11024"
      },
      {
        "date": "2020-04-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202004-2422"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-05-10T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-27237"
      },
      {
        "date": "2020-05-07T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-11024"
      },
      {
        "date": "2020-06-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-005057"
      },
      {
        "date": "2021-10-26T20:01:44.777000",
        "db": "NVD",
        "id": "CVE-2020-11024"
      },
      {
        "date": "2021-10-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202004-2422"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202004-2422"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Moonlight iOS/tvOS Certificate validation vulnerabilities in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-005057"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202004-2422"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…