Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mono mono vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-0991
Use-after-free vulnerability in Mono, when Moonlight 2.x prior to 2.4.1 or 3.x prior to 3.99.3 is used, allows remote malicious users to cause a denial of service or possibly have unspecified other impact via vectors related to finalizing and then resurrecting a DynamicMethod ins...
Novell Moonlight 3.0
Novell Moonlight 2.4
Novell Moonlight 2.31
Novell Moonlight 3.99
Mono Mono
Novell Moonlight 2.3.0
Novell Moonlight 2.0
NA
CVE-2011-0992
Use-after-free vulnerability in Mono, when Moonlight 2.x prior to 2.4.1 or 3.x prior to 3.99.3 is used, allows remote malicious users to cause a denial of service (plugin crash) or obtain sensitive information via vectors related to member data in a resurrected MonoThread instanc...
Novell Moonlight 3.0
Novell Moonlight 2.4
Novell Moonlight 2.31
Novell Moonlight 3.99
Mono Mono
Novell Moonlight 2.3.0
Novell Moonlight 2.0
NA
CVE-2010-4225
Unspecified vulnerability in the mod_mono module for XSP in Mono 2.8.x prior to 2.8.2 allows remote malicious users to obtain the source code for .aspx (ASP.NET) applications via unknown vectors related to an "unloading bug."
Mono Mono 2.8
Mono Mono 2.8.1
NA
CVE-2010-4254
Mono, when Moonlight prior to 2.3.0.1 or 2.99.x prior to 2.99.0.10 is used, does not properly validate arguments to generic methods, which allows remote malicious users to bypass generic constraints, and possibly execute arbitrary code, via a crafted method call.
Mono Mono
Novell Moonlight
Novell Moonlight 2.99.0
Novell Moonlight 2.99.1
Novell Moonlight 2.99.2
Novell Moonlight 2.99.7
Novell Moonlight 2.99.9
1 EDB exploit
NA
CVE-2010-4159
Untrusted search path vulnerability in metadata/loader.c in Mono 2.8 and previous versions allows local users to gain privileges via a Trojan horse shared library in the current working directory.
Mono Mono 2.4.2.2
Mono Mono 1.1.17.2
Mono Mono 1.1.11
Mono Mono 1.9
Mono Mono 1.1.13.8
Mono Mono 2.2
Mono Mono 1.1.13.4
Mono Mono
Mono Mono 1.1.13.5
Mono Mono 1.2.2
Mono Mono 1.1.13
Mono Mono 1.0
Mono Mono 2.6.3
Mono Mono 1.1.8
Mono Mono 1.1.8.3
Mono Mono 1.1.3
Mono Mono 1.2.5.2
Mono Mono 2.0.1
Mono Mono 1.2.1
Mono Mono 1.0.2
Mono Mono 1.0.1
Mono Mono 2.4.2.3
NA
CVE-2010-3369
The (1) mdb and (2) mdb-symbolreader scripts in mono-debugger 2.4.3, and other versions prior to 2.8.1, place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
Debian Mono-debugger 2.6
Debian Mono-debugger 2.6.7
Debian Mono-debugger 2.6.4
Debian Mono-debugger 2.8
Debian Mono-debugger 2.6.1
Debian Mono-debugger 2.6.3
Debian Mono-debugger 2.4.3
NA
CVE-2010-1526
Multiple integer overflows in libgdiplus 2.6.7, as used in Mono, allow malicious users to execute arbitrary code via (1) a crafted TIFF file, related to the gdip_load_tiff_image function in tiffcodec.c; (2) a crafted JPEG file, related to the gdip_load_jpeg_image_internal functio...
Mono-project Libgdiplus 2.6.7
NA
CVE-2010-1459
The default configuration of ASP.NET in Mono prior to 2.6.4 has a value of FALSE for the EnableViewStateMac property, which allows remote malicious users to conduct cross-site scripting (XSS) attacks, as demonstrated by the __VIEWSTATE parameter to 2.0/menu/menu1.aspx in the XSP ...
Mono Mono 2.4.2.2
Mono Mono 1.1.17.2
Mono Mono 1.1.11
Mono Mono 1.9
Mono Mono 1.1.13.8
Mono Mono 2.2
Mono Mono 1.1.13.4
Mono Mono 1.1.13.5
Mono Mono 1.2.2
Mono Mono 1.1.13
Mono Mono 1.0
Mono Mono 1.1.8
Mono Mono 1.1.8.3
Mono Mono 1.1.3
Mono Mono 1.2.5.2
Mono Mono 2.0.1
Mono Mono 1.2.1
Mono Mono 1.0.2
Mono Mono 1.0.1
Mono Mono 2.4.2.3
Mono Mono 1.1.5
Mono Mono 1.2.4
NA
CVE-2009-0217
The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Pro...
Mono Project Mono 1.2.4
Ibm Websphere Application Server 6.1.0.21
Mono Project Mono 1.2.1
Ibm Websphere Application Server 6.0.2.10
Ibm Websphere Application Server 6.1
Ibm Websphere Application Server 6.1.0.22
Ibm Websphere Application Server 6.1.0.19
Mono Project Mono 1.9
Ibm Websphere Application Server 6.0.2.1
Ibm Websphere Application Server 6.0.0.3
Ibm Websphere Application Server 6.1.0.2
Mono Project Mono 1.2.6
Ibm Websphere Application Server 6.0.1.15
Oracle Weblogic Server Component 8.1
Ibm Websphere Application Server 6.1.0.4
Oracle Application Server 10.1.3.4
Ibm Websphere Application Server 6.0.1.3
Ibm Websphere Application Server 6.0.2.20
Ibm Websphere Application Server 6.0.2.13
Ibm Websphere Application Server 6.1.0.11
Ibm Websphere Application Server 6.0.1.11
Ibm Websphere Application Server 7.0
NA
CVE-2008-3906
CRLF injection vulnerability in Sys.Web in Mono 2.0 and previous versions allows remote malicious users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the query string.
Mono Project Mono 1.2.4
Mono Project Mono 1.2.1
Mono Project Mono 1.9
Mono Project Mono 1.2.6
Mono Mono 1.1.13.4
Mono Mono 1.1.13
Mono Mono 1.0
Mono Mono 1.1.8.3
Mono Project Mono 1.2.3
Mono Mono 1.1.17.1
Mono Mono 1.2.5.1
Mono Mono 1.1.18
Mono Mono 1.0.5
Mono Project Mono 1.2.5
Mono Mono 1.1.13.7
Mono Project Mono
Mono Mono 1.1.17
Mono Project Mono 1.2.2
Mono Mono 1.1.4
Mono Mono 1.1.13.6
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »