Vulnerabilities (CVE)

Filtered by vendor Novell Subscribe
Filtered by product Moonlight
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2011-0992 2 Mono, Novell 2 Mono, Moonlight 2024-11-21 5.8 MEDIUM N/A
Use-after-free vulnerability in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, allows remote attackers to cause a denial of service (plugin crash) or obtain sensitive information via vectors related to member data in a resurrected MonoThread instance.
CVE-2011-0991 2 Mono, Novell 2 Mono, Moonlight 2024-11-21 6.8 MEDIUM N/A
Use-after-free vulnerability in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to finalizing and then resurrecting a DynamicMethod instance.
CVE-2011-0990 2 Mono, Novell 2 Mono, Moonlight 2024-11-21 5.8 MEDIUM N/A
Race condition in the FastCopy optimization in the Array.Copy method in metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, allows remote attackers to trigger a buffer overflow and modify internal data structures, and cause a denial of service (plugin crash) or corrupt the internal state of the security manager, via a crafted media file in which a thread makes a change after a type check but before a copy action.
CVE-2011-0989 2 Mono, Novell 2 Mono, Moonlight 2024-11-21 5.8 MEDIUM N/A
The RuntimeHelpers.InitializeArray method in metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, does not properly restrict data types, which allows remote attackers to modify internal read-only data structures, and cause a denial of service (plugin crash) or corrupt the internal state of the security manager, via a crafted media file, as demonstrated by modifying a C# struct.
CVE-2010-4254 2 Mono, Novell 2 Mono, Moonlight 2024-11-21 7.5 HIGH N/A
Mono, when Moonlight before 2.3.0.1 or 2.99.x before 2.99.0.10 is used, does not properly validate arguments to generic methods, which allows remote attackers to bypass generic constraints, and possibly execute arbitrary code, via a crafted method call.