Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:mono:mono:*:*:*:*:*:*:*:*", "matchCriteriaId": "E062208D-082B-4BFD-85CA-3848ECE6F8CF", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:novell:moonlight:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F4B24CA-B511-49A1-A3F6-5128279D1339", "versionEndIncluding": "2.3.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:novell:moonlight:2.99.0:*:*:*:*:*:*:*", "matchCriteriaId": "BF483675-722E-42AF-9698-4BFBE4987ADE", "vulnerable": true}, {"criteria": "cpe:2.3:a:novell:moonlight:2.99.1:*:*:*:*:*:*:*", "matchCriteriaId": "8CB09C96-4186-4828-AF42-BDAB1D52C510", "vulnerable": true}, {"criteria": "cpe:2.3:a:novell:moonlight:2.99.2:*:*:*:*:*:*:*", "matchCriteriaId": "925AFBDD-F52F-4D71-B201-1002B0B2924B", "vulnerable": true}, {"criteria": "cpe:2.3:a:novell:moonlight:2.99.7:*:*:*:*:*:*:*", "matchCriteriaId": "DD682A37-02C5-481B-A1EB-CD8452757E7B", "vulnerable": true}, {"criteria": "cpe:2.3:a:novell:moonlight:2.99.9:*:*:*:*:*:*:*", "matchCriteriaId": "AE13D028-0948-4C9C-9EF4-56956ED64006", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Mono, when Moonlight before 2.3.0.1 or 2.99.x before 2.99.0.10 is used, does not properly validate arguments to generic methods, which allows remote attackers to bypass generic constraints, and possibly execute arbitrary code, via a crafted method call."}, {"lang": "es", "value": "Mono, cuando Moonlight en versiones anteriores a la 2.3.0.1 o 2.99.x anteriores a la 2.99.0.10 es utilizado, no valida apropiadamente los argumentos a los m\u00e9todos gen\u00e9ricos. Lo que permite a atacantes remotos evitar las restricciones gen\u00e9ricas y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de una llamada a un m\u00e9todo modificado."}], "id": "CVE-2010-4254", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2010-12-06T13:44:54.157", "references": [{"source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"}, {"source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/42373"}, {"source": "secalert@redhat.com", "url": "http://secunia.com/advisories/42877"}, {"source": "secalert@redhat.com", "url": "http://www.exploit-db.com/exploits/15974"}, {"source": "secalert@redhat.com", "url": "http://www.mono-project.com/Vulnerabilities#Moonlight_Generic_Constraints_Bypass_Vulnerability"}, {"source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/45051"}, {"source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0076"}, {"source": "secalert@redhat.com", "url": "https://bugzilla.novell.com/show_bug.cgi?id=654136"}, {"source": "secalert@redhat.com", "url": "https://bugzilla.novell.com/show_bug.cgi?id=655847"}, {"source": "secalert@redhat.com", "tags": ["Patch"], "url": "https://github.com/mono/mono/commit/4905ef1130feb26c3150b28b97e4a96752e0d399"}, {"source": "secalert@redhat.com", "tags": ["Patch"], "url": "https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358"}, {"source": "secalert@redhat.com", "tags": ["Patch"], "url": "https://github.com/mono/mono/commit/cf1ec146f7c6acdc6697032b3aaafc68ffacdcac"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/42373"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42877"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/15974"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mono-project.com/Vulnerabilities#Moonlight_Generic_Constraints_Bypass_Vulnerability"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45051"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0076"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=654136"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=655847"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "https://github.com/mono/mono/commit/4905ef1130feb26c3150b28b97e4a96752e0d399"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "https://github.com/mono/mono/commit/cf1ec146f7c6acdc6697032b3aaafc68ffacdcac"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "nvd@nist.gov", "type": "Primary"}]}