Versions Packages Information History CVEs Related Badges Report

Versions for mono

303 package(s) known

Repository Package name Version Category Maintainer(s)
Alpine Linux Edge
testing
mono 6.12.0.205 - fallback-mnt-alpine@repology
Alpine Linux Edge
testing
mono-dev 6.12.0.205 - fallback-mnt-alpine@repology
Alpine Linux Edge
testing
mono-doc 6.12.0.205 - fallback-mnt-alpine@repology
Alpine Linux Edge
testing
mono-lang 6.12.0.205 - fallback-mnt-alpine@repology
ALT Linux p9 mono 5.20.1.19 Development/Other cas@altlinux.org
ALT Linux p10 mono 6.12.0.147 Potentially vulnerable Development/Other darktemplar@altlinux.org
ALT Sisyphus mono 6.12.0.147 Potentially vulnerable Development/Other darktemplar@altlinux.org
AppGet Mono for Windows 6.10.0.104 - -
Arch
extra
mono 6.12.0.205 - -
Arch Linux 32 i486
extra
mono 6.12.0.190 Potentially vulnerable - -
Arch Linux 32 i686
extra
mono 6.12.0.205 - -
Arch Linux 32 pentium4
extra
mono 6.12.0.205 - -
Arch Linux ARM aarch64
extra
mono 6.12.0.205 - -
ArchPOWER powerpc mono 6.12.0.205 - -
ArchPOWER powerpc64le mono 6.12.0.205 - -
AUR mono-git 6.12.0.173.r1404.5977f1ca545 - hugegameartgd@aur
AUR mingw-w64-mono 6.12.0.86 Potentially vulnerable - fallback-mnt-aur@repology
Artix
world
mono 6.12.0.205 - -
Buildroot 2023.02.x mono 6.12.0.182 Potentially vulnerable - -
Buildroot 2023.05.x mono 6.12.0.182 Potentially vulnerable - -
Buildroot master mono 6.12.0.182 Potentially vulnerable - -
Chocolatey Mono 6.12.0.199 Potentially vulnerable - -
CRUX 3.5
contrib
mono 6.12.0.90 Potentially vulnerable - tbier@posteo.de
CRUX 3.6
contrib
mono 6.12.0.182 Potentially vulnerable - tbier@posteo.de
CRUX 3.7
contrib
mono 6.12.0.205 - tbier@posteo.de
Debian 10
buster/updates/main
mono 5.18.0.240 interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Debian 10
buster/main
mono 5.18.0.240 interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Debian 11
bullseye/main
mono 6.8.0.105 interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Debian 12
bookworm/main
mono 6.8.0.105 interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Debian 13
trixie/main
mono 6.8.0.105 interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Debian Unstable
sid/main
mono 6.8.0.105 interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Deepin
main
mono 5.18.0.240 - pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Devuan 3.0
beowulf/main
mono 5.18.0.240 interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Devuan 4.0
chimaera/main
mono 6.8.0.105 interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Devuan Unstable
unstable/main
mono 6.8.0.105 interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
EPEL 6 mono 4.2.4 Development/Languages -
EPEL 7 mono 6.8.0 Unspecified -
EPEL 8 mono 6.8.0 Unspecified -
EPEL 9 mono 6.12.0 Potentially vulnerable Unspecified -
Exherbo
mono
dev-lang/mono 6.12.0.182 Potentially vulnerable dev-lang fallback-mnt-exherbo@repology
Fedora 26
release
mono 4.8.0 Development/Languages -
Fedora 27
release
mono 4.8.0 Development/Languages -
Fedora 28
updates
mono 4.8.0 Development/Languages -
Fedora 28
release
mono 4.8.0 Development/Languages -
Fedora 29
release
mono 4.8.0 Development/Languages -
Fedora 30
updates
mono 5.18.1 Unspecified -
Fedora 30
release
mono 5.18.1 Unspecified -
Fedora 31
release
mono 5.20.1 Unspecified -
Fedora 31
updates
mono 5.20.1 Unspecified -
Fedora 32
release
mono 6.6.0 Unspecified -
Fedora 32
updates
mono 6.6.0 Unspecified -
Fedora 33
release
mono 6.8.0 Unspecified -
Fedora 33
updates
mono 6.8.0 Unspecified -
Fedora 34
release
mono 6.12.0 Potentially vulnerable Unspecified -
Fedora 35
release
mono 6.12.0 Potentially vulnerable Unspecified -
Fedora 36
release
mono 6.12.0 Potentially vulnerable Unspecified -
Fedora 37
release
mono 6.12.0 Potentially vulnerable Unspecified -
Fedora 38
release
mono 6.12.0 Potentially vulnerable Unspecified -
Fedora 39
development
mono 6.12.0 Potentially vulnerable Unspecified -
Fedora Rawhide
development
mono 6.12.0 Potentially vulnerable Unspecified -
FreeBSD Ports lang/mono 5.20 lang ports@freebsd.org
Gentoo dev-lang/mono 6.12.0.199 Potentially vulnerable dev-lang maintainer-needed@gentoo.org
Gentoo dev-lang/mono 6.12.0.199 Potentially vulnerable dev-lang maintainer-needed@gentoo.org
Gentoo dev-lang/mono 6.12.0.182 Potentially vulnerable dev-lang maintainer-needed@gentoo.org
Gentoo dev-lang/mono 6.12.0.122 Potentially vulnerable dev-lang maintainer-needed@gentoo.org
GoboLinux Mono 4.4.1.0 - -
Homebrew mono 6.12.0.182 Potentially vulnerable - -
just-install mono 6.12.0.122 Potentially vulnerable - -
Kali Linux Rolling
main
mono 6.8.0.105 interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
KaOS
main
mono 6.12.0.205 - demm@kaosx.us
KISS Linux Games
equipment
mono 6.12.0.122 Potentially vulnerable - sdsddsd1@protonmail.com
LiGurOS stable dev-lang/mono 6.12.0.182 Potentially vulnerable dev-lang fallback-mnt-liguros@repology
LiGurOS stable dev-lang/mono 6.12.0.122 Potentially vulnerable dev-lang fallback-mnt-liguros@repology
LiGurOS develop dev-lang/mono 6.12.0.199 Potentially vulnerable dev-lang fallback-mnt-liguros@repology
LiGurOS develop dev-lang/mono 6.12.0.199 Potentially vulnerable dev-lang fallback-mnt-liguros@repology
LiGurOS develop dev-lang/mono 6.12.0.182 Potentially vulnerable dev-lang fallback-mnt-liguros@repology
LiGurOS develop dev-lang/mono 6.12.0.122 Potentially vulnerable dev-lang fallback-mnt-liguros@repology
MacPorts mono 6.12.0.182 Potentially vulnerable devel mcalhoun@macports, marcuscalhoun-lopez@github
Mageia 8
core/release
mono 6.10.0 Development/C# -
Mageia cauldron
core/release
mono 6.12.0 Potentially vulnerable Development/C# -
Manjaro Stable
extra
mono 6.12.0.205 - -
Manjaro Testing
extra
mono 6.12.0.205 - -
Manjaro Unstable
extra
mono 6.12.0.205 - -
MidnightBSD mports lang/mono 5.20 lang -
MSYS2 mingw
x86_64
mingw-w64-x86_64-mono 6.12.0.122 Potentially vulnerable - -
MSYS2 mingw
i686
mingw-w64-i686-mono 6.12.0.122 Potentially vulnerable - -
MX Linux MX-19 Testing mono 6.8.0.105 cli-mono maintainer@mxrepo.com, directhex@apebox.org, meebey@debian.org
nixpkgs stable 21.11 mono 6.12.0.122 Potentially vulnerable - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
nixpkgs stable 21.11 mono 5.20.1.34 - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
nixpkgs stable 21.11 mono 4.8.1.0 - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
nixpkgs stable 22.05 mono 6.12.0.122 Potentially vulnerable - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
nixpkgs stable 22.05 mono 5.20.1.34 - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
nixpkgs stable 22.05 mono 4.8.1.0 - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
nixpkgs stable 22.11 mono 6.12.0.182 Potentially vulnerable - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
nixpkgs stable 22.11 mono 5.20.1.34 - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
nixpkgs stable 22.11 mono 4.8.1.0 - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
nixpkgs stable 23.05 mono 6.12.0.182 Potentially vulnerable - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
nixpkgs stable 23.05 mono 5.20.1.34 - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
nixpkgs stable 23.05 mono 4.8.1.0 - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
nixpkgs stable 23.11 mono 6.12.0.182 Potentially vulnerable - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
nixpkgs stable 23.11 mono 5.20.1.34 - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
nixpkgs stable 23.11 mono 4.8.1.0 - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
nixpkgs unstable mono 6.12.0.182 Potentially vulnerable - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
nixpkgs unstable mono 5.20.1.34 - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
nixpkgs unstable mono 4.8.1.0 - aseipp@pobox.com, obadz-nixos@obadz.com, rahul@gopinath.org
NOIR Linux Main
extra
mono 6.12.0.198 Potentially vulnerable - mmatongo_@hotmail.com
Npackd Stable Mono 6.12.0.199 Potentially vulnerable Development -
Npackd Stable Mono 6.12.0.182 Potentially vulnerable Development -
Npackd Stable Mono 6.12.0.179 Potentially vulnerable Development -
Npackd Stable Mono 6.12.0.107 Potentially vulnerable Development -
Npackd Stable Mono 6.12.0.98 Potentially vulnerable Development -
Npackd Stable Mono 6.10.0.104 Development -
Npackd Stable Mono 6.8.0.123 Development -
Npackd Stable Mono 6.8.0.105 Development -
Npackd Stable Mono 6.8.0.96 Development -
Npackd Stable Mono 6.6.0.161 Development -
Npackd Stable Mono 6.4.0.198 Development -
Npackd Stable Mono 6.0.0.334 Development -
Npackd Stable Mono 6.0.0.327 Development -
Npackd Stable Mono 6.0.0.319 Development -
Npackd Stable Mono 6.0.0.313 Development -
Npackd Stable Mono 5.20.1.34 Development -
Npackd Stable Mono 5.20.1.19 Development -
Npackd Stable Mono 5.18.1.3 Development -
Npackd Stable Mono 5.18.1 Development -
Npackd Stable Mono 5.18.0.240 Development -
Npackd Stable Mono 5.18.0.225 Development -
Npackd Stable Mono 5.16.0.220 Development -
Npackd Stable Mono 5.16.0.179 Development -
Npackd Stable Mono 5.14.0.177 Development -
Npackd Stable Mono 5.12.0.301 Development -
Npackd Stable Mono 5.12.0.226 Development -
Npackd Stable Mono 5.10.0.160 Development -
Npackd Stable Mono 5.8.0.108 Development -
Npackd Stable Mono 5.4.1.7 Development -
Npackd Stable Mono 5.4.1.6 Development -
Npackd Stable Mono 5.4.0.201 Development -
Npackd Stable Mono 5.2.0.224 Development -
Npackd Stable Mono 5.2.0.215 Development -
Npackd Stable Mono 5.0.1.1 Development -
Npackd Stable Mono 5.0.0.100 Development -
Npackd Stable Mono 4.8.1 Development -
Npackd Stable Mono 4.6.2.16 Development -
Npackd Stable Mono 4.6.1.5 Development -
Npackd Stable Mono 4.4.1 Development -
Npackd Stable Mono 4.2.3.4 Development -
Npackd Stable Mono 4.2.2.30 Development -
Npackd Stable Mono 4.0.3 Development -
Npackd Stable Mono 4.0.2 Development -
Npackd Stable Mono 4 Development -
Npackd Stable Mono 3.12 Potentially vulnerable Development -
Npackd Stable Mono 3.2.3 Potentially vulnerable Development -
Npackd Stable Mono 2.10.9 Potentially vulnerable Development -
Npackd Stable64 Mono 64 bit 6.12.0.199 Potentially vulnerable Development -
Npackd Stable64 Mono 64 bit 6.12.0.182 Potentially vulnerable Development -
Npackd Stable64 Mono 64 bit 6.12.0.179 Potentially vulnerable Development -
Npackd Stable64 Mono 64 bit 6.12.0.107 Potentially vulnerable Development -
Npackd Stable64 Mono 64 bit 6.12.0.98 Potentially vulnerable Development -
Npackd Stable64 Mono 64 bit 6.10.0.104 Development -
Npackd Stable64 Mono 64 bit 6.8.0.123 Development -
Npackd Stable64 Mono 64 bit 6.8.0.105 Development -
Npackd Stable64 Mono 64 bit 6.8.0.96 Development -
Npackd Stable64 Mono 64 bit 6.6.0.161 Development -
Npackd Stable64 Mono 64 bit 6.4.0.198 Development -
Npackd Stable64 Mono 64 bit 6.0.0.334 Development -
Npackd Stable64 Mono 64 bit 6.0.0.327 Development -
Npackd Stable64 Mono 64 bit 6.0.0.319 Development -
Npackd Stable64 Mono 64 bit 6.0.0.313 Development -
Npackd Stable64 Mono 64 bit 5.20.1.34 Development -
Npackd Stable64 Mono 64 bit 5.20.1.19 Development -
Npackd Stable64 Mono 64 bit 5.18.1.3 Development -
Npackd Stable64 Mono 64 bit 5.18.1 Development -
Npackd Stable64 Mono 64 bit 5.18.0.240 Development -
Npackd Stable64 Mono 64 bit 5.18.0.225 Development -
Npackd Stable64 Mono 64 bit 5.16.0.220 Development -
Npackd Stable64 Mono 64 bit 5.16.0.179 Development -
Npackd Stable64 Mono 64 bit 5.14.0.177 Development -
Npackd Stable64 Mono 64 bit 5.12.0.301 Development -
Npackd Stable64 Mono 64 bit 5.12.0.226 Development -
Npackd Stable64 Mono 64 bit 5.10.0.160 Development -
Npackd Stable64 Mono 64 bit 5.8.0.108 Development -
Npackd Stable64 Mono 64 bit 5.4.1.7 Development -
Npackd Stable64 Mono 64 bit 5.4.1.6 Development -
Npackd Stable64 Mono 64 bit 5.4.0.201 Development -
Npackd Stable64 Mono 64 bit 5.2.0.224 Development -
Npackd Stable64 Mono 64 bit 5.2.0.215 Development -
Npackd Stable64 Mono 64 bit 5.0.1.1 Development -
Npackd Stable64 Mono 64 bit 5.0.0.100 Development -
Npackd Stable64 Mono 64 bit 4.8.1 Development -
Npackd Stable64 Mono 64 bit 4.6.2.16 Development -
Npackd Stable64 Mono 64 bit 4.6.1.5 Development -
Npackd Stable64 Mono 64 bit 4.4.1 Development -
OpenBSD Ports lang/mono 6.12.0.199 Potentially vulnerable lang robert@openbsd.org
openmamba
devel
mono 6.12.0.182 Potentially vulnerable Applications/Development silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
mono 5.20.1.27 Development/Other bero@lindev.ch
OpenMandriva 4.1
main/release
mono 5.20.1.27 Development/Other bero@lindev.ch
OpenMandriva 4.2
main/release
mono 6.12.0.90 Potentially vulnerable Development/Other bero@lindev.ch
OpenMandriva 4.3
main/release
mono 6.12.0.122 Potentially vulnerable Development/Other bero@lindev.ch
OpenMandriva Rolling
main/release
mono 6.12.0.199 Potentially vulnerable Development/Other bero@lindev.ch
OpenMandriva Cooker
main/release
mono 6.12.0.199 Potentially vulnerable Development/Other bero@lindev.ch
OpenPKG mono 4.6.2.6 Language -
Parabola
extra
mono 6.12.0.205 - -
Pardus 21
main
mono 6.8.0.105 interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Parrot
parrot-updates/main
mono 6.8.0.105 interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Parrot
parrot/main
mono 6.8.0.105 interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Pisi Linux
main
mono 6.12.0.199 Potentially vulnerable app:console admins@pisilinux.org
pkgsrc current lang/mono 6.12.0.199 Potentially vulnerable lang pkgsrc-users@netbsd.org
PLD Linux mono 4.8.1.0 - -
PureOS Amber mono 5.18.0.240 cli-mono pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
PureOS landing mono 6.8.0.105 cli-mono pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Raspbian Oldstable
main
mono 6.8.0.105 interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Raspbian Stable
main
mono 6.8.0.105 interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Raspbian Testing
main
mono 6.8.0.105 interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Rosa 2014.1
main/updates
mono 3.12.1 - -
Rosa 2014.1
main/release
mono 2.10.9 Potentially vulnerable - -
Rosa 2016.1
main/release
mono 4.6.0 - -
Rosa 2016.1
main/updates
mono 4.6.0 - -
Rosa 2021.1
main/release
mono 6.12.0 Potentially vulnerable Development/C# m.novosyolov@rosalinux.ru
Rosa Server 7.3
extra/release
mono 4.6.2 Development/Languages alex2048@mail.ru
Rosa Server 7.5
extra/release
mono 4.6.2 Development/Languages alex2048@mail.ru
Scoop
main
mono 6.12.0.199 Potentially vulnerable - -
SlackBuilds development/mono 6.12.0.199 Potentially vulnerable development svoges.sbo@gmail.com
SliTaz Cooking mono 2.10.8 Potentially vulnerable development rcx@zoominternet.net
SliTaz Cooking mono-dev 2.10.8 Potentially vulnerable development rcx@zoominternet.net
SliTaz Cooking mono-doc 2.10.8 Potentially vulnerable development rcx@zoominternet.net
SliTaz Next mono-doc 5.12.0.226 development devel@slitaz.org
SliTaz Next mono 5.12.0.226 development devel@slitaz.org
SliTaz Next mono-dev 5.12.0.226 development devel@slitaz.org
SliTaz Next mono-doc 5.12.0.226 development devel@slitaz.org
SliTaz Next mono 5.12.0.226 development devel@slitaz.org
SliTaz Next mono-dev 5.12.0.226 development devel@slitaz.org
Solus mono 6.12.0.122 Potentially vulnerable programming algent@protonmail.com
Solus mono-dbginfo 6.12.0.122 Potentially vulnerable debug algent@protonmail.com
Solus mono-devel 6.12.0.122 Potentially vulnerable programming.devel algent@protonmail.com
Spack mono 6.12.0.122 Potentially vulnerable - grospelliergilles@spack
T2 SDE mono 4.8.0.495 extra/development t2@t2-project.org
Termux mono 6.12.0.199 Potentially vulnerable - termux@github
Trisquel 10.0
nabia/main
mono 6.8.0.105 universe/interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Trisquel 11.0
aramo/main
mono 6.8.0.105 universe/interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Ubuntu 14.04
trusty/main
mono 3.2.8 Potentially vulnerable interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Ubuntu 14.04
trusty-updates/main
mono 3.2.8 Potentially vulnerable interpreters ubuntu-devel-discuss@lists.ubuntu.com, directhex@apebox.org, meebey@debian.org
Ubuntu 16.04
xenial/main
mono 4.2.1.102 interpreters ubuntu-devel-discuss@lists.ubuntu.com, directhex@apebox.org, meebey@debian.org
Ubuntu 18.04
bionic/universe
mono 4.6.2.7 universe/interpreters ubuntu-devel-discuss@lists.ubuntu.com, directhex@apebox.org, meebey@debian.org
Ubuntu 20.04
focal/universe
mono 6.8.0.105 universe/interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Ubuntu 22.04
jammy/universe
mono 6.8.0.105 universe/interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Ubuntu 23.04
lunar/universe
mono 6.8.0.105 universe/interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Ubuntu 23.10
mantic/universe
mono 6.8.0.105 universe/interpreters pkg-mono-group@lists.alioth.debian.org, directhex@apebox.org, meebey@debian.org
Void Linux x86_64
x86_64
mono 6.12.0.199 Potentially vulnerable - helmut@pozimski.eu
Void Linux x86_64
x86_64
mono-devel 6.12.0.199 Potentially vulnerable - helmut@pozimski.eu
Wikidata Mono 6.12.0.199 Potentially vulnerable - -
winget Mono for Windows 6.12.0.182 Potentially vulnerable c# -
winget Mono for Windows 6.12.0.147 Potentially vulnerable c# -
winget Mono for Windows 6.12.0.146 Potentially vulnerable c# -
winget Mono for Windows 6.12.0.137 Potentially vulnerable c# -
winget Mono 6.12.0.134 Potentially vulnerable c# -
winget Mono 6.12.0.132 Potentially vulnerable c# -
winget Mono 6.12.0.131 Potentially vulnerable c# -
winget Mono 6.12.0.130 Potentially vulnerable c# -
winget Mono 6.12.0.129 Potentially vulnerable c# -
winget Mono 6.12.0.126 Potentially vulnerable c# -
winget Mono 6.12.0.125 Potentially vulnerable c# -
winget Mono 6.12.0.124 Potentially vulnerable c# -
winget Mono 6.12.0.114 Potentially vulnerable c# -
winget Mono 6.12.0.113 Potentially vulnerable c# -
winget Mono 6.12.0.112 Potentially vulnerable c# -
winget Mono 6.12.0.111 Potentially vulnerable c# -
winget Mono 6.12.0.110 Potentially vulnerable c# -
winget Mono 6.12.0.107 Potentially vulnerable c# -
winget Mono 6.12.0.101 Potentially vulnerable c# -
winget Mono 6.12.0.100 Potentially vulnerable c# -
winget Mono 6.12.0.99 Potentially vulnerable c# -
winget Mono 6.12.0.98 Potentially vulnerable c# -
winget Mono 6.12.0.77 Potentially vulnerable c# -
winget Mono 6.10.0.105 c# -
winget Mono 6.10.0.104 c# -
winget Mono 6.10.0.103 c# -
winget Mono 6.10.0.101 c# -
winget Mono 6.10.0.96 c# -
winget Mono 6.10.0.95 c# -
winget Mono 6.10.0.94 c# -
winget Mono 6.10.0.92 c# -
winget Mono 6.10.0.91 c# -
winget Mono 6.10.0.87 c# -
winget Mono 6.10.0.86 c# -
winget Mono 6.10.0.81 c# -
winget Mono 6.10.0.78 c# -
winget Mono 6.10.0.76 c# -
winget Mono 6.10.0.74 c# -
winget Mono 6.10.0.73 c# -
winget Mono 6.10.0.72 c# -
winget Mono 6.10.0.70 c# -
winget Mono 6.10.0.69 c# -
winget Mono 6.10.0.68 c# -
winget Mono 6.10.0.65 c# -
winget Mono 6.10.0.62 c# -
winget Mono 6.10.0.60 c# -
winget Mono 6.10.0.56 c# -
winget Mono 6.10.0.54 c# -
winget Mono 6.10.0.53 c# -
winget Mono 6.10.0.51 c# -
winget Mono 6.10.0.48 c# -
winget Mono 6.8.0.123 c# -
winget Mono 6.8.0.72 c# -