Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mruby mruby vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2021-46023
An Untrusted Pointer Dereference exists in function mrb_vm_exec in mruby prior to 3.1.0-rc. The vulnerability causes a segmentation fault and application crash.
Mruby Mruby
7.8
CVSSv3
CVE-2022-1934
Use After Free in GitHub repository mruby/mruby before 3.2.
Mruby Mruby
7.8
CVSSv3
CVE-2022-1427
Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby before 3.2. # Impact: Possible arbitrary code execution if being exploited.
Mruby Mruby
9.8
CVSSv3
CVE-2022-1286
heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby before 3.2. Possible arbitrary code execution if being exploited.
Mruby Mruby
9.8
CVSSv3
CVE-2022-1276
Out-of-bounds Read in mrb_get_args in GitHub repository mruby/mruby before 3.2. Possible arbitrary code execution if being exploited.
Mruby Mruby
9.8
CVSSv3
CVE-2022-1212
Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby before 3.2. Possible arbitrary code execution if being exploited.
Mruby Mruby
Mruby Mruby 3.1.0
6.5
CVSSv3
CVE-2022-1201
NULL Pointer Dereference in mrb_vm_exec with super in GitHub repository mruby/mruby before 3.2. This vulnerability is capable of making the mruby interpreter crash, thus affecting the availability of the system.
Mruby Mruby
9.1
CVSSv3
CVE-2022-1106
use after free in mrb_vm_exec in GitHub repository mruby/mruby before 3.2.
Mruby Mruby
8.2
CVSSv3
CVE-2022-1071
User after free in mrb_vm_exec in GitHub repository mruby/mruby before 3.2.
Mruby Mruby
5.5
CVSSv3
CVE-2022-0890
NULL Pointer Dereference in GitHub repository mruby/mruby before 3.2.
Mruby Mruby
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »