Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mruby mruby vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2022-1212
Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby before 3.2. Possible arbitrary code execution if being exploited.
Mruby Mruby
Mruby Mruby 3.1.0
7.5
CVSSv2
CVE-2020-15866
mruby up to and including 2.1.2-rc has a heap-based buffer overflow in the mrb_yield_with_class function in vm.c because of incorrect VM stack handling. It can be triggered via the stack_copy function.
Mruby Mruby 2.1.2
Mruby Mruby
Debian Debian Linux 9.0
5
CVSSv2
CVE-2021-4110
mruby is vulnerable to NULL Pointer Dereference
Mruby Mruby
5
CVSSv2
CVE-2021-4188
mruby is vulnerable to NULL Pointer Dereference
Mruby Mruby
6.4
CVSSv2
CVE-2022-1106
use after free in mrb_vm_exec in GitHub repository mruby/mruby before 3.2.
Mruby Mruby
7.5
CVSSv2
CVE-2022-1286
heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby before 3.2. Possible arbitrary code execution if being exploited.
Mruby Mruby
NA
CVE-2021-46023
An Untrusted Pointer Dereference exists in function mrb_vm_exec in mruby prior to 3.1.0-rc. The vulnerability causes a segmentation fault and application crash.
Mruby Mruby
4.9
CVSSv2
CVE-2022-1201
NULL Pointer Dereference in mrb_vm_exec with super in GitHub repository mruby/mruby before 3.2. This vulnerability is capable of making the mruby interpreter crash, thus affecting the availability of the system.
Mruby Mruby
6.8
CVSSv2
CVE-2022-1071
User after free in mrb_vm_exec in GitHub repository mruby/mruby before 3.2.
Mruby Mruby
4.6
CVSSv2
CVE-2022-1934
Use After Free in GitHub repository mruby/mruby before 3.2.
Mruby Mruby
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
CVE-2006-4304
CVE-2023-26603
CVE-2024-28327
CVE-2023-50363
CVE-2024-21905
template injection
CVE-2024-3400
cross-site request forgery
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »