Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mruby mruby vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2022-1212
Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby before 3.2. Possible arbitrary code execution if being exploited.
Mruby Mruby
Mruby Mruby 3.1.0
9.8
CVSSv3
CVE-2020-15866
mruby up to and including 2.1.2-rc has a heap-based buffer overflow in the mrb_yield_with_class function in vm.c because of incorrect VM stack handling. It can be triggered via the stack_copy function.
Mruby Mruby 2.1.2
Mruby Mruby
Debian Debian Linux 9.0
7.8
CVSSv3
CVE-2022-1427
Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby before 3.2. # Impact: Possible arbitrary code execution if being exploited.
Mruby Mruby
7.5
CVSSv3
CVE-2021-46023
An Untrusted Pointer Dereference exists in function mrb_vm_exec in mruby prior to 3.1.0-rc. The vulnerability causes a segmentation fault and application crash.
Mruby Mruby
9.8
CVSSv3
CVE-2018-10199
In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.
Mruby Mruby
7.8
CVSSv3
CVE-2022-1934
Use After Free in GitHub repository mruby/mruby before 3.2.
Mruby Mruby
7.5
CVSSv3
CVE-2022-0240
mruby is vulnerable to NULL Pointer Dereference
Mruby Mruby
5.5
CVSSv3
CVE-2022-0326
NULL Pointer Dereference in Homebrew mruby before 3.2.
Mruby Mruby
9.1
CVSSv3
CVE-2022-0525
Out-of-bounds Read in Homebrew mruby before 3.2.
Mruby Mruby
8.2
CVSSv3
CVE-2022-1071
User after free in mrb_vm_exec in GitHub repository mruby/mruby before 3.2.
Mruby Mruby
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »