Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mruby mruby vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2022-1212
Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby before 3.2. Possible arbitrary code execution if being exploited.
Mruby Mruby
Mruby Mruby 3.1.0
668
VMScore
CVE-2020-15866
mruby up to and including 2.1.2-rc has a heap-based buffer overflow in the mrb_yield_with_class function in vm.c because of incorrect VM stack handling. It can be triggered via the stack_copy function.
Mruby Mruby 2.1.2
Mruby Mruby
Debian Debian Linux 9.0
409
VMScore
CVE-2022-1427
Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby before 3.2. # Impact: Possible arbitrary code execution if being exploited.
Mruby Mruby
NA
CVE-2021-46023
An Untrusted Pointer Dereference exists in function mrb_vm_exec in mruby prior to 3.1.0-rc. The vulnerability causes a segmentation fault and application crash.
Mruby Mruby
668
VMScore
CVE-2018-10199
In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.
Mruby Mruby
409
VMScore
CVE-2022-1934
Use After Free in GitHub repository mruby/mruby before 3.2.
Mruby Mruby
445
VMScore
CVE-2022-0240
mruby is vulnerable to NULL Pointer Dereference
Mruby Mruby
383
VMScore
CVE-2022-0326
NULL Pointer Dereference in Homebrew mruby before 3.2.
Mruby Mruby
570
VMScore
CVE-2022-0525
Out-of-bounds Read in Homebrew mruby before 3.2.
Mruby Mruby
605
VMScore
CVE-2022-1071
User after free in mrb_vm_exec in GitHub repository mruby/mruby before 3.2.
Mruby Mruby
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »