Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mruby mruby vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2018-12248
An issue exists in mruby 1.4.1. There is a heap-based buffer over-read associated with OP_ENTER because mrbgems/mruby-fiber/src/fiber.c does not extend the stack in cases of many arguments to fiber.
Mruby Mruby 1.4.1
605
VMScore
CVE-2020-36401
mruby 2.1.2 has a double free in mrb_default_allocf (called from mrb_free and obj_free).
Mruby Mruby 2.1.2
445
VMScore
CVE-2018-12247
An issue exists in mruby 1.4.1. There is a NULL pointer dereference in mrb_class, related to certain .clone usage, because mrb_obj_clone in kernel.c copies flags other than the MRB_FLAG_IS_FROZEN flag (e.g., the embedded flag).
Mruby Mruby 1.4.1
605
VMScore
CVE-2017-9527
The mark_context_stack function in gc.c in mruby up to and including 1.2.0 allows malicious users to cause a denial of service (heap-based use-after-free and application crash) or possibly have unspecified other impact via a crafted .rb file.
Mruby Mruby
Debian Debian Linux 9.0
668
VMScore
CVE-2018-10191
In versions of mruby up to and including 1.4.0, an integer overflow exists in src/vm.c::mrb_vm_exec() when handling OP_GETUPVAR in the presence of deep scope nesting, resulting in a use-after-free. An attacker that can cause Ruby code to be run can use this to possibly execute ar...
Mruby Mruby
Debian Debian Linux 9.0
668
VMScore
CVE-2018-11743
The init_copy function in kernel.c in mruby 1.4.1 makes initialize_copy calls for TT_ICLASS objects, which allows malicious users to cause a denial of service (mrb_hash_keys uninitialized pointer and application crash) or possibly have unspecified other impact.
Mruby Mruby 1.4.1
Debian Debian Linux 9.0
445
VMScore
CVE-2018-12249
An issue exists in mruby 1.4.1. There is a NULL pointer dereference in mrb_class_real because "class BasicObject" is not properly supported in class.c.
Mruby Mruby 1.4.1
Debian Debian Linux 9.0
445
VMScore
CVE-2018-14337
The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.
Mruby Mruby 1.4.1
Debian Debian Linux 9.0
445
VMScore
CVE-2016-4864
H2O versions 2.0.3 and previous versions and 2.1.0-beta2 and previous versions allows remote malicious users to cause a denial-of-service (DoS) via format string specifiers in a template file via fastcgi, mruby, proxy, redirect or reproxy.
Dena H2o
Dena H2o 2.1.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4