CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
Use After Free in GitHub repository mruby/mruby prior to 3.2. | 7.8 |
High |
||
heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited. | 9.8 |
Critical |
||
Out-of-bounds Read in mrb_get_args in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited. | 9.8 |
Critical |
||
Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited. | 9.8 |
Critical |
||
use after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2. | 9.1 |
Critical |
||
User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2. | 8.2 |
High |
||
NULL Pointer Dereference in GitHub repository mruby/mruby prior to 3.2. | 5.5 |
Medium |
||
Out-of-bounds Read in GitHub repository mruby/mruby prior to 3.2. | 9.1 |
Critical |
||
NULL Pointer Dereference in Homebrew mruby prior to 3.2. | 5.5 |
Medium |
||
Out-of-bounds Read in Homebrew mruby prior to 3.2. | 7.1 |
High |
||
Heap-based Buffer Overflow in Homebrew mruby prior to 3.2. | 9.8 |
Critical |
||
Out-of-bounds Read in Homebrew mruby prior to 3.2. | 9.1 |
Critical |
||
Heap-based Buffer Overflow in Homebrew mruby prior to 3.2. | 9.8 |
Critical |
||
Out-of-bounds Read in Homebrew mruby prior to 3.2. | 9.1 |
Critical |
||
NULL Pointer Dereference in Homebrew mruby prior to 3.2. | 7.5 |
High |
||
NULL Pointer Dereference in Homebrew mruby prior to 3.2. | 5.5 |
Medium |
||
mruby is vulnerable to NULL Pointer Dereference | 7.5 |
High |
||
mruby is vulnerable to Heap-based Buffer Overflow | 9.8 |
Critical |
||
mruby is vulnerable to NULL Pointer Dereference | 7.5 |
High |
||
mruby is vulnerable to NULL Pointer Dereference | 7.5 |
High |
||
mruby through 2.1.2-rc has a heap-based buffer overflow in the mrb_yield_with_class function in vm.c because of incorrect VM stack handling. It can be triggered via the stack_copy function. | 9.8 |
Critical |
||
The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length. | 7.5 |
High |
||
An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class, related to certain .clone usage, because mrb_obj_clone in kernel.c copies flags other than the MRB_FLAG_IS_FROZEN flag (e.g., the embedded flag). | 7.5 |
High |
||
An issue was discovered in mruby 1.4.1. There is a heap-based buffer over-read associated with OP_ENTER because mrbgems/mruby-fiber/src/fiber.c does not extend the stack in cases of many arguments to fiber. | 7.5 |
High |
||
An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class_real because "class BasicObject" is not properly supported in class.c. | 7.5 |
High |
||
The init_copy function in kernel.c in mruby 1.4.1 makes initialize_copy calls for TT_ICLASS objects, which allows attackers to cause a denial of service (mrb_hash_keys uninitialized pointer and application crash) or possibly have unspecified other impact. | 9.8 |
Critical |