mruby 1.4.1 for Ruby

CPE Details

mruby 1.4.1 for Ruby
1.4.1
2023-01-17
19h24 +00:00
2023-01-17
19h51 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:mruby:mruby:1.4.1:*:*:*:*:ruby:*:*

Informations

Vendor

mruby

Product

mruby

Version

1.4.1

Target Software

ruby

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2025-7207 2025-07-09 00h02 +00:00 A vulnerability, which was classified as problematic, was found in mruby up to 3.4.0-rc2. Affected is the function scope_new of the file mrbgems/mruby-compiler/core/codegen.c of the component nregs Handler. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The name of the patch is 1fdd96104180cc0fb5d3cb086b05ab6458911bb9. It is recommended to apply a patch to fix this issue.
4.8
Moyen
CVE-2021-46023 2023-02-14 00h00 +00:00 An Untrusted Pointer Dereference was discovered in function mrb_vm_exec in mruby before 3.1.0-rc. The vulnerability causes a segmentation fault and application crash.
7.5
Haute
CVE-2022-1934 2022-05-31 00h20 +00:00 Use After Free in GitHub repository mruby/mruby prior to 3.2.
7.8
Haute
CVE-2022-1427 2022-04-22 21h35 +00:00 Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited.
7.8
Haute
CVE-2022-1286 2022-04-10 08h40 +00:00 heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
9.8
Critique
CVE-2022-1276 2022-04-10 07h35 +00:00 Out-of-bounds Read in mrb_get_args in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
9.8
Critique
CVE-2022-1212 2022-04-05 01h45 +00:00 Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
9.8
Critique
CVE-2022-1201 2022-04-02 05h45 +00:00 NULL Pointer Dereference in mrb_vm_exec with super in GitHub repository mruby/mruby prior to 3.2. This vulnerability is capable of making the mruby interpreter crash, thus affecting the availability of the system.
6.5
Moyen
CVE-2022-1106 2022-03-27 12h05 +00:00 use after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.
9.1
Critique
CVE-2022-1071 2022-03-26 02h40 +00:00 User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.
8.2
Haute
CVE-2022-0890 2022-03-10 00h10 +00:00 NULL Pointer Dereference in GitHub repository mruby/mruby prior to 3.2.
5.5
Moyen
CVE-2022-0717 2022-02-23 01h05 +00:00 Out-of-bounds Read in GitHub repository mruby/mruby prior to 3.2.
9.1
Critique
CVE-2022-0632 2022-02-19 13h00 +00:00 NULL Pointer Dereference in Homebrew mruby prior to 3.2.
5.5
Moyen
CVE-2022-0630 2022-02-19 12h55 +00:00 Out-of-bounds Read in Homebrew mruby prior to 3.2.
7.1
Haute
CVE-2022-0631 2022-02-18 12h55 +00:00 Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.
9.8
Critique
CVE-2022-0623 2022-02-17 05h30 +00:00 Out-of-bounds Read in Homebrew mruby prior to 3.2.
9.1
Critique
CVE-2022-0614 2022-02-16 08h40 +00:00 Use of Out-of-range Pointer Offset in Homebrew mruby prior to 3.2.
5.5
Moyen
CVE-2022-0570 2022-02-13 03h50 +00:00 Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.
9.8
Critique
CVE-2022-0525 2022-02-09 02h45 +00:00 Out-of-bounds Read in Homebrew mruby prior to 3.2.
9.1
Critique
CVE-2022-0481 2022-02-04 21h33 +00:00 NULL Pointer Dereference in Homebrew mruby prior to 3.2.
7.5
Haute
CVE-2022-0326 2022-01-21 05h45 +00:00 NULL Pointer Dereference in Homebrew mruby prior to 3.2.
5.5
Moyen
CVE-2022-0240 2022-01-17 12h35 +00:00 mruby is vulnerable to NULL Pointer Dereference
7.5
Haute
CVE-2022-0080 2022-01-02 11h30 +00:00 mruby is vulnerable to Heap-based Buffer Overflow
9.8
Critique
CVE-2021-4188 2021-12-30 05h55 +00:00 mruby is vulnerable to NULL Pointer Dereference
7.5
Haute
CVE-2021-4110 2021-12-15 03h40 +00:00 mruby is vulnerable to NULL Pointer Dereference
7.5
Haute
CVE-2020-15866 2020-07-21 12h54 +00:00 mruby through 2.1.2-rc has a heap-based buffer overflow in the mrb_yield_with_class function in vm.c because of incorrect VM stack handling. It can be triggered via the stack_copy function.
9.8
Critique
CVE-2018-14337 2018-07-17 01h00 +00:00 The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.
7.5
Haute
CVE-2018-12247 2018-06-12 14h00 +00:00 An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class, related to certain .clone usage, because mrb_obj_clone in kernel.c copies flags other than the MRB_FLAG_IS_FROZEN flag (e.g., the embedded flag).
7.5
Haute
CVE-2018-12248 2018-06-12 14h00 +00:00 An issue was discovered in mruby 1.4.1. There is a heap-based buffer over-read associated with OP_ENTER because mrbgems/mruby-fiber/src/fiber.c does not extend the stack in cases of many arguments to fiber.
7.5
Haute
CVE-2018-12249 2018-06-12 12h00 +00:00 An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class_real because "class BasicObject" is not properly supported in class.c.
7.5
Haute
CVE-2018-11743 2018-06-05 11h00 +00:00 The init_copy function in kernel.c in mruby 1.4.1 makes initialize_copy calls for TT_ICLASS objects, which allows attackers to cause a denial of service (mrb_hash_keys uninitialized pointer and application crash) or possibly have unspecified other impact.
9.8
Critique