Show filters
264 Total Results
Displaying 31-40 of 264
Sort by:
Attacker Value
Unknown

CVE-2022-1276

Disclosure Date: April 10, 2022 (last updated October 07, 2023)
Out-of-bounds Read in mrb_get_args in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
Attacker Value
Unknown

CVE-2022-24795

Disclosure Date: April 05, 2022 (last updated October 07, 2023)
yajl-ruby is a C binding to the YAJL JSON parsing and generation library. The 1.x branch and the 2.x branch of `yajl` contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. The reallocation logic at `yajl_buf.c#L64` may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf->alloc into a small heap chunk. These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer. Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption. This vulnerability mostly impacts process availability. Maintainers believe exploitation for arbitrary code execution is unlikely. A patch is available a…
Attacker Value
Unknown

CVE-2022-1212

Disclosure Date: April 05, 2022 (last updated October 07, 2023)
Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
Attacker Value
Unknown

CVE-2022-1201

Disclosure Date: April 02, 2022 (last updated October 07, 2023)
NULL Pointer Dereference in mrb_vm_exec with super in GitHub repository mruby/mruby prior to 3.2. This vulnerability is capable of making the mruby interpreter crash, thus affecting the availability of the system.
Attacker Value
Unknown

CVE-2022-1106

Disclosure Date: March 27, 2022 (last updated October 07, 2023)
use after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.
Attacker Value
Unknown

CVE-2022-1071

Disclosure Date: March 26, 2022 (last updated October 07, 2023)
User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.
Attacker Value
Unknown

CVE-2022-0890

Disclosure Date: March 10, 2022 (last updated October 07, 2023)
NULL Pointer Dereference in GitHub repository mruby/mruby prior to 3.2.
Attacker Value
Unknown

CVE-2021-45977

Disclosure Date: February 25, 2022 (last updated October 07, 2023)
JetBrains IntelliJ IDEA 2021.3.1 Preview, IntelliJ IDEA 2021.3.1 RC, PyCharm Professional 2021.3.1 RC, GoLand 2021.3.1, PhpStorm 2021.3.1 Preview, PhpStorm 2021.3.1 RC, RubyMine 2021.3.1 Preview, RubyMine 2021.3.1 RC, CLion 2021.3.1, WebStorm 2021.3.1 Preview, and WebStorm 2021.3.1 RC (used as Remote Development backend IDEs) bind to the 0.0.0.0 IP address. The fixed versions are: IntelliJ IDEA 2021.3.1, PyCharm Professional 2021.3.1, GoLand 2021.3.2, PhpStorm 2021.3.1 (213.6461.83), RubyMine 2021.3.1, CLion 2021.3.2, and WebStorm 2021.3.1.
Attacker Value
Unknown

CVE-2022-0717

Disclosure Date: February 23, 2022 (last updated October 07, 2023)
Out-of-bounds Read in GitHub repository mruby/mruby prior to 3.2.
Attacker Value
Unknown

CVE-2022-0632

Disclosure Date: February 19, 2022 (last updated October 07, 2023)
NULL Pointer Dereference in Homebrew mruby prior to 3.2.