Vulnerabilites related to mruby - mruby/mruby
cve-2022-0525
Vulnerability from cvelistv5
Published
2022-02-09 03:45
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in Homebrew mruby prior to 3.2.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/e19e109f-acf0-4048-8ee8-1b10a870f1e9 | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/0849a2885f81cfd82134992c06df3ccd59052ac7 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:32:46.180Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/e19e109f-acf0-4048-8ee8-1b10a870f1e9", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/0849a2885f81cfd82134992c06df3ccd59052ac7", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-bounds Read in Homebrew mruby prior to 3.2.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125 Out-of-bounds Read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-09T03:45:10", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/e19e109f-acf0-4048-8ee8-1b10a870f1e9", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/0849a2885f81cfd82134992c06df3ccd59052ac7", }, ], source: { advisory: "e19e109f-acf0-4048-8ee8-1b10a870f1e9", discovery: "EXTERNAL", }, title: "Out-of-bounds Read in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-0525", STATE: "PUBLIC", TITLE: "Out-of-bounds Read in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out-of-bounds Read in Homebrew mruby prior to 3.2.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-125 Out-of-bounds Read", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/e19e109f-acf0-4048-8ee8-1b10a870f1e9", refsource: "CONFIRM", url: "https://huntr.dev/bounties/e19e109f-acf0-4048-8ee8-1b10a870f1e9", }, { name: "https://github.com/mruby/mruby/commit/0849a2885f81cfd82134992c06df3ccd59052ac7", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/0849a2885f81cfd82134992c06df3ccd59052ac7", }, ], }, source: { advisory: "e19e109f-acf0-4048-8ee8-1b10a870f1e9", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-0525", datePublished: "2022-02-09T03:45:10", dateReserved: "2022-02-08T00:00:00", dateUpdated: "2024-08-02T23:32:46.180Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-1286
Vulnerability from cvelistv5
Published
2022-04-10 10:40
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/f918376e-b488-4113-963d-ffe8716e4189 | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/b1d0296a937fe278239bdfac840a3fd0e93b3ee9 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:55:24.606Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/f918376e-b488-4113-963d-ffe8716e4189", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/b1d0296a937fe278239bdfac840a3fd0e93b3ee9", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122 Heap-based Buffer Overflow", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-04-10T10:40:09", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/f918376e-b488-4113-963d-ffe8716e4189", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/b1d0296a937fe278239bdfac840a3fd0e93b3ee9", }, ], source: { advisory: "f918376e-b488-4113-963d-ffe8716e4189", discovery: "EXTERNAL", }, title: "heap-buffer-overflow in mrb_vm_exec in mruby/mruby in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-1286", STATE: "PUBLIC", TITLE: "heap-buffer-overflow in mrb_vm_exec in mruby/mruby in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-122 Heap-based Buffer Overflow", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/f918376e-b488-4113-963d-ffe8716e4189", refsource: "CONFIRM", url: "https://huntr.dev/bounties/f918376e-b488-4113-963d-ffe8716e4189", }, { name: "https://github.com/mruby/mruby/commit/b1d0296a937fe278239bdfac840a3fd0e93b3ee9", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/b1d0296a937fe278239bdfac840a3fd0e93b3ee9", }, ], }, source: { advisory: "f918376e-b488-4113-963d-ffe8716e4189", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-1286", datePublished: "2022-04-10T10:40:09", dateReserved: "2022-04-09T00:00:00", dateUpdated: "2024-08-02T23:55:24.606Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-0717
Vulnerability from cvelistv5
Published
2022-02-23 02:05
Modified
2024-08-02 23:40
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in GitHub repository mruby/mruby prior to 3.2.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/27a851a5-7ebf-409b-854f-b2614771e8f9 | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/f72315575f78a9a773adbce0ee7d3ec33434cb76 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:40:03.266Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/27a851a5-7ebf-409b-854f-b2614771e8f9", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/f72315575f78a9a773adbce0ee7d3ec33434cb76", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-bounds Read in GitHub repository mruby/mruby prior to 3.2.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125 Out-of-bounds Read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-23T02:05:11", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/27a851a5-7ebf-409b-854f-b2614771e8f9", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/f72315575f78a9a773adbce0ee7d3ec33434cb76", }, ], source: { advisory: "27a851a5-7ebf-409b-854f-b2614771e8f9", discovery: "EXTERNAL", }, title: "Out-of-bounds Read in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-0717", STATE: "PUBLIC", TITLE: "Out-of-bounds Read in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out-of-bounds Read in GitHub repository mruby/mruby prior to 3.2.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-125 Out-of-bounds Read", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/27a851a5-7ebf-409b-854f-b2614771e8f9", refsource: "CONFIRM", url: "https://huntr.dev/bounties/27a851a5-7ebf-409b-854f-b2614771e8f9", }, { name: "https://github.com/mruby/mruby/commit/f72315575f78a9a773adbce0ee7d3ec33434cb76", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/f72315575f78a9a773adbce0ee7d3ec33434cb76", }, ], }, source: { advisory: "27a851a5-7ebf-409b-854f-b2614771e8f9", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-0717", datePublished: "2022-02-23T02:05:11", dateReserved: "2022-02-22T00:00:00", dateUpdated: "2024-08-02T23:40:03.266Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-1276
Vulnerability from cvelistv5
Published
2022-04-10 09:35
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in mrb_get_args in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/6ea041d1-e2aa-472c-bf3e-da5fa8726c25 | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/c8c083cb750606b2da81582cd8e43b442bb143e6 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:55:24.623Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/6ea041d1-e2aa-472c-bf3e-da5fa8726c25", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/c8c083cb750606b2da81582cd8e43b442bb143e6", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-bounds Read in mrb_get_args in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125 Out-of-bounds Read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-04-10T09:35:10", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/6ea041d1-e2aa-472c-bf3e-da5fa8726c25", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/c8c083cb750606b2da81582cd8e43b442bb143e6", }, ], source: { advisory: "6ea041d1-e2aa-472c-bf3e-da5fa8726c25", discovery: "EXTERNAL", }, title: "Out-of-bounds Read in mrb_get_args in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-1276", STATE: "PUBLIC", TITLE: "Out-of-bounds Read in mrb_get_args in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out-of-bounds Read in mrb_get_args in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-125 Out-of-bounds Read", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/6ea041d1-e2aa-472c-bf3e-da5fa8726c25", refsource: "CONFIRM", url: "https://huntr.dev/bounties/6ea041d1-e2aa-472c-bf3e-da5fa8726c25", }, { name: "https://github.com/mruby/mruby/commit/c8c083cb750606b2da81582cd8e43b442bb143e6", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/c8c083cb750606b2da81582cd8e43b442bb143e6", }, ], }, source: { advisory: "6ea041d1-e2aa-472c-bf3e-da5fa8726c25", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-1276", datePublished: "2022-04-10T09:35:10", dateReserved: "2022-04-08T00:00:00", dateUpdated: "2024-08-02T23:55:24.623Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-0630
Vulnerability from cvelistv5
Published
2022-02-19 13:55
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in Homebrew mruby prior to 3.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad | x_refsource_MISC | |
https://huntr.dev/bounties/f7cdd680-1a7f-4992-b4b8-44b5e4ba3e32 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:32:46.461Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/f7cdd680-1a7f-4992-b4b8-44b5e4ba3e32", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-bounds Read in Homebrew mruby prior to 3.2.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125 Out-of-bounds Read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-19T13:55:09", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/f7cdd680-1a7f-4992-b4b8-44b5e4ba3e32", }, ], source: { advisory: "f7cdd680-1a7f-4992-b4b8-44b5e4ba3e32", discovery: "EXTERNAL", }, title: "Out-of-bounds Read in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-0630", STATE: "PUBLIC", TITLE: "Out-of-bounds Read in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out-of-bounds Read in Homebrew mruby prior to 3.2.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-125 Out-of-bounds Read", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad", }, { name: "https://huntr.dev/bounties/f7cdd680-1a7f-4992-b4b8-44b5e4ba3e32", refsource: "CONFIRM", url: "https://huntr.dev/bounties/f7cdd680-1a7f-4992-b4b8-44b5e4ba3e32", }, ], }, source: { advisory: "f7cdd680-1a7f-4992-b4b8-44b5e4ba3e32", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-0630", datePublished: "2022-02-19T13:55:09", dateReserved: "2022-02-16T00:00:00", dateUpdated: "2024-08-02T23:32:46.461Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-0631
Vulnerability from cvelistv5
Published
2022-02-18 13:55
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/9bdc49ca-6697-4adc-a785-081e1961bf40 | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/47068ae07a5fa3aa9a1879cdfe98a9ce0f339299 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:32:46.546Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/9bdc49ca-6697-4adc-a785-081e1961bf40", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/47068ae07a5fa3aa9a1879cdfe98a9ce0f339299", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122 Heap-based Buffer Overflow", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-18T13:55:10", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/9bdc49ca-6697-4adc-a785-081e1961bf40", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/47068ae07a5fa3aa9a1879cdfe98a9ce0f339299", }, ], source: { advisory: "9bdc49ca-6697-4adc-a785-081e1961bf40", discovery: "EXTERNAL", }, title: "Heap-based Buffer Overflow in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-0631", STATE: "PUBLIC", TITLE: "Heap-based Buffer Overflow in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-122 Heap-based Buffer Overflow", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/9bdc49ca-6697-4adc-a785-081e1961bf40", refsource: "CONFIRM", url: "https://huntr.dev/bounties/9bdc49ca-6697-4adc-a785-081e1961bf40", }, { name: "https://github.com/mruby/mruby/commit/47068ae07a5fa3aa9a1879cdfe98a9ce0f339299", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/47068ae07a5fa3aa9a1879cdfe98a9ce0f339299", }, ], }, source: { advisory: "9bdc49ca-6697-4adc-a785-081e1961bf40", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-0631", datePublished: "2022-02-18T13:55:10", dateReserved: "2022-02-16T00:00:00", dateUpdated: "2024-08-02T23:32:46.546Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-1106
Vulnerability from cvelistv5
Published
2022-03-27 14:05
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
use after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/16b9d0ea-71ed-41bc-8a88-2deb4c20be8f | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/7f5a490d09f4d56801ac3a3e4e39e03e1471b44c | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:55:23.753Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/16b9d0ea-71ed-41bc-8a88-2deb4c20be8f", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/7f5a490d09f4d56801ac3a3e4e39e03e1471b44c", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "use after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416 Use After Free", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-03-27T14:05:10", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/16b9d0ea-71ed-41bc-8a88-2deb4c20be8f", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/7f5a490d09f4d56801ac3a3e4e39e03e1471b44c", }, ], source: { advisory: "16b9d0ea-71ed-41bc-8a88-2deb4c20be8f", discovery: "EXTERNAL", }, title: "use after free in mrb_vm_exec in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-1106", STATE: "PUBLIC", TITLE: "use after free in mrb_vm_exec in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "use after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.", }, ], }, impact: { cvss: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-416 Use After Free", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/16b9d0ea-71ed-41bc-8a88-2deb4c20be8f", refsource: "CONFIRM", url: "https://huntr.dev/bounties/16b9d0ea-71ed-41bc-8a88-2deb4c20be8f", }, { name: "https://github.com/mruby/mruby/commit/7f5a490d09f4d56801ac3a3e4e39e03e1471b44c", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/7f5a490d09f4d56801ac3a3e4e39e03e1471b44c", }, ], }, source: { advisory: "16b9d0ea-71ed-41bc-8a88-2deb4c20be8f", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-1106", datePublished: "2022-03-27T14:05:10", dateReserved: "2022-03-26T00:00:00", dateUpdated: "2024-08-02T23:55:23.753Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-4188
Vulnerability from cvelistv5
Published
2021-12-30 06:55
Modified
2024-08-03 17:16
Severity ?
EPSS score ?
Summary
mruby is vulnerable to NULL Pointer Dereference
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/78533fb9-f3e0-47c2-86dc-d1f96d5bea28 | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/27d1e0132a0804581dca28df042e7047fd27eaa8 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T17:16:04.248Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/78533fb9-f3e0-47c2-86dc-d1f96d5bea28", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/27d1e0132a0804581dca28df042e7047fd27eaa8", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.1", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "mruby is vulnerable to NULL Pointer Dereference", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-476", description: "CWE-476 NULL Pointer Dereference", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-12-30T06:55:09", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/78533fb9-f3e0-47c2-86dc-d1f96d5bea28", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/27d1e0132a0804581dca28df042e7047fd27eaa8", }, ], source: { advisory: "78533fb9-f3e0-47c2-86dc-d1f96d5bea28", discovery: "EXTERNAL", }, title: "NULL Pointer Dereference in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2021-4188", STATE: "PUBLIC", TITLE: "NULL Pointer Dereference in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.1", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "mruby is vulnerable to NULL Pointer Dereference", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-476 NULL Pointer Dereference", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/78533fb9-f3e0-47c2-86dc-d1f96d5bea28", refsource: "CONFIRM", url: "https://huntr.dev/bounties/78533fb9-f3e0-47c2-86dc-d1f96d5bea28", }, { name: "https://github.com/mruby/mruby/commit/27d1e0132a0804581dca28df042e7047fd27eaa8", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/27d1e0132a0804581dca28df042e7047fd27eaa8", }, ], }, source: { advisory: "78533fb9-f3e0-47c2-86dc-d1f96d5bea28", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2021-4188", datePublished: "2021-12-30T06:55:09", dateReserved: "2021-12-29T00:00:00", dateUpdated: "2024-08-03T17:16:04.248Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-0481
Vulnerability from cvelistv5
Published
2022-02-04 22:33
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
NULL Pointer Dereference in Homebrew mruby prior to 3.2.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/54725c8c-87f4-41b6-878c-01d8e0ee7027 | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:32:44.777Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/54725c8c-87f4-41b6-878c-01d8e0ee7027", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "NULL Pointer Dereference in Homebrew mruby prior to 3.2.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-476", description: "CWE-476 NULL Pointer Dereference", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-04T22:33:00", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/54725c8c-87f4-41b6-878c-01d8e0ee7027", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e", }, ], source: { advisory: "54725c8c-87f4-41b6-878c-01d8e0ee7027", discovery: "EXTERNAL", }, title: "NULL Pointer Dereference in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-0481", STATE: "PUBLIC", TITLE: "NULL Pointer Dereference in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "NULL Pointer Dereference in Homebrew mruby prior to 3.2.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-476 NULL Pointer Dereference", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/54725c8c-87f4-41b6-878c-01d8e0ee7027", refsource: "CONFIRM", url: "https://huntr.dev/bounties/54725c8c-87f4-41b6-878c-01d8e0ee7027", }, { name: "https://github.com/mruby/mruby/commit/ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e", }, ], }, source: { advisory: "54725c8c-87f4-41b6-878c-01d8e0ee7027", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-0481", datePublished: "2022-02-04T22:33:00", dateReserved: "2022-02-03T00:00:00", dateUpdated: "2024-08-02T23:32:44.777Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-0240
Vulnerability from cvelistv5
Published
2022-01-17 13:35
Modified
2024-08-02 23:18
Severity ?
EPSS score ?
Summary
mruby is vulnerable to NULL Pointer Dereference
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/5857eced-aad9-417d-864e-0bdf17226cbb | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/31fa3304049fc406a201a72293cce140f0557dca | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:18:42.889Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/5857eced-aad9-417d-864e-0bdf17226cbb", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/31fa3304049fc406a201a72293cce140f0557dca", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "mruby is vulnerable to NULL Pointer Dereference", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.2, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-476", description: "CWE-476 NULL Pointer Dereference", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-01-17T13:35:10", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/5857eced-aad9-417d-864e-0bdf17226cbb", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/31fa3304049fc406a201a72293cce140f0557dca", }, ], source: { advisory: "5857eced-aad9-417d-864e-0bdf17226cbb", discovery: "EXTERNAL", }, title: "NULL Pointer Dereference in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-0240", STATE: "PUBLIC", TITLE: "NULL Pointer Dereference in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "mruby is vulnerable to NULL Pointer Dereference", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.2, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-476 NULL Pointer Dereference", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/5857eced-aad9-417d-864e-0bdf17226cbb", refsource: "CONFIRM", url: "https://huntr.dev/bounties/5857eced-aad9-417d-864e-0bdf17226cbb", }, { name: "https://github.com/mruby/mruby/commit/31fa3304049fc406a201a72293cce140f0557dca", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/31fa3304049fc406a201a72293cce140f0557dca", }, ], }, source: { advisory: "5857eced-aad9-417d-864e-0bdf17226cbb", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-0240", datePublished: "2022-01-17T13:35:10", dateReserved: "2022-01-16T00:00:00", dateUpdated: "2024-08-02T23:18:42.889Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-0632
Vulnerability from cvelistv5
Published
2022-02-19 14:00
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
NULL Pointer Dereference in Homebrew mruby prior to 3.2.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/3e5bb8f6-30fd-4553-86dd-761e9459ce1b | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/44f591aa8f7091e6ca6cb418e428ae6d4ceaf77d | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:32:46.436Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/3e5bb8f6-30fd-4553-86dd-761e9459ce1b", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/44f591aa8f7091e6ca6cb418e428ae6d4ceaf77d", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "NULL Pointer Dereference in Homebrew mruby prior to 3.2.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-476", description: "CWE-476 NULL Pointer Dereference", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-19T14:00:12", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/3e5bb8f6-30fd-4553-86dd-761e9459ce1b", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/44f591aa8f7091e6ca6cb418e428ae6d4ceaf77d", }, ], source: { advisory: "3e5bb8f6-30fd-4553-86dd-761e9459ce1b", discovery: "EXTERNAL", }, title: "NULL Pointer Dereference in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-0632", STATE: "PUBLIC", TITLE: "NULL Pointer Dereference in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "NULL Pointer Dereference in Homebrew mruby prior to 3.2.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-476 NULL Pointer Dereference", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/3e5bb8f6-30fd-4553-86dd-761e9459ce1b", refsource: "CONFIRM", url: "https://huntr.dev/bounties/3e5bb8f6-30fd-4553-86dd-761e9459ce1b", }, { name: "https://github.com/mruby/mruby/commit/44f591aa8f7091e6ca6cb418e428ae6d4ceaf77d", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/44f591aa8f7091e6ca6cb418e428ae6d4ceaf77d", }, ], }, source: { advisory: "3e5bb8f6-30fd-4553-86dd-761e9459ce1b", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-0632", datePublished: "2022-02-19T14:00:12", dateReserved: "2022-02-16T00:00:00", dateUpdated: "2024-08-02T23:32:46.436Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-0326
Vulnerability from cvelistv5
Published
2022-01-21 06:45
Modified
2024-08-02 23:25
Severity ?
EPSS score ?
Summary
NULL Pointer Dereference in Homebrew mruby prior to 3.2.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/795dcbd9-1695-44bb-8c59-ad327c97c976 | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/b611c43a5de061ec21b343967e1b64c45c373d7e | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:25:40.180Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/795dcbd9-1695-44bb-8c59-ad327c97c976", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/b611c43a5de061ec21b343967e1b64c45c373d7e", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "NULL Pointer Dereference in Homebrew mruby prior to 3.2.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-476", description: "CWE-476 NULL Pointer Dereference", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-01-21T06:45:12", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/795dcbd9-1695-44bb-8c59-ad327c97c976", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/b611c43a5de061ec21b343967e1b64c45c373d7e", }, ], source: { advisory: "795dcbd9-1695-44bb-8c59-ad327c97c976", discovery: "EXTERNAL", }, title: "NULL Pointer Dereference in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-0326", STATE: "PUBLIC", TITLE: "NULL Pointer Dereference in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "NULL Pointer Dereference in Homebrew mruby prior to 3.2.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-476 NULL Pointer Dereference", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/795dcbd9-1695-44bb-8c59-ad327c97c976", refsource: "CONFIRM", url: "https://huntr.dev/bounties/795dcbd9-1695-44bb-8c59-ad327c97c976", }, { name: "https://github.com/mruby/mruby/commit/b611c43a5de061ec21b343967e1b64c45c373d7e", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/b611c43a5de061ec21b343967e1b64c45c373d7e", }, ], }, source: { advisory: "795dcbd9-1695-44bb-8c59-ad327c97c976", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-0326", datePublished: "2022-01-21T06:45:12", dateReserved: "2022-01-21T00:00:00", dateUpdated: "2024-08-02T23:25:40.180Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-0570
Vulnerability from cvelistv5
Published
2022-02-13 04:50
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/65a7632e-f95b-4836-b1a7-9cb95e5124f1 | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/38b164ace7d6ae1c367883a3d67d7f559783faad | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:32:46.035Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/65a7632e-f95b-4836-b1a7-9cb95e5124f1", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/38b164ace7d6ae1c367883a3d67d7f559783faad", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122 Heap-based Buffer Overflow", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-13T04:50:10", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/65a7632e-f95b-4836-b1a7-9cb95e5124f1", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/38b164ace7d6ae1c367883a3d67d7f559783faad", }, ], source: { advisory: "65a7632e-f95b-4836-b1a7-9cb95e5124f1", discovery: "EXTERNAL", }, title: "Heap-based Buffer Overflow in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-0570", STATE: "PUBLIC", TITLE: "Heap-based Buffer Overflow in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-122 Heap-based Buffer Overflow", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/65a7632e-f95b-4836-b1a7-9cb95e5124f1", refsource: "CONFIRM", url: "https://huntr.dev/bounties/65a7632e-f95b-4836-b1a7-9cb95e5124f1", }, { name: "https://github.com/mruby/mruby/commit/38b164ace7d6ae1c367883a3d67d7f559783faad", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/38b164ace7d6ae1c367883a3d67d7f559783faad", }, ], }, source: { advisory: "65a7632e-f95b-4836-b1a7-9cb95e5124f1", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-0570", datePublished: "2022-02-13T04:50:10", dateReserved: "2022-02-12T00:00:00", dateUpdated: "2024-08-02T23:32:46.035Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-1071
Vulnerability from cvelistv5
Published
2022-03-26 03:40
Modified
2024-08-02 23:47
Severity ?
EPSS score ?
Summary
User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/6597ece9-07af-415b-809b-919ce0a17cf3 | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/aaa28a508903041dd7399d4159a8ace9766b022f | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:47:43.321Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/6597ece9-07af-415b-809b-919ce0a17cf3", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/aaa28a508903041dd7399d4159a8ace9766b022f", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.7, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416 Use After Free", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-03-26T03:40:10", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/6597ece9-07af-415b-809b-919ce0a17cf3", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/aaa28a508903041dd7399d4159a8ace9766b022f", }, ], source: { advisory: "6597ece9-07af-415b-809b-919ce0a17cf3", discovery: "EXTERNAL", }, title: "User after free in mrb_vm_exec in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-1071", STATE: "PUBLIC", TITLE: "User after free in mrb_vm_exec in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.7, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-416 Use After Free", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/6597ece9-07af-415b-809b-919ce0a17cf3", refsource: "CONFIRM", url: "https://huntr.dev/bounties/6597ece9-07af-415b-809b-919ce0a17cf3", }, { name: "https://github.com/mruby/mruby/commit/aaa28a508903041dd7399d4159a8ace9766b022f", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/aaa28a508903041dd7399d4159a8ace9766b022f", }, ], }, source: { advisory: "6597ece9-07af-415b-809b-919ce0a17cf3", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-1071", datePublished: "2022-03-26T03:40:10", dateReserved: "2022-03-25T00:00:00", dateUpdated: "2024-08-02T23:47:43.321Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-0614
Vulnerability from cvelistv5
Published
2022-02-16 09:40
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
Use of Out-of-range Pointer Offset in Homebrew mruby prior to 3.2.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/a980ce4d-c359-4425-92c4-e844c0055879 | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:32:46.442Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/a980ce4d-c359-4425-92c4-e844c0055879", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Use of Out-of-range Pointer Offset in Homebrew mruby prior to 3.2.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-823", description: "CWE-823 Use of Out-of-range Pointer Offset", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-16T09:40:09", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/a980ce4d-c359-4425-92c4-e844c0055879", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad", }, ], source: { advisory: "a980ce4d-c359-4425-92c4-e844c0055879", discovery: "EXTERNAL", }, title: "Use of Out-of-range Pointer Offset in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-0614", STATE: "PUBLIC", TITLE: "Use of Out-of-range Pointer Offset in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Use of Out-of-range Pointer Offset in Homebrew mruby prior to 3.2.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-823 Use of Out-of-range Pointer Offset", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/a980ce4d-c359-4425-92c4-e844c0055879", refsource: "CONFIRM", url: "https://huntr.dev/bounties/a980ce4d-c359-4425-92c4-e844c0055879", }, { name: "https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad", }, ], }, source: { advisory: "a980ce4d-c359-4425-92c4-e844c0055879", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-0614", datePublished: "2022-02-16T09:40:10", dateReserved: "2022-02-15T00:00:00", dateUpdated: "2024-08-02T23:32:46.442Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-0890
Vulnerability from cvelistv5
Published
2022-03-10 01:10
Modified
2024-08-02 23:47
Severity ?
EPSS score ?
Summary
NULL Pointer Dereference in GitHub repository mruby/mruby prior to 3.2.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276 | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/da48e7dbb20024c198493b8724adae1b842083aa | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:47:42.118Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/da48e7dbb20024c198493b8724adae1b842083aa", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "NULL Pointer Dereference in GitHub repository mruby/mruby prior to 3.2.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-476", description: "CWE-476 NULL Pointer Dereference", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-03-10T01:10:09", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/da48e7dbb20024c198493b8724adae1b842083aa", }, ], source: { advisory: "68e09ec1-6cc7-48b8-981d-30f478c70276", discovery: "EXTERNAL", }, title: "NULL Pointer Dereference in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-0890", STATE: "PUBLIC", TITLE: "NULL Pointer Dereference in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "NULL Pointer Dereference in GitHub repository mruby/mruby prior to 3.2.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-476 NULL Pointer Dereference", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276", refsource: "CONFIRM", url: "https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276", }, { name: "https://github.com/mruby/mruby/commit/da48e7dbb20024c198493b8724adae1b842083aa", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/da48e7dbb20024c198493b8724adae1b842083aa", }, ], }, source: { advisory: "68e09ec1-6cc7-48b8-981d-30f478c70276", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-0890", datePublished: "2022-03-10T01:10:09", dateReserved: "2022-03-09T00:00:00", dateUpdated: "2024-08-02T23:47:42.118Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-0623
Vulnerability from cvelistv5
Published
2022-02-17 06:30
Modified
2024-08-02 23:32
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in Homebrew mruby prior to 3.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad | x_refsource_MISC | |
https://huntr.dev/bounties/5b908ac7-d8f1-4fcd-9355-85df565f7580 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:32:46.438Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/5b908ac7-d8f1-4fcd-9355-85df565f7580", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-bounds Read in Homebrew mruby prior to 3.2.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125 Out-of-bounds Read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-17T06:30:10", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/5b908ac7-d8f1-4fcd-9355-85df565f7580", }, ], source: { advisory: "5b908ac7-d8f1-4fcd-9355-85df565f7580", discovery: "EXTERNAL", }, title: "Out-of-bounds Read in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-0623", STATE: "PUBLIC", TITLE: "Out-of-bounds Read in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out-of-bounds Read in Homebrew mruby prior to 3.2.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-125 Out-of-bounds Read", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad", }, { name: "https://huntr.dev/bounties/5b908ac7-d8f1-4fcd-9355-85df565f7580", refsource: "CONFIRM", url: "https://huntr.dev/bounties/5b908ac7-d8f1-4fcd-9355-85df565f7580", }, ], }, source: { advisory: "5b908ac7-d8f1-4fcd-9355-85df565f7580", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-0623", datePublished: "2022-02-17T06:30:10", dateReserved: "2022-02-16T00:00:00", dateUpdated: "2024-08-02T23:32:46.438Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-0080
Vulnerability from cvelistv5
Published
2022-01-02 11:30
Modified
2024-08-02 23:18
Severity ?
EPSS score ?
Summary
mruby is vulnerable to Heap-based Buffer Overflow
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/59a70392-4864-4ce3-8e35-6ac2111d1e2e | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/28ccc664e5dcd3f9d55173e9afde77c4705a9ab6 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:18:41.526Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/59a70392-4864-4ce3-8e35-6ac2111d1e2e", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/28ccc664e5dcd3f9d55173e9afde77c4705a9ab6", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.1", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "mruby is vulnerable to Heap-based Buffer Overflow", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122 Heap-based Buffer Overflow", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-01-02T11:30:09", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/59a70392-4864-4ce3-8e35-6ac2111d1e2e", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/28ccc664e5dcd3f9d55173e9afde77c4705a9ab6", }, ], source: { advisory: "59a70392-4864-4ce3-8e35-6ac2111d1e2e", discovery: "EXTERNAL", }, title: "Heap-based Buffer Overflow in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-0080", STATE: "PUBLIC", TITLE: "Heap-based Buffer Overflow in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.1", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "mruby is vulnerable to Heap-based Buffer Overflow", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-122 Heap-based Buffer Overflow", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/59a70392-4864-4ce3-8e35-6ac2111d1e2e", refsource: "CONFIRM", url: "https://huntr.dev/bounties/59a70392-4864-4ce3-8e35-6ac2111d1e2e", }, { name: "https://github.com/mruby/mruby/commit/28ccc664e5dcd3f9d55173e9afde77c4705a9ab6", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/28ccc664e5dcd3f9d55173e9afde77c4705a9ab6", }, ], }, source: { advisory: "59a70392-4864-4ce3-8e35-6ac2111d1e2e", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-0080", datePublished: "2022-01-02T11:30:09", dateReserved: "2022-01-01T00:00:00", dateUpdated: "2024-08-02T23:18:41.526Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-1201
Vulnerability from cvelistv5
Published
2022-04-02 07:45
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
NULL Pointer Dereference in mrb_vm_exec with super in GitHub repository mruby/mruby prior to 3.2. This vulnerability is capable of making the mruby interpreter crash, thus affecting the availability of the system.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/6f930add-c9d8-4870-ae56-d4bd8354703b | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/00acae117da1b45b318dc36531a7b0021b8097ae | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:55:24.340Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/6f930add-c9d8-4870-ae56-d4bd8354703b", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/00acae117da1b45b318dc36531a7b0021b8097ae", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "NULL Pointer Dereference in mrb_vm_exec with super in GitHub repository mruby/mruby prior to 3.2. This vulnerability is capable of making the mruby interpreter crash, thus affecting the availability of the system.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-476", description: "CWE-476 NULL Pointer Dereference", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-04-02T07:45:34", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/6f930add-c9d8-4870-ae56-d4bd8354703b", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/00acae117da1b45b318dc36531a7b0021b8097ae", }, ], source: { advisory: "6f930add-c9d8-4870-ae56-d4bd8354703b", discovery: "EXTERNAL", }, title: "NULL Pointer Dereference in mrb_vm_exec with super in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-1201", STATE: "PUBLIC", TITLE: "NULL Pointer Dereference in mrb_vm_exec with super in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "NULL Pointer Dereference in mrb_vm_exec with super in GitHub repository mruby/mruby prior to 3.2. This vulnerability is capable of making the mruby interpreter crash, thus affecting the availability of the system.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-476 NULL Pointer Dereference", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/6f930add-c9d8-4870-ae56-d4bd8354703b", refsource: "CONFIRM", url: "https://huntr.dev/bounties/6f930add-c9d8-4870-ae56-d4bd8354703b", }, { name: "https://github.com/mruby/mruby/commit/00acae117da1b45b318dc36531a7b0021b8097ae", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/00acae117da1b45b318dc36531a7b0021b8097ae", }, ], }, source: { advisory: "6f930add-c9d8-4870-ae56-d4bd8354703b", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-1201", datePublished: "2022-04-02T07:45:34", dateReserved: "2022-04-01T00:00:00", dateUpdated: "2024-08-02T23:55:24.340Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-1934
Vulnerability from cvelistv5
Published
2022-05-31 02:20
Modified
2024-08-03 00:24
Severity ?
EPSS score ?
Summary
Use After Free in GitHub repository mruby/mruby prior to 3.2.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/99e6df06-b9f7-4c53-a722-6bb89fbfb51f | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/aa7f98dedb68d735a1665d3a289036c88b0c47ce | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T00:24:42.561Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/99e6df06-b9f7-4c53-a722-6bb89fbfb51f", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/aa7f98dedb68d735a1665d3a289036c88b0c47ce", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Use After Free in GitHub repository mruby/mruby prior to 3.2.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 5.1, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416 Use After Free", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-05-31T02:20:12", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/99e6df06-b9f7-4c53-a722-6bb89fbfb51f", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/aa7f98dedb68d735a1665d3a289036c88b0c47ce", }, ], source: { advisory: "99e6df06-b9f7-4c53-a722-6bb89fbfb51f", discovery: "EXTERNAL", }, title: "Use After Free in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-1934", STATE: "PUBLIC", TITLE: "Use After Free in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Use After Free in GitHub repository mruby/mruby prior to 3.2.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 5.1, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-416 Use After Free", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/99e6df06-b9f7-4c53-a722-6bb89fbfb51f", refsource: "CONFIRM", url: "https://huntr.dev/bounties/99e6df06-b9f7-4c53-a722-6bb89fbfb51f", }, { name: "https://github.com/mruby/mruby/commit/aa7f98dedb68d735a1665d3a289036c88b0c47ce", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/aa7f98dedb68d735a1665d3a289036c88b0c47ce", }, ], }, source: { advisory: "99e6df06-b9f7-4c53-a722-6bb89fbfb51f", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-1934", datePublished: "2022-05-31T02:20:12", dateReserved: "2022-05-30T00:00:00", dateUpdated: "2024-08-03T00:24:42.561Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-4110
Vulnerability from cvelistv5
Published
2021-12-15 04:40
Modified
2024-08-03 17:16
Severity ?
EPSS score ?
Summary
mruby is vulnerable to NULL Pointer Dereference
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/4ce5dc47-2512-4c87-8609-453adc8cad20 | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/f5e10c5a79a17939af763b1dcf5232ce47e24a34 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T17:16:04.173Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/4ce5dc47-2512-4c87-8609-453adc8cad20", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/f5e10c5a79a17939af763b1dcf5232ce47e24a34", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.1", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "mruby is vulnerable to NULL Pointer Dereference", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-476", description: "CWE-476 NULL Pointer Dereference", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-12-15T04:40:10", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/4ce5dc47-2512-4c87-8609-453adc8cad20", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/f5e10c5a79a17939af763b1dcf5232ce47e24a34", }, ], source: { advisory: "4ce5dc47-2512-4c87-8609-453adc8cad20", discovery: "EXTERNAL", }, title: "NULL Pointer Dereference in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2021-4110", STATE: "PUBLIC", TITLE: "NULL Pointer Dereference in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.1", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "mruby is vulnerable to NULL Pointer Dereference", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-476 NULL Pointer Dereference", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/4ce5dc47-2512-4c87-8609-453adc8cad20", refsource: "CONFIRM", url: "https://huntr.dev/bounties/4ce5dc47-2512-4c87-8609-453adc8cad20", }, { name: "https://github.com/mruby/mruby/commit/f5e10c5a79a17939af763b1dcf5232ce47e24a34", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/f5e10c5a79a17939af763b1dcf5232ce47e24a34", }, ], }, source: { advisory: "4ce5dc47-2512-4c87-8609-453adc8cad20", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2021-4110", datePublished: "2021-12-15T04:40:10", dateReserved: "2021-12-14T00:00:00", dateUpdated: "2024-08-03T17:16:04.173Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-1212
Vulnerability from cvelistv5
Published
2022-04-05 03:45
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/9fcc06d0-08e4-49c8-afda-2cae40946abe | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/3cf291f72224715942beaf8553e42ba8891ab3c6 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T23:55:24.452Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/9fcc06d0-08e4-49c8-afda-2cae40946abe", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/3cf291f72224715942beaf8553e42ba8891ab3c6", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.3, baseSeverity: "CRITICAL", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416 Use After Free", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-04-05T03:45:19", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/9fcc06d0-08e4-49c8-afda-2cae40946abe", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/3cf291f72224715942beaf8553e42ba8891ab3c6", }, ], source: { advisory: "9fcc06d0-08e4-49c8-afda-2cae40946abe", discovery: "EXTERNAL", }, title: "Use-After-Free in str_escape in mruby/mruby in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-1212", STATE: "PUBLIC", TITLE: "Use-After-Free in str_escape in mruby/mruby in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.3, baseSeverity: "CRITICAL", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-416 Use After Free", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/9fcc06d0-08e4-49c8-afda-2cae40946abe", refsource: "CONFIRM", url: "https://huntr.dev/bounties/9fcc06d0-08e4-49c8-afda-2cae40946abe", }, { name: "https://github.com/mruby/mruby/commit/3cf291f72224715942beaf8553e42ba8891ab3c6", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/3cf291f72224715942beaf8553e42ba8891ab3c6", }, ], }, source: { advisory: "9fcc06d0-08e4-49c8-afda-2cae40946abe", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-1212", datePublished: "2022-04-05T03:45:19", dateReserved: "2022-04-04T00:00:00", dateUpdated: "2024-08-02T23:55:24.452Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-1427
Vulnerability from cvelistv5
Published
2022-04-22 23:35
Modified
2024-08-03 00:03
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited.
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/23b6f0a9-64f5-421e-a55f-b5b7a671f301 | x_refsource_CONFIRM | |
https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
mruby | mruby/mruby |
Version: unspecified < 3.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T00:03:06.197Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/23b6f0a9-64f5-421e-a55f-b5b7a671f301", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "mruby/mruby", vendor: "mruby", versions: [ { lessThan: "3.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.7, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125 Out-of-bounds Read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-04-22T23:35:09", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/23b6f0a9-64f5-421e-a55f-b5b7a671f301", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b", }, ], source: { advisory: "23b6f0a9-64f5-421e-a55f-b5b7a671f301", discovery: "EXTERNAL", }, title: "Out-of-bounds Read in mrb_obj_is_kind_of in in mruby/mruby", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-1427", STATE: "PUBLIC", TITLE: "Out-of-bounds Read in mrb_obj_is_kind_of in in mruby/mruby", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "mruby/mruby", version: { version_data: [ { version_affected: "<", version_value: "3.2", }, ], }, }, ], }, vendor_name: "mruby", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.7, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-125 Out-of-bounds Read", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/23b6f0a9-64f5-421e-a55f-b5b7a671f301", refsource: "CONFIRM", url: "https://huntr.dev/bounties/23b6f0a9-64f5-421e-a55f-b5b7a671f301", }, { name: "https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b", refsource: "MISC", url: "https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b", }, ], }, source: { advisory: "23b6f0a9-64f5-421e-a55f-b5b7a671f301", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-1427", datePublished: "2022-04-22T23:35:09", dateReserved: "2022-04-21T00:00:00", dateUpdated: "2024-08-03T00:03:06.197Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }