Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

mruby — Vulnerabilities & Security Advisories 23

Browse all 23 CVE security advisories affecting mruby. AI-powered Chinese analysis, POCs, and references for each vulnerability.

mruby is a lightweight, embeddable implementation of the Ruby programming language designed primarily for resource-constrained environments, including embedded systems, IoT devices, and game engines. Its core utility lies in providing a full-featured scripting language with a minimal footprint, enabling developers to integrate dynamic logic into static applications. Historically, the codebase has been associated with twenty-three recorded CVEs, predominantly involving memory corruption issues such as buffer overflows and use-after-free errors. These flaws often stem from unsafe handling of string operations and improper bounds checking within the interpreter’s core modules. While not typically exposed directly to the public internet, vulnerabilities can lead to remote code execution if the host application fails to isolate the script execution environment. The project maintains a focus on stability and security through rigorous testing, though its embedded nature requires careful integration practices to mitigate potential exploitation risks in production deployments.

Found 23 results / 23Clear Filters
Top products by mruby: mruby/mruby

Showing up to 20 recent security advisories. View all →

This page lists every published CVE security advisory associated with mruby. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.