The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access
Reporter | Title | Published | Views | Family All 11 |
---|---|---|---|---|
![]() | CVE-2018-14337 | 17 Jul 201803:00 | – | cvelist |
![]() | CVE-2018-14337 | 17 Jul 201800:00 | – | ubuntucve |
![]() | Integer overflow | 17 Jul 201803:29 | – | prion |
![]() | CVE-2018-14337 | 17 Jul 201803:29 | – | nvd |
![]() | CVE-2018-14337 | 17 Jul 201803:29 | – | debiancve |
![]() | CVE-2018-14337 | 17 Jul 201803:29 | – | osv |
![]() | mruby - security update | 6 May 202200:00 | – | osv |
![]() | Signed integer overflow in mrb_str_format | 16 Jul 201821:00 | – | rubygems |
![]() | Debian DLA-2996-1 : mruby - LTS security update | 18 May 202200:00 | – | nessus |
![]() | Debian: Security Advisory (DLA-2996-1) | 7 May 202200:00 | – | openvas |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo