Writeup Exploits

60,280 exploits tracked across all sources.

Sort: Activity Stars
CVE-2021-46023 WRITEUP HIGH
mruby <3.1.0-rc - Memory Corruption
An Untrusted Pointer Dereference was discovered in function mrb_vm_exec in mruby before 3.1.0-rc. The vulnerability causes a segmentation fault and application crash.
CVSS 7.5
CVE-2021-46020 WRITEUP HIGH
mruby <3.0.0 - Memory Corruption
An untrusted pointer dereference in mrb_vm_exec() of mruby v3.0.0 can lead to a segmentation fault or application crash.
CVSS 7.5
CVE-2020-6840 WRITEUP CRITICAL
Mruby - Use After Free
In mruby 2.1.0, there is a use-after-free in hash_slice in mrbgems/mruby-hash-ext/src/hash-ext.c.
CVSS 9.8
CVE-2020-6839 WRITEUP CRITICAL
Mruby - Out-of-Bounds Write
In mruby 2.1.0, there is a stack-based buffer overflow in mrb_str_len_to_dbl in string.c.
CVSS 9.8
CVE-2020-6838 WRITEUP CRITICAL
Mruby - Use After Free
In mruby 2.1.0, there is a use-after-free in hash_values_at in mrbgems/mruby-hash-ext/src/hash-ext.c.
CVSS 9.8
CVE-2020-15866 WRITEUP CRITICAL
Mruby < 2.1.1 - Out-of-Bounds Write
mruby through 2.1.2-rc has a heap-based buffer overflow in the mrb_yield_with_class function in vm.c because of incorrect VM stack handling. It can be triggered via the stack_copy function.
CVSS 9.8
CVE-2018-14337 WRITEUP HIGH
mruby 1.4.1 - Memory Corruption
The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.
CVSS 7.5
CVE-2018-12249 WRITEUP HIGH
mruby 1.4.1 - Memory Corruption
An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class_real because "class BasicObject" is not properly supported in class.c.
CVSS 7.5
CVE-2018-12248 WRITEUP HIGH
mruby 1.4.1 - Buffer Overflow
An issue was discovered in mruby 1.4.1. There is a heap-based buffer over-read associated with OP_ENTER because mrbgems/mruby-fiber/src/fiber.c does not extend the stack in cases of many arguments to fiber.
CVSS 7.5
CVE-2018-12247 WRITEUP HIGH
mruby 1.4.1 - Use After Free
An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class, related to certain .clone usage, because mrb_obj_clone in kernel.c copies flags other than the MRB_FLAG_IS_FROZEN flag (e.g., the embedded flag).
CVSS 7.5
CVE-2018-11743 WRITEUP CRITICAL
Mruby - Denial of Service
The init_copy function in kernel.c in mruby 1.4.1 makes initialize_copy calls for TT_ICLASS objects, which allows attackers to cause a denial of service (mrb_hash_keys uninitialized pointer and application crash) or possibly have unspecified other impact.
CVSS 9.8
CVE-2018-10199 WRITEUP CRITICAL
mruby <1.4.0 - Use After Free
In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.
CVSS 9.8
CVE-2018-10191 WRITEUP CRITICAL
mruby <1.4.0 - Use After Free
In versions of mruby up to and including 1.4.0, an integer overflow exists in src/vm.c::mrb_vm_exec() when handling OP_GETUPVAR in the presence of deep scope nesting, resulting in a use-after-free. An attacker that can cause Ruby code to be run can use this to possibly execute arbitrary code.
CVSS 9.8
CVE-2017-9527 WRITEUP HIGH
mruby <1.2.0 - DoS
The mark_context_stack function in gc.c in mruby through 1.2.0 allows attackers to cause a denial of service (heap-based use-after-free and application crash) or possibly have unspecified other impact via a crafted .rb file.
CVSS 7.8
CVE-2017-0898 WRITEUP CRITICAL
Ruby <2.4.2, 2.3.5, 2.2.8 - Buffer Overflow/Info Disclosure
Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.
CVSS 9.1
CVE-2026-2010 WRITEUP MEDIUM
Sanluan PublicCMS <4.0-6.202506.d - Privilege Escalation
A vulnerability has been found in Sanluan PublicCMS up to 4.0.202506.d/5.202506.d/6.202506.d. Impacted is the function Paid of the file publiccms-parent/publiccms-trade/src/main/java/com/publiccms/logic/service/trade/TradePaymentService.java of the component Trade Payment Handler. The manipulation of the argument paymentId leads to improper authorization. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 7329437e1288540336b1c66c114ed3363adcba02. It is recommended to apply a patch to fix this issue.
CVSS 4.2
CVE-2026-2015 WRITEUP MEDIUM
Portabilis i-Educar <2.10 - Privilege Escalation
A weakness has been identified in Portabilis i-Educar up to 2.10. Affected is an unknown function of the file FinalStatusImportService.php of the component Final Status Import. Executing a manipulation of the argument school_id can lead to improper authorization. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS 6.3
CVE-2026-2016 WRITEUP MEDIUM
happyfish100 libfastcommon <1.0.84 - Buffer Overflow
A security vulnerability has been detected in happyfish100 libfastcommon up to 1.0.84. Affected by this vulnerability is the function base64_decode of the file src/base64.c. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used. The identifier of the patch is 82f66af3e252e3e137dba0c3891570f085e79adf. Applying a patch is the recommended action to fix this issue.
CVSS 5.3
CVE-2026-2054 WRITEUP MEDIUM
D-Link DIR-605L/DIR-619L 2.06B01/2.13B01 - Info Disclosure
A security flaw has been discovered in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. Impacted is an unknown function of the component Wifi Setting Handler. Performing a manipulation results in information disclosure. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS 5.3
CVE-2026-2055 WRITEUP MEDIUM
D-Link DIR-605L/DIR-619L 2.06B01/2.13B01 - Info Disclosure
A weakness has been identified in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The affected element is an unknown function of the component DHCP Client Information Handler. Executing a manipulation can lead to information disclosure. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS 5.3
CVE-2026-2056 WRITEUP MEDIUM
D-Link DIR-605L/DIR-619L 2.06B01/2.13B01 - Info Disclosure
A security vulnerability has been detected in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The impacted element is an unknown function of the file /wan_connection_status.asp of the component DHCP Connection Status Handler. The manipulation leads to information disclosure. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVSS 5.3
CVE-2026-2058 WRITEUP HIGH
mathurvishal CloudClassroom-PHP-Project - SQL Injection via gnamex Parameter
A flaw has been found in mathurvishal CloudClassroom-PHP-Project up to 5dadec098bfbbf3300d60c3494db3fb95b66e7be. This impacts an unknown function of the file /postquerypublic.php of the component Post Query Details Page. This manipulation of the argument gnamex causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS 7.3
CVE-2026-2065 WRITEUP MEDIUM
Flycatcher Toys smART Pixelator 2.0 - Auth Bypass
A security flaw has been discovered in Flycatcher Toys smART Pixelator 2.0. Affected by this issue is some unknown functionality of the component Bluetooth Low Energy Interface. Performing a manipulation results in missing authentication. The attack can only be performed from the local network. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS 6.3
CVE-2026-2066 WRITEUP HIGH
UTT 进取 520W 1.7.7-180627 - Buffer Overflow
A weakness has been identified in UTT 进取 520W 1.7.7-180627. This affects the function strcpy of the file /goform/formIpGroupConfig. Executing a manipulation of the argument groupName can lead to buffer overflow. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS 8.8
CVE-2026-2067 WRITEUP HIGH
UTT 进取 520W 1.7.7-180627 - Buffer Overflow
A security vulnerability has been detected in UTT 进取 520W 1.7.7-180627. This vulnerability affects the function strcpy of the file /goform/formTimeGroupConfig. The manipulation of the argument year1 leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS 8.8