shopify-scripts - HackerOne Reports
View on HackerOne161
Total Reports
7
Critical
36
High
13
Medium
33
Low
heap-use-after-free /home/operac/testafl/mruby/mrubylast/mruby/src/gc.c
Reported by:
fms
|
Disclosed:
Weakness: Memory Corruption - Generic
Bounty: $100.00
Heap Buffer Overflow while processing OP_SEND
Reported by:
locator
|
Disclosed:
Weakness: Uncontrolled Resource Consumption
Bounty: $800.00
mruby heap use-after-free
Reported by:
mg36
|
Disclosed:
Weakness: Memory Corruption - Generic
Denial of service (segfault) due to null pointer dereference in mrb_obj_instance_eval
Reported by:
d4nny
|
Disclosed:
Medium
Weakness: Uncontrolled Resource Consumption
mruby heredoc notation
Reported by:
j0s3
|
Disclosed:
Weakness: Uncontrolled Resource Consumption
Incorrect code generation with redo inside NODE_RESCUE.
Reported by:
dgaletic
|
Disclosed:
Low
Weakness: Uncontrolled Resource Consumption
Bounty: $100.00
SIGABRT - mrb_realloc_simple - gc.c - line:201
Reported by:
ston3
|
Disclosed:
Weakness: Memory Corruption - Generic
Null pointer dereference in mrb_random_initialize
Reported by:
eboda
|
Disclosed:
Weakness: Uncontrolled Resource Consumption
Bounty: $100.00
Denial of service (segfault) due to null pointer dereference in mrb_vm_exec
Reported by:
d4nny
|
Disclosed:
Medium
Weakness: Uncontrolled Resource Consumption
Heap buffer overflow with long array assignment
Reported by:
titanous
|
Disclosed:
Weakness: Uncontrolled Resource Consumption
Bounty: $800.00
Null pointer dereference with send/method_missing
Reported by:
titanous
|
Disclosed:
Weakness: NULL Pointer Dereference
Bounty: $800.00
Null target_class DoS
Reported by:
h72
|
Disclosed:
High
Weakness: Uncontrolled Resource Consumption
Bounty: $8000.00
Null pointer dereference in ary_concat
Reported by:
haquaman
|
Disclosed:
Weakness: Uncontrolled Resource Consumption
Invalid memory access while freeing memory, caused by invalid type passed to mrb_ary_unshift
Reported by:
haquaman
|
Disclosed:
Weakness: Uncontrolled Resource Consumption
SIGSEGV on mruby mrb_str_modify() (Invalid memory access)
Reported by:
jpenalbae
|
Disclosed:
High
Weakness: Uncontrolled Resource Consumption
Segfault and/or potential unwanted (byte)code execution with "break" and "||=" inside a loop
Reported by:
dkasak
|
Disclosed:
High
Weakness: Uncontrolled Resource Consumption
Bounty: $10000.00
Segmentation fault on program counter
Reported by:
icanthack
|
Disclosed:
Low
Weakness: Memory Corruption - Generic
Heap Buffer overflow in mrb_funcall_with_block
Reported by:
locator
|
Disclosed:
Low
Weakness: Uncontrolled Resource Consumption
Bounty: $800.00
Clearing , Shifting and Pop Value from Frozen Array
Reported by:
an0n-j
|
Disclosed:
Weakness: Violation of Secure Design Principles
Invalid Pointer Reference from OP_RESCUE
Reported by:
locator
|
Disclosed:
Weakness: Uncontrolled Resource Consumption
Bounty: $800.00
Page 1 of 9
Next