Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
whoopsie project whoopsie vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2020-15570
The parse_report() function in whoopsie.c in Whoopsie up to and including 0.2.69 mishandles memory allocation failures, which allows an malicious user to cause a denial of service via a malformed crash file.
Whoopsie Project Whoopsie
5.5
CVSSv2
CVE-2012-0945
whoopsie-daisy prior to 0.1.26: Root user can remove arbitrary files
Whoopsie-daisy Project Whoopsie-daisy
4.3
CVSSv2
CVE-2020-12135
bson prior to 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.
Whoopsie Project Whoopsie
Mongodb C Driver
1 Github repository
4.6
CVSSv2
CVE-2019-11484
Kevin Backhouse discovered an integer overflow in bson_ensure_space, as used in whoopsie.
Whoopsie Project Whoopsie -
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 19.10
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started