Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
whoopsie project whoopsie vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2020-15570
The parse_report() function in whoopsie.c in Whoopsie up to and including 0.2.69 mishandles memory allocation failures, which allows an malicious user to cause a denial of service via a malformed crash file.
Whoopsie Project Whoopsie
4.3
CVSSv2
CVE-2020-12135
bson prior to 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.
Whoopsie Project Whoopsie
Mongodb C Driver
1 Github repository
4.6
CVSSv2
CVE-2019-11484
Kevin Backhouse discovered an integer overflow in bson_ensure_space, as used in whoopsie.
Whoopsie Project Whoopsie -
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 19.10
5.5
CVSSv2
CVE-2012-0945
whoopsie-daisy prior to 0.1.26: Root user can remove arbitrary files
Whoopsie-daisy Project Whoopsie-daisy
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started