Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
whoopsie project whoopsie vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2020-15570
The parse_report() function in whoopsie.c in Whoopsie up to and including 0.2.69 mishandles memory allocation failures, which allows an malicious user to cause a denial of service via a malformed crash file.
Whoopsie Project Whoopsie
4.9
CVSSv3
CVE-2012-0945
whoopsie-daisy prior to 0.1.26: Root user can remove arbitrary files
Whoopsie-daisy Project Whoopsie-daisy
5.5
CVSSv3
CVE-2020-12135
bson prior to 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.
Whoopsie Project Whoopsie
Mongodb C Driver
1 Github repository
7.8
CVSSv3
CVE-2019-11484
Kevin Backhouse discovered an integer overflow in bson_ensure_space, as used in whoopsie.
Whoopsie Project Whoopsie -
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 19.10
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started