Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
whoopsie project whoopsie vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2020-15570
The parse_report() function in whoopsie.c in Whoopsie up to and including 0.2.69 mishandles memory allocation failures, which allows an malicious user to cause a denial of service via a malformed crash file.
Whoopsie Project Whoopsie
4.9
CVSSv3
CVE-2012-0945
whoopsie-daisy prior to 0.1.26: Root user can remove arbitrary files
Whoopsie-daisy Project Whoopsie-daisy
5.5
CVSSv3
CVE-2020-12135
bson prior to 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.
Whoopsie Project Whoopsie
Mongodb C Driver
1 Github repository
7.8
CVSSv3
CVE-2019-11484
Kevin Backhouse discovered an integer overflow in bson_ensure_space, as used in whoopsie.
Whoopsie Project Whoopsie -
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 19.10
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started