Lucene search

K

Whoopsie Security Vulnerabilities

cve
cve

CVE-2020-11937

In whoopsie, parse_report() from whoopsie.c allows a local attacker to cause a denial of service via a crafted file. The DoS is caused by resource exhaustion due to a memory leak. Fixed in 0.2.52.5ubuntu0.5, 0.2.62ubuntu0.5 and...

5.5CVSS

5.1AI Score

0.0004EPSS

2020-08-06 11:15 PM
33
cve
cve

CVE-2020-15570

The parse_report() function in whoopsie.c in Whoopsie through 0.2.69 mishandles memory allocation failures, which allows an attacker to cause a denial of service via a malformed crash...

5.5CVSS

5.3AI Score

0.002EPSS

2020-07-06 02:15 PM
30
cve
cve

CVE-2020-12135

bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson...

5.5CVSS

5.5AI Score

0.001EPSS

2020-04-24 01:15 AM
32
cve
cve

CVE-2019-11484

Kevin Backhouse discovered an integer overflow in bson_ensure_space, as used in...

7.8CVSS

7.6AI Score

0.0004EPSS

2020-02-08 05:15 AM
184
cve
cve

CVE-2012-0945

whoopsie-daisy before 0.1.26: Root user can remove arbitrary...

4.9CVSS

5.3AI Score

0.001EPSS

2020-01-15 01:15 PM
22
cve
cve

CVE-2019-11476

An integer overflow in whoopsie before versions 0.2.52.5ubuntu0.1, 0.2.62ubuntu0.1, 0.2.64ubuntu0.1, 0.2.66, results in an out-of-bounds write to a heap allocated buffer when processing large crash dumps. This results in a crash or possible code-execution in the context of the whoopsie...

7.8CVSS

7.8AI Score

0.001EPSS

2019-08-29 03:15 PM
73