Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Whoopsie
(Whoopsie_project)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-07-06 | CVE-2020-15570 | The parse_report() function in whoopsie.c in Whoopsie through 0.2.69 mishandles memory allocation failures, which allows an attacker to cause a denial of service via a malformed crash file. | Whoopsie | 5.5 | ||
2020-02-08 | CVE-2019-11484 | Kevin Backhouse discovered an integer overflow in bson_ensure_space, as used in whoopsie. | Ubuntu_linux, Whoopsie | 7.8 | ||
2020-04-24 | CVE-2020-12135 | bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input. | C_driver, Whoopsie | N/A |