CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “whoopsie_project”

3 vulnerabilities found for “whoopsie_project”

CVE-2020-15570
MEDIUM5.5

The parse_report() function in whoopsie.c in Whoopsie through 0.2.69 mishandles memory allocation failures, which allows an attacker to cause a denial of service via a malformed crash file.

whoopsie_project / whoopsie
Local
Published Jul 6, 2020
CVE-2020-12135
MEDIUM5.5

bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.

whoopsie_project / whoopsie+1
Local
Published Apr 24, 2020
CVE-2019-11484
MEDIUM6.3

Kevin Backhouse discovered an integer overflow in bson_ensure_space, as used in whoopsie.

whoopsie_project / whoopsie+4
Local
Published Feb 8, 2020