CVE-2019-11932
- EPSS 81.34%
- Published 03.10.2019 22:15:10
- Last modified 21.11.2024 04:22:00
A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to ex...
CVE-2019-11927
- EPSS 0.28%
- Published 27.09.2019 21:15:09
- Last modified 21.11.2024 04:21:59
An integer overflow in WhatsApp media parsing libraries allows a remote attacker to perform an out-of-bounds write on the heap via specially-crafted EXIF tags in WEBP images. This issue affects WhatsApp for Android before version 2.19.143 and WhatsAp...
CVE-2019-3571
- EPSS 0.24%
- Published 16.07.2019 21:15:11
- Last modified 21.11.2024 04:42:11
An input validation issue affected WhatsApp Desktop versions prior to 0.3.3793 which allows malicious clients to send files to users that would be displayed with a wrong extension.
CVE-2018-6350
- EPSS 0.4%
- Published 14.06.2019 17:29:02
- Last modified 03.09.2025 17:36:53
An out-of-bounds read was possible in WhatsApp due to incorrect parsing of RTP extension headers. This issue affects WhatsApp for Android prior to 2.18.276, WhatsApp Business for Android prior to 2.18.99, WhatsApp for iOS prior to 2.18.100.6, WhatsAp...
CVE-2018-6349
- EPSS 1.31%
- Published 14.06.2019 17:29:02
- Last modified 03.09.2025 17:36:53
When receiving calls using WhatsApp for Android, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for Android prior to 2.18.248 and WhatsApp Business for Android prior to 2.18....
CVE-2018-6339
- EPSS 0.43%
- Published 14.06.2019 17:29:02
- Last modified 03.09.2025 17:36:53
When receiving calls using WhatsApp on Android, a stack allocation failed to properly account for the amount of data being passed in. An off-by-one error meant that data was written beyond the allocated space on the stack. This issue affects WhatsApp...
CVE-2018-20655
- EPSS 0.54%
- Published 14.06.2019 17:29:01
- Last modified 03.09.2025 17:36:53
When receiving calls using WhatsApp for iOS, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for iOS prior to v2.18.90.24 and WhatsApp Business for iOS prior to v2.18.90.24.
CVE-2019-3568
- EPSS 36.03%
- Published 14.05.2019 20:29:03
- Last modified 03.09.2025 17:36:53
A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android ...
CVE-2019-3566
- EPSS 0.28%
- Published 10.05.2019 21:29:00
- Last modified 21.11.2024 04:42:10
A bug in WhatsApp for Android's messaging logic would potentially allow a malicious individual who has taken over over a WhatsApp user's account to recover previously sent messages. This behavior requires independent knowledge of metadata for previou...
CVE-2018-6344
- EPSS 0.57%
- Published 31.12.2018 22:29:00
- Last modified 06.05.2025 16:15:22
A heap corruption in WhatsApp can be caused by a malformed RTP packet being sent after a call is established. The vulnerability can be used to cause denial of service. It affects WhatsApp for Android prior to v2.18.293, WhatsApp for iOS prior to v2.1...