what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files

WhatsApp 2.18.61 Memory Corruption
Posted Aug 28, 2018
Authored by Juan Sacco

WhatsApp version 2.18.61 suffers from a memory corruption vulnerability.

tags | exploit, denial of service
SHA-256 | 05f98770c14444ad83cddd23fdf265911dab07c1540b1184699a7badf9180432

Related Files

RTLO Injection URI Spoofing
Posted Mar 25, 2022
Authored by Sick Codes, zadewg

RTLO injection URI spoofing generator for WhatsApp, iMessage, Instagram, and Facebook Messenger.

tags | exploit, spoof
advisories | CVE-2020-20093, CVE-2020-20094, CVE-2020-20095, CVE-2020-20096
SHA-256 | 8add20e505d85dfcd1125eb892d0726f12751ed7cff691329973ac7c8d3c4a25
Remote Code Execution In WhatsApp
Posted Nov 24, 2021
Authored by cor le

Whitepaper that gives an analysis of the remote code execution vulnerability noted in CVE-2019-11932 for WhatsApp that affects versions prior to 2.19.244. Written in Spanish.

tags | paper, remote, code execution
advisories | CVE-2019-11932
SHA-256 | 7866772d314829babcae8d60f3a6173f7e55759aac6e5184ca91290e471e6320
WhatsApp Remote Code Execution
Posted Jul 5, 2020
Authored by Ashu Jaiswal

Whitepaper discussing how to leverage the WhatsApp remote code execution vulnerability that takes advantage of a double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library.

tags | paper, remote, code execution
advisories | CVE-2019-11932
SHA-256 | feb7a40a9b13488a6d0ac0a4f65701a08a6a1d9b083b8c2771168f17e21baef5
WhatsApp android-gif-drawable Double-Free
Posted Jul 5, 2020
Authored by Ashu Jaiswal | Site github.com

Proof of concept exploit that leverages a double-free in the DDGifSlurp function in decoding.c in the android-gif-drawable library in order to achieve remote code execution in WhatsApp.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2019-11932
SHA-256 | 1c2d3f70903b9b13321a6f3f46689c943f4e16a2256386af7669b84810563623
WhatsApp Desktop 0.3.9308 Cross Site Scripting
Posted Apr 6, 2020
Authored by Gal Weizman

WhatsApp Desktop version 0.3.9308 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-18426
SHA-256 | 92e40eb6061e659675b76d4c9cead134b84c467d9f33ed0ad867dc0747766250
Android-Gif-Drawable Double-Free
Posted Nov 27, 2019
Authored by Marcin Kozlowski

A double free vulnerability in the DDGifSlurp function in decoding.c in libpl_droidsonroids_gif before 1.2.15, as used in WhatsApp for Android before 2.19.244, allows remote attackers to execute arbitrary code or cause a denial of service. CVE-2019-11932 is a vulnerability in the android-gif-drawable library. Yet the CVE text doesn't mention "android-gif-drawable". It only mentions WhatsApp. There could be over 28,400 free Android apps that use this library.

tags | advisory, remote, denial of service, arbitrary
advisories | CVE-2019-11932
SHA-256 | deb671a58483113fa01c7556131f6c1924fc8c60528a056679836812d446ff89
Whatsapp 2.19.216 Remote Code Execution
Posted Oct 16, 2019
Authored by Valerio Brussani

Whatsapp version 2.19.216 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2019-11932
SHA-256 | b1c4e9d5cd54513f408c1ec9d9017cd31cfa52c3bd2ca8b5bc7e8a9fe88994d1
WhatsApp RTP Processing Heap Corruption
Posted Oct 11, 2018
Authored by Google Security Research, natashenka

WhatsApp suffers from a heap corruption vulnerability in RTP processing.

tags | exploit
SHA-256 | e053dae6b5c926d9d1c66aa29e059009fecb9861a5a9937ccd1fa50f7ffcea53
WhatsApp 2.18.31 iOS Memory Corruption
Posted May 15, 2018
Authored by Juan Sacco

WhatsApp version 2.18.31 on iOS suffers from a remote memory corruption vulnerability.

tags | exploit, remote
systems | ios
SHA-256 | ff92e1c85fb8bd8ac7902fd96cddf503538f3176b7b042ad1dbbfe8fb8038ef6
WhatsApp 2.17.52 Memory Corruption
Posted Nov 1, 2017
Authored by Juan Sacco

WhatsApp versions 2.17.52 and below suffer from a memory corruption vulnerability that can result in a denial of service.

tags | exploit, denial of service
SHA-256 | 938e528baacd94eea2f9b0cdc6f120abd8230c01d83a66a10d0b34e7c45314cd
WhatsApp Failure To Delete
Posted May 19, 2017
Authored by Yakov Shafranovich | Site wwws.nightwatchcybersecurity.com

WhatsApp Messenger for Android does not delete sent and received files from the SD card on the device when chats are cleared, deleted or the application is uninstalled from the device. Additionally, the application stores sent and received files in the SD card without encryption where they are accessible to any applications with storage permissions.

tags | advisory
advisories | CVE-2017-8769
SHA-256 | 33e5802bd2f7506103d2ccc503733ef058009d057af1f25c56e0615d0d99772f
WhatsApp DLL Hijacking
Posted Sep 9, 2016
Authored by Amir.ght

WhatsApp suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 5edfc503a7aaa97cdd3ee4b9e0a61279e5db0110de4e6e57333a56e62653ad04
WhatsApp Location Buffer Overflow
Posted Feb 6, 2015
Authored by Akin Tosunlar

The WhatsApp iOS application appears to suffer from a buffer overflow condition when receiving a malicious location message.

tags | advisory, denial of service, overflow
systems | cisco, ios
SHA-256 | c8cbbfa784fa9dc86d64bfc86141fcad9c0be3d44088932960751c9fa3ec7913
WhatsApp Remote Crash On Android
Posted Dec 26, 2014
Authored by Daniel Godoy

WhatsApp suffers from a remote reboot/crash vulnerability on Android versions 2.11.476 and below.

tags | exploit, remote, denial of service
SHA-256 | 5879d8bdbd46acb54cdb8b4d551d83b50cb7473bcd56f684c9481ecf433fa1be
WhatsApp Database Extraction
Posted Apr 4, 2014
Authored by Monendra Sahu

This whitepaper is a walk through on how to extract msgstore.db.crypt5 from WhatsApp on Android and using tools to break crypt5.

tags | paper
SHA-256 | 68ad521e10670bbb65c0d7b97ed8b497b83fd054c87bf2fe62d0596ebb035636
WhatsApp Abuse Issues
Posted Jul 24, 2013
Authored by Curesec Research Team

WhatsApp fails to secure communications when spawning functionality for Google Wallet and Paypal. Versions 2.9.6447 through 2.10.751 are affected.

tags | advisory
SHA-256 | 260e26aeec72763f25b273ccb4f424dd4aeffd1b74f89099d65012fdf72375d4
WhatsApp Status Changer 0.2 Stable
Posted Jan 20, 2012
Authored by Emanuele Gentili, Stefano Fratepietro

This is a slim exploit that will change the WhatsApp user status remotely.

tags | exploit
SHA-256 | 8f1798fb095f631b8c7bd66e9d6ce857746b6d417745cd1e813ce1524b09572d
Secunia Security Advisory 46785
Posted Dec 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in WhatsApp Messenger, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | f6dab7cea0114aa4f9a02710e16d749887c9dcf167be5d37f3a8265bd2b3cd7c
WhatsApp Status Update / Registration Bypass / Plain Text Protocols
Posted Dec 19, 2011
Authored by G. Wagner | Site sec-consult.com

The WhatsApp tool suffers from arbitrary user status updating, registration bypass and plaintext protocol vulnerabilities.

tags | advisory, arbitrary, vulnerability, protocol
SHA-256 | 0616c7aaaea8c5766787ad6d89a5f5e1a9b8c80dda620060d4f23fe8f25ffa06
Page 1 of 1
Back1Next

File Archive:

July 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    52 Files
  • 2
    Jul 2nd
    0 Files
  • 3
    Jul 3rd
    0 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    8 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close