Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fmf2-2478-rv56

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A user controlled parameter used in video call in WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20 could have allowed an out-of-bounds write on 32-bit devices.

A user controlled parameter used in video call in WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20 could have allowed an out-of-bounds write on 32-bit devices.

EPSS

Процентиль: 66%
0.00504
Низкий

Связанные уязвимости

CVSS3: 9.8
nvd
больше 5 лет назад

A user controlled parameter used in video call in WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20 could have allowed an out-of-bounds write on 32-bit devices.

EPSS

Процентиль: 66%
0.00504
Низкий