📦 Whatsapp Business
by Whatsapp
🔍 What is Whatsapp Business?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in WhatsApp's RTCP parsing code allows an attacker to read memory outside the allocated heap buffer by sending a specially crafted RTCP packet during a call. It affects WhatsApp use...
A missing bounds check in WhatsApp's image blurring code allows an attacker to trigger an out-of-bounds write by sending a malicious image. This could lead to remote code execution or application cras...
This vulnerability allows attackers to perform path traversal attacks when WhatsApp processes ZIP archives, potentially overwriting critical WhatsApp files. It affects WhatsApp for Android and WhatsAp...
This vulnerability allows remote code execution via WhatsApp voice calls due to a missing bounds check in the audio decoding pipeline. An attacker could send a malicious audio packet during a call to ...
A use-after-free vulnerability in WhatsApp's iOS logging library could allow memory corruption, crashes, or potentially remote code execution. This affects WhatsApp and WhatsApp Business for iOS users...
A stack overflow vulnerability in WhatsApp's RTP Extension header parsing allows remote attackers to execute arbitrary code on affected devices. This affects WhatsApp and WhatsApp Business on Android,...
This vulnerability in WhatsApp allows attackers to trigger an out-of-bounds write via a user-controlled parameter during video calls. Successful exploitation could lead to remote code execution or app...
This vulnerability in WhatsApp for iOS, WhatsApp Business for iOS, and WhatsApp for Mac allows an attacker to send specially crafted rich response messages that could trigger processing of media conte...
This WhatsApp vulnerability allows unauthorized users to trigger processing of arbitrary URLs on a target's device through linked device synchronization messages. When combined with Apple OS vulnerabi...