Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| koral-- | android-gif-drawable | unspecified ~ 1.2.18 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | double-free bug in WhatsApp exploit poc | https://github.com/dorkerdevil/CVE-2019-11932 | POC Details |
| 2 | Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif | https://github.com/awakened1712/CVE-2019-11932 | POC Details |
| 3 | This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution) | https://github.com/JasonJerry/WhatsRCE | POC Details |
| 4 | Double-Free BUG in WhatsApp exploit poc. | https://github.com/TulungagungCyberLink/CVE-2019-11932 | POC Details |
| 5 | None | https://github.com/infiniteLoopers/CVE-2019-11932 | POC Details |
| 6 | The exploit works well until WhatsApp version 2.19.230. The vulnerability is official patched in WhatsApp version 2.19.244 | https://github.com/5l1v3r1/CVE-2019-11932 | POC Details |
| 7 | This native code file aims to be complementary to the published Whatsapp GIF RCE exploit by Awakened , by calculating the system() function address and ROP gadget address for different types of devices, which then can be used to successfully exploit the vulnerability. | https://github.com/valbrux/CVE-2019-11932-SupportApp | POC Details |
| 8 | Programa para hackear Whatsapp Mediante Gif ,asiendo un exploit con el puerto. | https://github.com/fastmo/CVE-2019-11932 | POC Details |
| 9 | Double-free vulnerability in DDGifSlurp in decoding.c in libpl_droidsonroids_gif can read more https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/ | https://github.com/mRanonyMousTZ/CVE-2019-11932-whatsApp-exploit | POC Details |
| 10 | None | https://github.com/SmoZy92/CVE-2019-11932 | POC Details |
| 11 | https://github.com/awakened1712/CVE-2019-11932 | https://github.com/dashtic172/https-github.com-awakened171 | POC Details |
| 12 | Whatsapp Automatic Payload Generator [CVE-2019-11932] | https://github.com/Err0r-ICA/WhatsPayloadRCE | POC Details |
| 13 | None | https://github.com/starling021/CVE-2019-11932-SupportApp | POC Details |
| 14 | None | https://github.com/primebeast/CVE-2019-11932 | POC Details |
| 15 | https://github.com/awakened1712/CVE-2019-11932://github.com/awakened1712/CVE-2019-11932 | https://github.com/BadAssAiras/hello | POC Details |
| 16 | Whatsapp remote code execution CVE-2019-11932 https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/ | https://github.com/kal1gh0st/WhatsAppHACK-RCE | POC Details |
| 17 | None | https://github.com/zxn1/CVE-2019-11932 | POC Details |
| 18 | Exploit Analysis of The WhatsApp Double-Free Vulnerability (CVE-2019-11932) Using the GEF-GDB Debugger | https://github.com/k3vinlusec/WhatsApp-Double-Free-Vulnerability_CVE-2019-11932 | POC Details |
| 19 | CVE-2019-11932 | https://github.com/Tabni/https-github.com-awakened1712-CVE-2019-11932 | POC Details |
| 20 | None | https://github.com/0759104103/cd-CVE-2019-11932 | POC Details |
| 21 | Double-Free BUG in WhatsApp exploit poc. | https://github.com/tucommenceapousser/CVE-2019-11932 | POC Details |
| 22 | Double-Free BUG in WhatsApp exploit poc. | https://github.com/tucommenceapousser/CVE-2019-11932deta | POC Details |
| 23 | https://github.com/awakened1712/CVE-2019-11932 | https://github.com/OrdaraatSite/https-github.com-awakened171 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet