跳至内容
  • 首页
    • 私密收发消息保持联系群组交流表达自我安全防护与生俱来分享日常点滴关注频道
  • 隐私
  • 帮助中心
  • 博客
  • 商家专区
  • 下载
下载
条款和隐私政策2025 © WhatsApp LLC
WhatsApp 公共主页WhatsApp 公共主页
    • 私密收发消息

      提供端到端加密和隐私控制选项。

    • 保持联系

      全球免费*发消息和通话,随时随地零距离。

    • 群组交流

      轻松收发群组消息。

    • 表达自我

      用贴图、声音、动图等尽情表达自我。

    • 安全防护与生俱来

      采用多重防护,保障你的安全

    • 分享日常点滴

      使用动态功能分享照片、视频、语音留言

    • 关注频道

      及时了解关注的话题

  • 隐私
  • 帮助中心
  • 博客
  • 商家专区
  • 应用
登录下载

WhatsApp Security Advisories

2022 Updates

September Update

CVE-2022-36934

An integer overflow in WhatsApp for Android prior to v2.22.16.12, Business for Android prior to v2.22.16.12, iOS prior to v2.22.16.12, Business for iOS prior to v2.22.16.12 could result in remote code execution in an established video call.

CVE-2022-27492

An integer underflow in WhatsApp for Android prior to v2.22.16.2, WhatsApp for iOS v2.22.15.9 could have caused remote code execution when receiving a crafted video file.


February Update

CVE-2021-24043

A missing bound check in RTCP flag parsing code prior to WhatsApp for Android v2.21.23.2, WhatsApp Business for Android v2.21.23.2, WhatsApp for iOS v2.21.230.6, WhatsApp Business for iOS 2.21.230.7, and WhatsApp Desktop v2.2145.0 could have allowed an out-of-bounds heap read if a user sent a malformed RTCP packet during an established call.


January Update

CVE-2021-24042

The calling logic for WhatsApp for Android prior to v2.21.23, WhatsApp Business for Android prior to v2.21.23, WhatsApp for iOS prior to v2.21.230, WhatsApp Business for iOS prior to v2.21.230, WhatsApp for KaiOS prior to v2.2143, WhatsApp Desktop prior to v2.2146 could have allowed an out-of-bounds write if a user makes a 1:1 call to a malicious actor.

下载
WhatsApp 主标志
WhatsApp 主标志
下载
功用介绍
功能博客安全For Business
我们是谁
关于我们招聘信息品牌中心隐私
使用 WhatsApp
AndroidiPhoneMac/PCWhatsApp 网页版
需要帮助?
联系我们帮助中心应用安全声明
下载

2025 © WhatsApp LLC

条款和隐私政策
网站地图