Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-50515 | In imo.im 2022.11.1051, a path traversal vulnerability delivered via an unsanitized deeplink can force the application to write a file into the application's data directory. This may allow an attacker to save a shared library under a special directory which the app uses to dynamically load modules. Loading the library can lead to arbitrary code execution. |
Mon, 03 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-03T18:49:28.644Z
Reserved: 2022-12-21T00:00:00.000Z
Link: CVE-2022-47757
Updated: 2024-08-03T15:02:36.498Z
Status : Modified
Published: 2023-05-04T02:15:09.177
Modified: 2024-11-21T07:32:23.040
Link: CVE-2022-47757
No data.
OpenCVE Enrichment
No data.
EUVD