Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-51179 | 3CX before 18 Hotfix 1 build 18.0.3.461 on Windows allows unauthenticated remote attackers to read %WINDIR%\system32 files via /Electron/download directory traversal in conjunction with a path component that has a drive letter and uses backslash characters. NOTE: this issue exists because of an incomplete fix for CVE-2022-28005. |
Thu, 30 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-30T16:51:25.197Z
Reserved: 2023-05-02T00:00:00.000Z
Link: CVE-2022-48483
Updated: 2024-08-03T15:17:54.759Z
Status : Modified
Published: 2023-05-02T05:15:28.057
Modified: 2025-01-30T17:15:12.333
Link: CVE-2022-48483
No data.
OpenCVE Enrichment
No data.
EUVD