{"uuid": "80eb96d2-3efe-45d9-8049-460b651c18d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47757", "type": "exploited", "source": "https://t.me/androidMalware/1876", "content": "Arbitrary code execution discoverd in Android imo-International Calls &amp; Chat with 1B installs up to version 2022.11.1051 (CVE-2022-47757)  \nA path traversal vulnerability delivered using a deeplink can force the IMO app to write files into its data directory. This allows an attacker to write a library file that the app uses to dynamically load modules  \nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47757", "creation_timestamp": "2023-05-05T23:33:28.000000Z"}