Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 03 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Smarterdroid
Smarterdroid wifi File Transfer |
|
| Vendors & Products |
Smarterdroid
Smarterdroid wifi File Transfer |
Mon, 02 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 01 Feb 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WiFi File Transfer 1.0.8 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through file and folder names. Attackers can exploit the web server's input validation weakness to execute arbitrary JavaScript when users preview infected file paths, potentially compromising user browser sessions. | |
| Title | WiFi File Transfer 1.0.8 Persistent XSS via Web Server Input Validation | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-02T19:24:31.380Z
Reserved: 2026-01-11T13:34:26.331Z
Link: CVE-2022-50951
Updated: 2026-02-02T19:24:14.622Z
Status : Awaiting Analysis
Published: 2026-02-01T13:15:57.817
Modified: 2026-02-03T16:44:36.630
Link: CVE-2022-50951
No data.
OpenCVE Enrichment
Updated: 2026-02-02T09:26:20Z