Логотип exploitDog
bind:CVE-2022-50951
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-50951

Количество 2

Количество 2

nvd логотип

CVE-2022-50951

7 дней назад

WiFi File Transfer 1.0.8 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through file and folder names. Attackers can exploit the web server's input validation weakness to execute arbitrary JavaScript when users preview infected file paths, potentially compromising user browser sessions.

CVSS3: 6.4
EPSS: Низкий
github логотип

GHSA-8wrr-chc3-qqrw

7 дней назад

WiFi File Transfer 1.0.8 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through file and folder names. Attackers can exploit the web server's input validation weakness to execute arbitrary JavaScript when users preview infected file paths, potentially compromising user browser sessions.

CVSS3: 6.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-50951

WiFi File Transfer 1.0.8 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through file and folder names. Attackers can exploit the web server's input validation weakness to execute arbitrary JavaScript when users preview infected file paths, potentially compromising user browser sessions.

CVSS3: 6.4
0%
Низкий
7 дней назад
github логотип
GHSA-8wrr-chc3-qqrw

WiFi File Transfer 1.0.8 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through file and folder names. Attackers can exploit the web server's input validation weakness to execute arbitrary JavaScript when users preview infected file paths, potentially compromising user browser sessions.

CVSS3: 6.4
0%
Низкий
7 дней назад

Уязвимостей на страницу