Exploit Title: Airties AIRv2 – Cross-Site Scripting # Date: # Exploit Author: Ismail Tasdelen # Vendor Homepage. Diyarbakır. Ad ; Ad Date 20 November ; Subtype Modems & Networking; Product ADSL Modem; Brand AirTies; Wireless Connection Available. Airties Air – OVAL Definitions: Class: Patch List of OVAL, Open Vulnerability and Assessment Language, definitions.
|Published (Last):||4 July 2009|
|PDF File Size:||18.55 Mb|
|ePub File Size:||14.21 Mb|
|Price:||Free* [*Free Regsitration Required]|
You can view versions of this product or security vulnerabilities related to Airties Air This page lists vulnerability statistics for all versions of Airties Air Please enter your email. This affects an unknown function of the file top.
AirTies Managed Mesh Solution
Selected vulnerability types are OR’ed. Log in or sign up for an account to create a custom feed or widget. AirTies Air 1.
Cross Site Request Forgery. It is possible to initiate the attack remotely.
Accueil Informations Contacts Qui sommes-nous? If you don’t select any criteria “all” CVE xirties will be returned Vulnerabilities with exploits. Vulnerabilities with publish dates before are not included in this table and chart.
Airties Air : CVE security vulnerabilities, versions and detailed reports
Please enter a valid email address. Vulnerability statistics provide a quick overview for security vulnerabilities of this software. Lien vers l’article source.
Cross site scripting CWE Local: It has been classified as problematic. Please enter your name.
It may be suggested to replace the affected object with an alternative product. Because there are not many of them and they make the page look bad; and they may not be actually published in those years. There is no information about possible countermeasures known. CVE or or Please enter the message. There are NO warranties, implied or otherwise, 5433 regard to this information or its use.
AirTies Air v2 productboardtype cross site scripting
How does it work? VulDB Nombre de vues: Technical details are known, but no exploit is available. Use of this information constitutes acceptance for use in an AS IS condition. This would alter the appearance and would make it possible to initiate further attacks against site visitors. Any use of this information is at the user’s risk. It aigties the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. Please enter a subject Please enter a subject.
An attacker might be able to inject arbitrary html and script code into the web site. If you don’t select any criteria “all” CVE entries will be returned. The manipulation of the argument productboardtype as part of a Parameter leads to a cross site scripting vulnerability. A vulnerability was found in AirTies Air v2 1. Feeds or widget will contain only vulnerabilities of this product Selected vulnerability types are OR’ed.
This is going to have an impact on integrity.