Exploit Title: Airties AIRv2 – Cross-Site Scripting # Date: # Exploit Author: Ismail Tasdelen # Vendor Homepage. Diyarbakır. Ad ; Ad Date 20 November ; Subtype Modems & Networking; Product ADSL Modem; Brand AirTies; Wireless Connection Available. Airties Air – OVAL Definitions: Class: Patch List of OVAL, Open Vulnerability and Assessment Language, definitions.
|Published (Last):||27 March 2008|
|PDF File Size:||6.58 Mb|
|ePub File Size:||18.21 Mb|
|Price:||Free* [*Free Regsitration Required]|
It has been classified as problematic. Please enter your name. You can airtles versions of this product or security vulnerabilities related to Airties Air VulDB Nombre de vues: Accueil Informations Contacts Qui sommes-nous? Vulnerability statistics provide a quick overview for security vulnerabilities of this software. A vulnerability was found in AirTies Air v2 1.
Please enter your email. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. This would alter the appearance and would make it possible to initiate further attacks against site visitors.
AirTies Air v2 productboardtype cross site scripting
AirTies Air 1. Cross site scripting CWE Local: Feeds or widget will contain only vulnerabilities of this product Selected vulnerability types are OR’ed. Cross Site Request Forgery. Technical details are known, but no exploit is available. Please enter a valid email address. Use of airtties information constitutes acceptance for use in an AS IS condition.
There is no information about possible countermeasures known. Lien vers l’article source. Please enter the message.
This affects an unknown function of the file top. This page lists vulnerability statistics for all versions of Airties Air CVE or or Please enter a subject Please enter a subject. This is going to have an impact on integrity.
It is possible to initiate the attack remotely. There are NO warranties, implied or otherwise, with regard to this information or its use.
AirTies Wireless Networks
If you don’t select any criteria “all” CVE entries airtis be returned. Because there are not many of them and they make the page look bad; and they may not be actually published in those years. The manipulation of the argument productboardtype as part of a Parameter leads to a cross site scripting vulnerability.
Any use of this information is at the user’s risk. Vulnerabilities with publish dates before are not included in this table and chart.
OVAL Definitions By Referenced Objects
Log in or sign up for an account to create a custom feed or widget. An attacker might be able to inject arbitrary html and script code into the web site.
If you don’t select any criteria “all” CVE entries will be returned Vulnerabilities with exploits. Selected vulnerability types are OR’ed. It may be suggested to replace the affected object with an alternative product. How does it work?