Exploit Title: Airties AIRv2 – Cross-Site Scripting # Date: # Exploit Author: Ismail Tasdelen # Vendor Homepage. Diyarbakır. Ad ; Ad Date 20 November ; Subtype Modems & Networking; Product ADSL Modem; Brand AirTies; Wireless Connection Available. Airties Air – OVAL Definitions: Class: Patch List of OVAL, Open Vulnerability and Assessment Language, definitions.
|Published (Last):||5 March 2006|
|PDF File Size:||8.41 Mb|
|ePub File Size:||5.38 Mb|
|Price:||Free* [*Free Regsitration Required]|
Technical details are known, but no exploit is available. Cross site scripting CWE Local: It is possible to initiate the attack remotely.
Airties AIRv2 Cross Site Scripting
This page lists vulnerability statistics for all versions of Airties Air This affects an unknown function of the file top.
Please enter aurties subject Please enter a subject.
You can view versions of this product or security vulnerabilities related to Airties Air A vulnerability was found in AirTies Air v2 1. Please enter the message.
OVAL Definitions By Referenced Objects
AirTies Air 1. Vulnerabilities with publish dates before are not included in this table and chart.
Cross Site Request Forgery. Please enter your name. Please enter your email.
It may be suggested to replace the affected object with an alternative product. Because there are not many of them and they make the page look bad; and they may not be actually published in those years.
It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. CVE or or This would alter the appearance and would make it possible to airtjes further attacks against site visitors.
AirTies Air 5343v2 126.96.36.199 top.html productboardtype cross site scripting
Please enter a valid email address. Lien vers l’article source. Vulnerability statistics provide a quick overview for security vulnerabilities of this software.
This is going to have an impact on integrity. Accueil Informations Contacts Qui sommes-nous? There are NO warranties, implied or otherwise, with regard to this information airyies its use.
Log in or sign up for an account to create a custom feed or widget.
AirTies Wireless Networks
If you don’t select any criteria “all” CVE entries will be returned Vulnerabilities with exploits. How does it work? Any use of this information is at the user’s risk.
There is no information about possible countermeasures known. The manipulation of the argument productboardtype as part of a Parameter leads to a cross site scripting vulnerability.
Selected vulnerability types are OR’ed. Use of this information constitutes acceptance for use in an AS IS condition. It has been classified as problematic.
If you don’t select any criteria “all” CVE entries will be returned. Feeds or widget will contain only vulnerabilities of this product Selected vulnerability types are OR’ed.
An attacker might be able to inject arbitrary html and script code into the web site. VulDB Nombre de vues: