Exploit Title: Airties AIRv2 – Cross-Site Scripting # Date: # Exploit Author: Ismail Tasdelen # Vendor Homepage. Diyarbakır. Ad ; Ad Date 20 November ; Subtype Modems & Networking; Product ADSL Modem; Brand AirTies; Wireless Connection Available. Airties Air – OVAL Definitions: Class: Patch List of OVAL, Open Vulnerability and Assessment Language, definitions.
|Published (Last):||18 December 2015|
|PDF File Size:||14.1 Mb|
|ePub File Size:||16.51 Mb|
|Price:||Free* [*Free Regsitration Required]|
AirTies Air v2 productboardtype cross site scripting
Vulnerability statistics provide a quick overview for security vulnerabilities of this software. There is no information about possible countermeasures known.
There are NO warranties, implied or otherwise, aitries regard to this information or its use. Selected vulnerability types are OR’ed. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content.
Airties AIR5343v2 126.96.36.199 Cross Site Scripting
This page lists vulnerability statistics for all versions of Airties Air The manipulation of the argument productboardtype as part of a Parameter leads to a cross site scripting vulnerability.
Please enter your name.
Please enter a subject Please enter a subject. If you don’t select any criteria “all” CVE entries will be returned Airtjes with exploits. How does it work?
Accueil Informations Contacts Qui sommes-nous? This would alter the appearance and would make it possible to initiate further attacks against site visitors. Because there are not many of them and they make the page look bad; and they may not be actually published in those years. Log in or sign up for an account to create a airtles feed or widget.
CVE or or Cross Site Request Forgery.
You can view versions of this product or security vulnerabilities related to Airties Air If you don’t select any criteria “all” CVE entries will be returned.
This affects an unknown function of the file top. Cross site scripting CWE Local: An attacker might be able to inject arbitrary html and script code into the web site. Technical details are known, but no exploit is available. Please enter a valid email address.
Feeds or widget will contain only airtiew of this product Selected vulnerability types are OR’ed. Use of this information constitutes acceptance for use in an AS IS condition. This is going to have an impact on integrity. It may be suggested to replace the affected object with an alternative product.
AirTies Air 1. Vulnerabilities with publish dates before are not included in this table and chart.
A vulnerability was found in AirTies Air v2 1. Any use of this information is at the user’s risk. It is possible to initiate the attack remotely. It has been classified as problematic. Please enter the message. VulDB Nombre de vues: Please enter your email. Lien vers l’article source.