Exploit Title: Airties AIRv2 – Cross-Site Scripting # Date: # Exploit Author: Ismail Tasdelen # Vendor Homepage. Diyarbakır. Ad ; Ad Date 20 November ; Subtype Modems & Networking; Product ADSL Modem; Brand AirTies; Wireless Connection Available. Airties Air – OVAL Definitions: Class: Patch List of OVAL, Open Vulnerability and Assessment Language, definitions.

Author: Gardakree Vitilar
Country: Botswana
Language: English (Spanish)
Genre: Personal Growth
Published (Last): 16 September 2004
Pages: 483
PDF File Size: 4.7 Mb
ePub File Size: 8.8 Mb
ISBN: 425-7-23839-703-6
Downloads: 50314
Price: Free* [*Free Regsitration Required]
Uploader: Mazulkis

Please enter your name. Technical details are known, but no exploit is available. Please enter the message. Any use of this information is at the user’s risk. Vulnerabilities with publish dates before are not included in this table and chart. This affects an unknown function of the file top.

OVAL Definitions By Referenced Objects

It is possible to initiate the attack remotely. This is going to have an impact on integrity. There are NO warranties, implied or otherwise, with regard to this information or its use.


You can view versions of this product or security vulnerabilities related to Airties Air Cross aities scripting CWE Local: This page lists vulnerability statistics for all versions of Airties Air A vulnerability was found in AirTies Air v2 1. VulDB Nombre de vues: An attacker might be able to inject arbitrary html and script code into the web site.

Log in or sign up for an account to create a custom feed or widget. It may be suggested to replace the affected object with an alternative product. Selected vulnerability types are OR’ed.

Airties AIRv2 Cross Site Scripting

It has been classified as problematic. Vulnerability statistics provide a quick overview for security vulnerabilities of this software. Use of this information constitutes acceptance for use in an AS IS condition.

Please enter a subject Please enter a subject. It is the responsibility of user to 543 the accuracy, completeness or usefulness of any information, opinion, advice or other content. How does it work? Accueil Informations Contacts Qui sommes-nous? AirTies Air 1.

If you don’t select any criteria “all” CVE entries will be returned Vulnerabilities with exploits. Please enter your email.


Feeds or widget will contain only vulnerabilities of this product Selected vulnerability types are OR’ed. The manipulation of the argument productboardtype as part of a Parameter leads to a cross site scripting vulnerability. Because there are not many of them and they make the page look bad; and they may not be actually published in those years. There is no information about possible countermeasures known. Please enter a valid email aities.

CVE or or Lien vers l’article source. Cross Site Request Forgery. If you don’t select any criteria “all” CVE entries will be returned. This would alter the appearance airtifs would make it possible to initiate further attacks against site visitors.