Exploit Title: Airties AIRv2 – Cross-Site Scripting # Date: # Exploit Author: Ismail Tasdelen # Vendor Homepage. Diyarbakır. Ad ; Ad Date 20 November ; Subtype Modems & Networking; Product ADSL Modem; Brand AirTies; Wireless Connection Available. Airties Air – OVAL Definitions: Class: Patch List of OVAL, Open Vulnerability and Assessment Language, definitions.
|Published (Last):||18 August 2018|
|PDF File Size:||5.73 Mb|
|ePub File Size:||9.5 Mb|
|Price:||Free* [*Free Regsitration Required]|
A vulnerability was found in AirTies Air v2 1.
It has been classified as problematic. This affects an unknown function of the file top. The manipulation of the argument productboardtype as part of a Parameter leads ajrties a cross site scripting vulnerability.
This is going to have an impact on integrity. An attacker might be able to inject arbitrary html and script code into the web site.
This would alter the appearance and would make it possible to initiate further attacks against site visitors. It is possible to initiate the attack remotely.
OVAL Definitions By Referenced Objects
Technical details are known, but no exploit is available. There is no information about possible countermeasures known.
It may be suggested to replace the affected object with an alternative product. Lien vers l’article source. VulDB Nombre de vues: Accueil Informations Contacts Qui sommes-nous?
Cross site scripting CWE Local: AirTies Air 1. Please enter your name.
Airties Air : CVE security vulnerabilities, versions and detailed reports
Please enter a valid email address. Please enter your email.
Please enter a subject Please enter a subject. Please enter the message.