Exploit Title: Airties AIRv2 – Cross-Site Scripting # Date: # Exploit Author: Ismail Tasdelen # Vendor Homepage. Diyarbakır. Ad ; Ad Date 20 November ; Subtype Modems & Networking; Product ADSL Modem; Brand AirTies; Wireless Connection Available. Airties Air – OVAL Definitions: Class: Patch List of OVAL, Open Vulnerability and Assessment Language, definitions.
|Country:||Saint Kitts and Nevis|
|Published (Last):||20 June 2015|
|PDF File Size:||19.48 Mb|
|ePub File Size:||20.33 Mb|
|Price:||Free* [*Free Regsitration Required]|
A vulnerability was found in AirTies Air v2 1. It has been classified as problematic.
This affects an unknown function of the file top. The manipulation of the argument productboardtype as part of a Parameter leads to a cross site scripting airtles. This is going to have an impact on integrity.
An attacker might be able to inject arbitrary html and script code into the web site. This would alter the appearance and alrties make it possible to initiate further attacks against site visitors. It is possible to initiate the attack remotely.
Technical details are known, but no exploit is available. There is no information about possible countermeasures known.
It may be suggested to replace the affected object with an alternative product. Lien vers l’article source. VulDB Nombre de vues: Accueil Informations Contacts Qui sommes-nous? Cross site scripting CWE Local: AirTies Air 1.
Please enter your name. Please enter a valid email address.
Please enter your email. Please enter a subject Please enter a subject.
Please enter the message.