The parameter used in the login page of Netvision airPASS is not properly filtered for user input. An unauthenticated remote attacker can insert JavaScript code to the parameter for Reflected Cross-site scripting attacks.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/tw/cp-132-7730-584e3-1.html | Third Party Advisory |
https://www.twcert.org.tw/tw/cp-132-7730-584e3-1.html | Third Party Advisory |
Configurations
History
08 Apr 2025, 16:31
Type | Values Removed | Values Added |
---|---|---|
First Time |
Netvision airpass
Netvision |
|
References | () https://www.twcert.org.tw/tw/cp-132-7730-584e3-1.html - Third Party Advisory | |
CPE | cpe:2.3:a:netvision:airpass:2.9.0.231006:*:*:*:*:*:*:* |
21 Nov 2024, 09:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.twcert.org.tw/tw/cp-132-7730-584e3-1.html - |
15 Apr 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 Apr 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-15 04:15
Updated : 2025-04-08 16:31
NVD link : CVE-2024-3776
Mitre link : CVE-2024-3776
CVE.ORG link : CVE-2024-3776
JSON object : View
Products Affected
netvision
- airpass
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')