Description
The parameter used in the login page of Netvision airPASS is not properly filtered for user input. An unauthenticated remote attacker can insert JavaScript code to the parameter for Reflected Cross-site scripting attacks.
No analysis available yet.
Remediation
Vendor Solution
Update to 2.9.0.231006 or later version.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-32348 | The parameter used in the login page of Netvision airPASS is not properly filtered for user input. An unauthenticated remote attacker can insert JavaScript code to the parameter for Reflected Cross-site scripting attacks. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-7730-584e3-1.html |
|
History
Tue, 08 Apr 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netvision
Netvision airpass |
|
| CPEs | cpe:2.3:a:netvision:airpass:2.9.0.231006:*:*:*:*:*:*:* | |
| Vendors & Products |
Netvision
Netvision airpass |
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-08-01T20:20:02.489Z
Reserved: 2024-04-15T02:44:17.283Z
Link: CVE-2024-3776
Updated: 2024-08-01T20:20:02.489Z
Status : Analyzed
Published: 2024-04-15T04:15:16.340
Modified: 2025-04-08T16:31:04.280
Link: CVE-2024-3776
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD