Revive-adserver

Revive Adserver

60 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 2.14%
  • Veröffentlicht 26.01.2021 18:16:19
  • Zuletzt bearbeitet 21.11.2024 05:50:48

Revive Adserver before 5.1.0 is vulnerable to a reflected cross-site scripting (XSS) vulnerability via the publicly accessible afr.php delivery script. While this issue was previously addressed in modern browsers as CVE-2020-8115, some older browsers...

Exploit
  • EPSS 0.94%
  • Veröffentlicht 26.01.2021 18:16:19
  • Zuletzt bearbeitet 21.11.2024 05:50:48

Revive Adserver before 5.1.0 permits any user with a manager account to store possibly malicious content in the URL website property, which is then displayed unsanitized in the affiliate-preview.php tag generation screen, leading to a persistent cros...

Exploit
  • EPSS 6.37%
  • Veröffentlicht 03.04.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:38:22

An Open Redirect vulnerability was discovered in Revive Adserver version < 5.0.5 and reported by HackerOne user hoangn144. A remote attacker could trick logged-in users to open a specifically crafted link and have them redirected to any destination.T...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 03.04.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:38:22

A security restriction bypass vulnerability has been discovered in Revive Adserver version < 5.0.5 by HackerOne user hoangn144. Revive Adserver, like many other applications, requires the logged in user to type the current password in order to change...

Exploit
  • EPSS 55.79%
  • Veröffentlicht 04.02.2020 20:15:13
  • Zuletzt bearbeitet 21.11.2024 05:38:19

A reflected XSS vulnerability has been discovered in the publicly accessible afr.php delivery script of Revive Adserver <= 5.0.3 by Jacopo Tediosi. There are currently no known exploits: the session identifier cannot be accessed as it is stored in an...

Exploit
  • EPSS 0.38%
  • Veröffentlicht 28.05.2019 19:29:06
  • Zuletzt bearbeitet 21.11.2024 04:44:56

Use of cryptographically weak PRNG in the password recovery token generation of Revive Adserver < v4.2.1 causes a potential authentication bypass attack if an attacker exploits the password recovery functionality. In lib/OA/Dal/PasswordRecovery.php, ...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 06.05.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:44:55

A user having access to the UI of a Revive Adserver instance could be tricked into clicking on a specifically crafted admin account-switch.php URL that would eventually lead them to another (unsafe) domain, potentially used for stealing credentials o...

  • EPSS 0.54%
  • Veröffentlicht 28.03.2017 02:59:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Revive Adserver before 3.2.5 and 4.0.0 suffers from Reflected File Download. `www/delivery/asyncspc.php` was vulnerable to the fairly new Reflected File Download (RFD) web attack vector that enables attackers to gain complete control over a victim's ...

  • EPSS 0.38%
  • Veröffentlicht 28.03.2017 02:59:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Revive Adserver before 3.2.5 and 4.0.0 suffers from Reflected XSS. The Revive Adserver web installer scripts were vulnerable to a reflected XSS attack via the dbHost, dbUser, and possibly other parameters. It has to be noted that the window for such ...

  • EPSS 0.27%
  • Veröffentlicht 28.03.2017 02:59:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Revive Adserver before 3.2.5 and 4.0.0 suffers from Special Element Injection. Usernames weren't properly sanitised when creating users on a Revive Adserver instance. Especially, control characters were not filtered, allowing apparently identical use...