Page 6 of 47 results (0.010 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Revive Adserver before 3.2.3 suffers from Cross-Site Request Forgery (CSRF). A number of scripts in Revive Adserver's user interface are vulnerable to CSRF attacks: `www/admin/banner-acl.php`, `www/admin/banner-activate.php`, `www/admin/banner-advanced.php`, `www/admin/banner-modify.php`, `www/admin/banner-swf.php`, `www/admin/banner-zone.php`, `www/admin/tracker-modify.php`. Revive Adserver en versiones anteriores a 3.2.3 sufre de solicitud de falsificación en sitios cruzados (CSRF). Una serie de scripts en la interfaz de usuario de Revive Adserver son vulnerables a los ataques CSRF: `www/admin/banner-acl.php`, `www/admin/banner-activate.php`, `www/admin/banner-advanced.php`, `www/admin/banner-modify.php`, `www/admin/banner-swf.php`, `www/admin/banner-zone.php`, `www/admin/tracker-modify.php`. • http://www.securityfocus.com/bid/83964 https://github.com/revive-adserver/revive-adserver/commit/65a9c8119b4bc7493fd957e1a8d6f6f731298b45 https://hackerone.com/reports/97123 https://www.revive-adserver.com/security/revive-sa-2016-001 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Revive Adserver before 3.2.3 suffers from Persistent XSS. A vector for persistent XSS attacks via the Revive Adserver user interface exists, requiring a trusted (non-admin) account. The website name wasn't properly escaped when displayed in the campaign-zone.php script. Revive Adserver en versiones anteriores a 3.2.3 sufre de XSS persistente. Existe un vector para ataques XSS persistentes a través de la interfaz de usuario Revive Adserver, requiriendo una cuenta de confianza (no admin). • https://github.com/revive-adserver/revive-adserver/commit/f6880330a8e11e804663f132867e9eb9b1f94e83 https://www.revive-adserver.com/security/revive-sa-2016-001 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 2EXPL: 0

Revive Adserver before 3.2.5 and 4.0.0 suffers from Reflected XSS. The Revive Adserver web installer scripts were vulnerable to a reflected XSS attack via the dbHost, dbUser, and possibly other parameters. It has to be noted that the window for such attack vectors to be possible is extremely narrow and it is very unlikely that such an attack could be actually effective. Revive Adserver en versiones anteriores a 3.2.5 y 4.0.0 sufren de XSS reflejado. Los scripts del instalador web de Revive Adserver eran vulnerables a un ataque XSS reflejado a través de dbHost, dbUser y posiblemente otros parámetros. • https://github.com/revive-adserver/revive-adserver/commit/14ff73f0 https://github.com/revive-adserver/revive-adserver/commit/fcf72c8a https://hackerone.com/reports/170156 https://www.revive-adserver.com/security/revive-sa-2016-002 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

Session fixation vulnerability in the forgot password mechanism in Revive Adserver before 4.0.1, when setting a new password, allows remote attackers to hijack web sessions via the session ID. Vulnerabilidad de reparación de sesión en el mecanismo de contraseña olvidada en Revive Adserver en versiones anteriores a 4.0.1, cuando se establece una nueva contraseña, permite a atacantes remotos secuestrar sesiones web a través de la ID de sesión. • http://www.openwall.com/lists/oss-security/2017/02/02/3 http://www.securityfocus.com/bid/95875 https://www.revive-adserver.com/security/revive-sa-2017-001 • CWE-384: Session Fixation •

CVSS: 9.8EPSS: 3%CPEs: 1EXPL: 0

Revive Adserver before 4.0.1 allows remote attackers to execute arbitrary code via serialized data in the cookies related to the delivery scripts. Revive Adserver en versiones anteriores a 4.0.1 permite a atacantes remotos ejecutar código arbitrario a través de datos serializados en las cookies relacionadas con las secuencias de comandos de entrega. • http://www.openwall.com/lists/oss-security/2017/02/02/3 http://www.securityfocus.com/bid/95875 https://www.revive-adserver.com/security/revive-sa-2017-001 • CWE-502: Deserialization of Untrusted Data •