Revive Adserver 漏洞列表
共找到 6 个与 Revive Adserver 相关的漏洞
📅 加载漏洞趋势中...
-
CVE-2019-5434: Revive Adserver 4.2 - Remote Code Execution POC
Revive Adserver 4.2 is susceptible to remote code execution. An attacker can send a crafted payload to the XML-RPC invocation script and trigger the unserialize() call on the "what" parameter in the "openads.spc" RPC method. This can be exploited to perform various types of attacks, e.g. serialize-related PHP vulnerabilities or PHP object injection. It is possible, although unconfirmed, that the vulnerability has been used by some attackers in order to gain access to some Revive Adserver instances and deliver malware through them to third-party websites. -
CVE-2020-8115: Revive Adserver <=5.0.3 - Cross-Site Scripting POC
Revive Adserver 5.0.3 and prior contains a reflected cross-site scripting vulnerability in the publicly accessible afr.php delivery script. In older versions, it is possible to steal the session identifier and gain access to the admin interface. The query string sent to the www/delivery/afr.php script is printed back without proper escaping, allowing an attacker to execute arbitrary JavaScript code on the browser of the victim. -
CVE-2021-22873: Revive Adserver <5.1.0 - Open Redirect POC
Revive Adserver before 5.1.0 contains an open redirect vulnerability via the dest, oadest, and ct0 parameters of the lg.php and ck.php delivery scripts. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. -
CVE-2023-38040: Revive Adserver 5.4.1 - Cross-Site Scripting POC
A reflected XSS vulnerability exists in Revive Adserver 5.4.1 and earlier versions. -
Revive Adserver广告管理系统存在远程代码执行漏洞(CVE-2019-5434) 无POC
Revive Adserver是一个开源的广告服务系统,允许广告商、出版商和网络在多个平台上显示广告,系统 adxmlrpc.php 文件远程代码执行漏洞 -
Revive Adserver 广告管理系统 adxmlrpc.php 文件远程代码执行漏洞(CVE-2019-5434) 无POC
Revive Adserver是Revive Adserver团队的一套开源的广告管理系统。该系统提供广告投放、广告位管理、数据统计等功能。Revive Adserver 4.2.0之前版本中delivery XML-RPC脚本存在代码问题漏洞,攻击者可执行任意代码获取服务器权限。