FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-19 20:48:44 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
3e33a0bb-6b2f-11e3-b042-20cf30e32f6dOpenX -- SQL injection vulnerability

Revive reports:

An SQL-injection vulnerability was recently discovered and reported to the Revive Adserver team by Florian Sander. The vulnerability is known to be already exploited to gain unauthorised access to the application using brute force mechanisms, however other kind of attacks might be possible and/or already in use. The risk is rated to be critical as the most common end goal of the attackers is to spread malware to the visitors of all the websites and ad networks that the ad server is being used on.

The vulnerability is also present and exploitable in OpenX Source 2.8.11 and earlier versions, potentially back to phpAdsNew 2.0.x.


Discovery 2013-12-20
Entry 2013-12-22
openx
< 3.0.2

http://www.revive-adserver.com/security/revive-sa-2013-001/
http://www.kreativrauschen.com/blog/2013/12/18/zero-day-vulnerability-in-openx-source-2-8-11-and-revive-adserver-3-0-1/
CVE-2013-7149
46aeba13-64a1-11e1-bc16-0023ae8e59f0openx -- undisclosed security issue

OpenX does not provide information about vulnerabilities beyond their existence.


Discovery 2011-12-01
Entry 2012-03-02
Modified 2012-07-08
openx
< 2.8.9

http://blog.openx.org/12/security-matters-3
55616fda-a2d0-11dd-a9f9-0030843d3802openx -- sql injection vulnerability

Secunia reports:

OpenX can be exploited by malicious people to conduct SQL injection attacks.

Input passed to the "bannerid" parameter in www/delivery/ac.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.


Discovery 2008-10-03
Entry 2008-10-25
openx
< 2.6.2

http://secunia.com/advisories/32114/
http://blog.openx.org/10/openx-security-update/
80b6d6cc-c970-11df-bb18-0015587e2cc1openx -- remote code execution vulnerability

The OpenX project reported:

It has been brought to our attention that there is a vulnerability in the 2.8 downloadable version of OpenX that can result in a server running the downloaded version of OpenX being compromised.

This vulnerability exists in the file upload functionality and allows attackers to upload and execute PHP code of their choice.


Discovery 2010-09-14
Entry 2010-09-26
openx
< 2.8.7

http://blog.openx.org/09/security-update/
http://www.h-online.com/security/news/item/Web-sites-distribute-malware-via-hacked-OpenX-servers-1079099.html
dee44ba9-08ab-11e2-a044-d0df9acfd7e5OpenX -- SQL injection vulnerability

Secunia reports:

A vulnerability has been discovered in OpenX, which can be exploited by malicious people to conduct SQL injection attacks.

Input passed via the "xajaxargs" parameter to www/admin/updates-history.php (when "xajax" is set to "expandOSURow") is not properly sanitised in e.g. the "queryAuditBackupTablesByUpgradeId()" function (lib/OA/Upgrade/DB_UpgradeAuditor.php) before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is confirmed in version 2.8.9. Prior versions may also be affected.


Discovery 2012-09-14
Entry 2012-09-27
openx
< 2.8.10

http://secunia.com/advisories/50598/