Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2013-5954

Multiple cross-site request forgery (CSRF) vulnerabilities in OpenX 2.8.11 and earlier allow remote attackers to hijack the authentication of administrators for requests that delete (1) users via admin/agency-user-unlink.php, (2) advertisers via admin/advertiser-delete.php, (3) banners via admin/banner-delete.php, (4) campaigns via admin/campaign-delete.php, (5) channels via admin/channel-delete.php, (6) affiliate websites via admin/affiliate-delete.php, or (7) zones via admin/zone-delete.php.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.059
EPSS Ranking 90.2%
CVSS Severity
CVSS v2 Score 6.8
Products affected by CVE-2013-5954
  • Openx » Openx » Version: 2.4
    cpe:2.3:a:openx:openx:2.4
  • Openx » Openx » Version: 2.4.10
    cpe:2.3:a:openx:openx:2.4.10
  • Openx » Openx » Version: 2.4.11
    cpe:2.3:a:openx:openx:2.4.11
  • Openx » Openx » Version: 2.4.4
    cpe:2.3:a:openx:openx:2.4.4
  • Openx » Openx » Version: 2.4.5
    cpe:2.3:a:openx:openx:2.4.5
  • Openx » Openx » Version: 2.4.6
    cpe:2.3:a:openx:openx:2.4.6
  • Openx » Openx » Version: 2.4.7
    cpe:2.3:a:openx:openx:2.4.7
  • Openx » Openx » Version: 2.4.8
    cpe:2.3:a:openx:openx:2.4.8
  • Openx » Openx » Version: 2.4.9
    cpe:2.3:a:openx:openx:2.4.9
  • Openx » Openx » Version: 2.6.0
    cpe:2.3:a:openx:openx:2.6.0
  • Openx » Openx » Version: 2.6.1
    cpe:2.3:a:openx:openx:2.6.1
  • Openx » Openx » Version: 2.6.2
    cpe:2.3:a:openx:openx:2.6.2
  • Openx » Openx » Version: 2.6.3
    cpe:2.3:a:openx:openx:2.6.3
  • Openx » Openx » Version: 2.6.4
    cpe:2.3:a:openx:openx:2.6.4
  • Openx » Openx » Version: 2.6.5
    cpe:2.3:a:openx:openx:2.6.5
  • Openx » Openx » Version: 2.7.29
    cpe:2.3:a:openx:openx:2.7.29
  • Openx » Openx » Version: 2.8
    cpe:2.3:a:openx:openx:2.8
  • Openx » Openx » Version: 2.8.1
    cpe:2.3:a:openx:openx:2.8.1
  • Openx » Openx » Version: 2.8.10
    cpe:2.3:a:openx:openx:2.8.10
  • Openx » Openx » Version: 2.8.11
    cpe:2.3:a:openx:openx:2.8.11
  • Openx » Openx » Version: 2.8.2
    cpe:2.3:a:openx:openx:2.8.2
  • Openx » Openx » Version: 2.8.3
    cpe:2.3:a:openx:openx:2.8.3
  • Openx » Openx » Version: 2.8.4
    cpe:2.3:a:openx:openx:2.8.4
  • Openx » Openx » Version: 2.8.5
    cpe:2.3:a:openx:openx:2.8.5
  • Openx » Openx » Version: 2.8.6
    cpe:2.3:a:openx:openx:2.8.6
  • Openx » Openx » Version: 2.8.7
    cpe:2.3:a:openx:openx:2.8.7
  • Openx » Openx » Version: 2.8.8
    cpe:2.3:a:openx:openx:2.8.8
  • Openx » Openx » Version: 2.8.9
    cpe:2.3:a:openx:openx:2.8.9
  • Revive-Adserver » Revive Adserver » Version: N/A
    cpe:2.3:a:revive-adserver:revive_adserver:-
  • Revive-Adserver » Revive Adserver » Version: 3.0.0
    cpe:2.3:a:revive-adserver:revive_adserver:3.0.0
  • Revive-Adserver » Revive Adserver » Version: 3.0.1
    cpe:2.3:a:revive-adserver:revive_adserver:3.0.1
  • Revive-Adserver » Revive Adserver » Version: 3.0.2
    cpe:2.3:a:revive-adserver:revive_adserver:3.0.2
  • Revive-Adserver » Revive Adserver » Version: 3.0.3
    cpe:2.3:a:revive-adserver:revive_adserver:3.0.3
  • Revive-Adserver » Revive Adserver » Version: 3.0.4
    cpe:2.3:a:revive-adserver:revive_adserver:3.0.4


Contact Us

Shodan ® - All rights reserved