Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://hackerone.com/reports/3434156 |
|
Tue, 30 Dec 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aquaplatform
Aquaplatform revive Adserver |
|
| CPEs | cpe:2.3:a:aquaplatform:revive_adserver:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Aquaplatform
Aquaplatform revive Adserver |
Tue, 02 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-176 |
Tue, 02 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 02 Dec 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Revive
Revive adserver |
|
| Vendors & Products |
Revive
Revive adserver |
Tue, 02 Dec 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HackerOne community member Kassem S.(kassem_s94) has reported that username handling in Revive Adserver was still vulnerable to impersonation attacks after the fix for CVE-2025-52672, via several alternate techniques. Homoglyphs based impersonation has been independently reported by other HackerOne users, such as itz_hari_ and khoof. | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-12-02T18:28:26.884Z
Reserved: 2025-08-07T15:00:05.576Z
Link: CVE-2025-55129
Updated: 2025-12-02T14:43:26.572Z
Status : Analyzed
Published: 2025-12-02T02:15:46.987
Modified: 2025-12-30T14:31:58.787
Link: CVE-2025-55129
No data.
OpenCVE Enrichment
Updated: 2025-12-02T11:58:23Z