Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://hackerone.com/reports/3470970 |
|
Sat, 18 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Reflected XSS in Revive Adserver Administrator Scripts |
Fri, 30 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aquaplatform
Aquaplatform revive Adserver |
|
| CPEs | cpe:2.3:a:aquaplatform:revive_adserver:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Aquaplatform
Aquaplatform revive Adserver |
Wed, 21 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
ssvc
|
Wed, 21 Jan 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Revive
Revive adserver |
|
| Vendors & Products |
Revive
Revive adserver |
Tue, 20 Jan 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HackerOne community member Patrick Lang (7yr) has reported a reflected XSS vulnerability in the `banner-acl.php` and `channel-acl.php` scripts of Revive Adserver. An attacker can craft a specific URL that includes an HTML payload in a parameter. If a logged in administrator visits the URL, the HTML is sent to the browser and malicious scripts would be executed. | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2026-01-21T20:47:21.691Z
Reserved: 2026-01-01T15:00:02.340Z
Link: CVE-2026-21642
Updated: 2026-01-21T20:47:15.102Z
Status : Analyzed
Published: 2026-01-20T21:16:06.310
Modified: 2026-01-30T20:14:51.447
Link: CVE-2026-21642
No data.
OpenCVE Enrichment
Updated: 2026-04-18T20:00:09Z