An SQL-injection vulnerability was recently discovered and reported
to the Revive Adserver team by Florian Sander. The vulnerability is
known to be already exploited to gain unauthorised access to the
application using brute force mechanisms, however other kind of
attacks might be possible and/or already in use. The risk is rated
to be critical as the most common end goal of the attackers is to
spread malware to the visitors of all the websites and ad networks
that the ad server is being used on.
The vulnerability is also present and exploitable in OpenX Source
2.8.11 and earlier versions, potentially back to phpAdsNew 2.0.x.