Titanhq

Spamtitan

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.39%
  • Veröffentlicht 21.08.2025 00:00:00
  • Zuletzt bearbeitet 03.11.2025 20:16:30

An issue was discovered in TitanHQ SpamTitan Email Security Gateway 8.00.x before 8.00.101 and 8.01.x before 8.01.14. The file quarantine.php within the SpamTitan interface allows unauthenticated users to trigger account-level actions using a crafted...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 23.12.2020 03:15:13
  • Zuletzt bearbeitet 21.11.2024 05:27:46

SpamTitan before 7.09 allows attackers to tamper with backups, because backups are not encrypted.

Exploit
  • EPSS 3.57%
  • Veröffentlicht 17.09.2020 17:15:16
  • Zuletzt bearbeitet 21.11.2024 05:14:21

A sandbox escape issue was discovered in TitanHQ SpamTitan Gateway 7.07. It limits the admin user to a restricted shell, allowing execution of a small number of tools of the operating system. This restricted shell can be bypassed after changing the p...

Exploit
  • EPSS 13.97%
  • Veröffentlicht 17.09.2020 17:15:15
  • Zuletzt bearbeitet 21.11.2024 04:58:25

An issue was discovered in Titan SpamTitan 7.07. Improper sanitization of the parameter fname, used on the page certs-x.php, would allow an attacker to retrieve the contents of arbitrary files. The user has to be authenticated before interacting with...

Exploit
  • EPSS 8.72%
  • Veröffentlicht 17.09.2020 17:15:15
  • Zuletzt bearbeitet 21.11.2024 04:58:39

An issue was discovered in Titan SpamTitan 7.07. Improper sanitization of the parameter jaction when interacting with the page mailqueue.php could lead to PHP code evaluation server-side, because the user-provided input is passed directly to the php ...

Exploit
  • EPSS 7.55%
  • Veröffentlicht 17.09.2020 17:15:15
  • Zuletzt bearbeitet 21.11.2024 04:58:39

An issue was discovered in Titan SpamTitan 7.07. Due to improper sanitization of the parameter quid, used in the page mailqueue.php, code injection can occur. The input for this parameter is provided directly by an authenticated user via an HTTP GET ...

Exploit
  • EPSS 1.17%
  • Veröffentlicht 17.09.2020 17:15:15
  • Zuletzt bearbeitet 21.11.2024 05:14:21

A sandbox escape issue was discovered in TitanHQ SpamTitan Gateway 7.07. It limits the admin user to a restricted shell, allowing execution of a small number of tools of the operating system. The restricted shell can be bypassed by presenting a fake ...

Exploit
  • EPSS 83.12%
  • Veröffentlicht 17.09.2020 17:15:14
  • Zuletzt bearbeitet 21.11.2024 04:58:25

An issue was discovered in Titan SpamTitan 7.07. Improper input sanitization of the parameter community on the page snmp-x.php would allow a remote attacker to inject commands into the file snmpd.conf that would allow executing commands on the target...

Exploit
  • EPSS 16.57%
  • Veröffentlicht 17.09.2020 17:15:14
  • Zuletzt bearbeitet 21.11.2024 04:58:25

An issue was discovered in Titan SpamTitan 7.07. Improper validation of the parameter fname on the page certs-x.php would allow an attacker to execute remote code on the target server. The user has to be authenticated before interacting with this pag...

Exploit
  • EPSS 0.69%
  • Veröffentlicht 05.06.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:47:11

In TitanHQ SpamTitan through 7.03, a vulnerability exists in the spam rule update function. Updates are downloaded over HTTP, including scripts which are subsequently executed with root permissions. An attacker with a privileged network position is t...