Improper sanitization of parameter jaction in Titan SpamTitan 7.07 allows PHP code evaluation
Reporter | Title | Published | Views | Family All 5 |
---|---|---|---|---|
![]() | CVE-2020-11803 | 17 Sep 202017:15 | – | cve |
![]() | Input validation | 17 Sep 202017:15 | – | prion |
![]() | CVE-2020-11803 | 17 Sep 202017:15 | – | nvd |
![]() | SpamTitan 7.07 Remote Code Execution | 18 Sep 202000:00 | – | packetstorm |
![]() | SpamTitan 7.07 - Remote Code Execution (Authenticated) | 18 Sep 202000:00 | – | exploitdb |
Source | Link |
---|---|
www.twitter.com/felmoltor | |
spamtitan | www.spamtitan.com/ |
sensepost | www.sensepost.com/blog/2020/clash-of-the-spamtitan/ |
packetstormsecurity | www.packetstormsecurity.com/files/159218/SpamTitan-7.07-Remote-Code-Execution.html |
github | www.github.com/felmoltor |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo