Логотип exploitDog
bind:CVE-2020-11803
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-11803

Количество 2

Количество 2

nvd логотип

CVE-2020-11803

больше 5 лет назад

An issue was discovered in Titan SpamTitan 7.07. Improper sanitization of the parameter jaction when interacting with the page mailqueue.php could lead to PHP code evaluation server-side, because the user-provided input is passed directly to the php eval() function. The user has to be authenticated on the web platform before interacting with the page.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-hfpp-6hrw-77h9

больше 3 лет назад

An issue was discovered in Titan SpamTitan 7.07. Improper sanitization of the parameter jaction when interacting with the page mailqueue.php could lead to PHP code evaluation server-side, because the user-provided input is passed directly to the php eval() function. The user has to be authenticated on the web platform before interacting with the page.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-11803

An issue was discovered in Titan SpamTitan 7.07. Improper sanitization of the parameter jaction when interacting with the page mailqueue.php could lead to PHP code evaluation server-side, because the user-provided input is passed directly to the php eval() function. The user has to be authenticated on the web platform before interacting with the page.

CVSS3: 8.8
9%
Низкий
больше 5 лет назад
github логотип
GHSA-hfpp-6hrw-77h9

An issue was discovered in Titan SpamTitan 7.07. Improper sanitization of the parameter jaction when interacting with the page mailqueue.php could lead to PHP code evaluation server-side, because the user-provided input is passed directly to the php eval() function. The user has to be authenticated on the web platform before interacting with the page.

9%
Низкий
больше 3 лет назад

Уязвимостей на страницу