Show filters
19 Total Results
Displaying 11-19 of 19
Sort by:
Attacker Value
Unknown

CVE-2019-19014

Disclosure Date: December 02, 2019 (last updated November 27, 2024)
An issue was discovered in TitanHQ WebTitan before 5.18. It has a sudoers file that enables low-privilege users to execute a vast number of commands as root, including mv, chown, and chmod. This can be trivially exploited to gain root privileges by an attacker with access.
Attacker Value
Unknown

CVE-2019-19021

Disclosure Date: December 02, 2019 (last updated November 27, 2024)
An issue was discovered in TitanHQ WebTitan before 5.18. It has a hidden support account (with a hard-coded password) in the web administration interface, with administrator privileges. Anybody can log in with this account.
Attacker Value
Unknown

CVE-2019-19016

Disclosure Date: December 02, 2019 (last updated November 27, 2024)
An issue was discovered in TitanHQ WebTitan before 5.18. Some functions, such as /history-x.php, of the administration interface are vulnerable to SQL Injection through the results parameter. This could be used by an attacker to extract sensitive information from the appliance database.
Attacker Value
Unknown

CVE-2019-19017

Disclosure Date: December 02, 2019 (last updated November 27, 2024)
An issue was discovered in TitanHQ WebTitan before 5.18. The appliance has a hard-coded root password set during installation. An attacker could utilize this to gain root privileges on the system.
Attacker Value
Unknown

CVE-2019-19015

Disclosure Date: December 02, 2019 (last updated November 27, 2024)
An issue was discovered in TitanHQ WebTitan before 5.18. The proxy service (which is typically exposed to all users) allows connections to the internal PostgreSQL database of the appliance. By connecting to the database through the proxy (without password authentication), an attacker is able to fully control the appliance database. Through this, several different paths exist to gain further access, or execute code.
Attacker Value
Unknown

CVE-2019-19019

Disclosure Date: July 31, 2019 (last updated November 27, 2024)
An issue was discovered in TitanHQ WebTitan before 5.18. It contains a Remote Code Execution issue through which an attacker can execute arbitrary code as root. The issue stems from the hotfix download mechanism, which downloads a shell script via HTTP, and then executes it as root. This is analogous to CVE-2019-6800 but for a different product.
Attacker Value
Unknown

CVE-2019-6800

Disclosure Date: June 05, 2019 (last updated November 27, 2024)
In TitanHQ SpamTitan through 7.03, a vulnerability exists in the spam rule update function. Updates are downloaded over HTTP, including scripts which are subsequently executed with root permissions. An attacker with a privileged network position is trivially able to inject arbitrary commands.
0
Attacker Value
Unknown

CVE-2018-15136

Disclosure Date: January 30, 2019 (last updated November 27, 2024)
TitanHQ SpamTitan before 7.01 has Improper input validation. This allows internal attackers to bypass the anti-spam filter to send malicious emails to an entire organization by modifying the URL requests sent to the application.
0
Attacker Value
Unknown

CVE-2017-18227

Disclosure Date: March 12, 2018 (last updated November 26, 2024)
TitanHQ WebTitan Gateway has incorrect certificate validation for the TLS interception feature.
0