Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cacti cacti 0.8.3 vulnerabilities and exploits
(subscribe to this query)
905
VMScore
CVE-2009-4112
Cacti 0.8.7e and previous versions allows remote authenticated administrators to gain privileges by modifying the "Data Input Method" for the "Linux - Get Memory Usage" setting to contain arbitrary commands.
Cacti Cacti 0.8.6f
Cacti Cacti 0.8.6c
Cacti Cacti 0.8.2
Cacti Cacti 0.8.1
Cacti Cacti 0.8.5a
Cacti Cacti 0.8.5
Cacti Cacti 0.8
Cacti Cacti 0.6.7
Cacti Cacti 0.8.4
Cacti Cacti 0.8.3a
Cacti Cacti 0.8.7a
Cacti Cacti
Cacti Cacti 0.8.7
Cacti Cacti 0.8.6i
Cacti Cacti 0.8.3
Cacti Cacti 0.8.2a
1 EDB exploit
890
VMScore
CVE-2005-2149
config.php in Cacti 0.8.6e and previous versions allows remote malicious users to set the no_http_headers switch, then modify session information to gain privileges and disable the use of addslashes to conduct SQL injection attacks.
The Cacti Group Cacti 0.8.2
The Cacti Group Cacti 0.8.2a
The Cacti Group Cacti 0.8.6a
The Cacti Group Cacti 0.8.6b
The Cacti Group Cacti 0.8.4
The Cacti Group Cacti 0.8.5
The Cacti Group Cacti 0.8.6e
The Cacti Group Cacti 0.8.3
The Cacti Group Cacti 0.8.3a
The Cacti Group Cacti 0.8.6c
The Cacti Group Cacti 0.8.6d
The Cacti Group Cacti 0.8
The Cacti Group Cacti 0.8.1
The Cacti Group Cacti 0.8.5a
The Cacti Group Cacti 0.8.6
770
VMScore
CVE-2008-0785
Multiple SQL injection vulnerabilities in Cacti 0.8.7 prior to 0.8.7b and 0.8.6 prior to 0.8.6k allow remote authenticated users to execute arbitrary SQL commands via the (1) graph_list parameter to graph_view.php, (2) leaf_id and id parameters to tree.php, (3) local_graph_id par...
Cacti Cacti 0.8.1
Cacti Cacti 0.8.2
Cacti Cacti 0.8.6f
Cacti Cacti 0.8.6i
Cacti Cacti 0.6.7
Cacti Cacti 0.8
Cacti Cacti 0.8.5a
Cacti Cacti 0.8.6c
Cacti Cacti 0.8.3a
Cacti Cacti 0.8.4
Cacti Cacti 0.8.5
Cacti Cacti 0.8.7a
Cacti Cacti 0.8.2a
Cacti Cacti 0.8.3
Cacti Cacti 0.8.6j
Cacti Cacti 0.8.7
4 EDB exploits
755
VMScore
CVE-2010-1431
SQL injection vulnerability in templates_export.php in Cacti 0.8.7e and previous versions allows remote malicious users to execute arbitrary SQL commands via the export_item_id parameter.
Cacti Cacti 0.8.5a
Cacti Cacti 0.8.5
Cacti Cacti 0.8.7
Cacti Cacti
Cacti Cacti 0.8.6d
Cacti Cacti 0.8.6b
Cacti Cacti 0.6.3
Cacti Cacti 0.6.2
Cacti Cacti 0.6.7
Cacti Cacti 0.8
Cacti Cacti 0.8.4
Cacti Cacti 0.8.3a
Cacti Cacti 0.8.6h
Cacti Cacti 0.8.6g
Cacti Cacti 0.6.5
Cacti Cacti 0.6.4
Cacti Cacti 0.8.6j
Cacti Cacti 0.8.7a
Cacti Cacti 0.8.6f
Cacti Cacti 0.8.6c
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7c
1 EDB exploit
755
VMScore
CVE-2005-1526
PHP remote file inclusion vulnerability in config_settings.php in Cacti prior to 0.8.6e allows remote malicious users to execute arbitrary PHP code via the config[include_path] parameter.
The Cacti Group Cacti 0.6
The Cacti Group Cacti 0.6.1
The Cacti Group Cacti 0.6.8
The Cacti Group Cacti 0.6.8a
The Cacti Group Cacti 0.8.4
The Cacti Group Cacti 0.8.5a
The Cacti Group Cacti 0.6.4
The Cacti Group Cacti 0.6.5
The Cacti Group Cacti 0.8.2
The Cacti Group Cacti 0.8.2a
The Cacti Group Cacti 0.5
The Cacti Group Cacti 0.6.6
The Cacti Group Cacti 0.6.7
The Cacti Group Cacti 0.8.3
The Cacti Group Cacti 0.8.3a
The Cacti Group Cacti 0.6.2
The Cacti Group Cacti 0.6.3
The Cacti Group Cacti 0.8
The Cacti Group Cacti 0.8.1
The Cacti Group Cacti
1 EDB exploit
755
VMScore
CVE-2004-1737
SQL injection vulnerability in auth_login.php in Cacti 0.8.5a allows remote malicious users to execute arbitrary SQL commands and bypass authentication via the (1) username or (2) password parameters.
The Cacti Group Cacti 0.6.5
The Cacti Group Cacti 0.6.6
The Cacti Group Cacti 0.8.2a
The Cacti Group Cacti 0.8.3
The Cacti Group Cacti 0.6.3
The Cacti Group Cacti 0.6.4
The Cacti Group Cacti 0.8.1
The Cacti Group Cacti 0.8.2
The Cacti Group Cacti 0.6.1
The Cacti Group Cacti 0.6.2
The Cacti Group Cacti 0.6.8a
The Cacti Group Cacti 0.8
The Cacti Group Cacti 0.8.5
The Cacti Group Cacti 0.8.5a
The Cacti Group Cacti 0.6
The Cacti Group Cacti 0.6.7
The Cacti Group Cacti 0.6.8
The Cacti Group Cacti 0.8.3a
The Cacti Group Cacti 0.8.4
Gentoo Linux 1.4
1 EDB exploit
668
VMScore
CVE-2013-5589
SQL injection vulnerability in cacti/host.php in Cacti 0.8.8b and previous versions allows remote malicious users to execute arbitrary SQL commands via the id parameter.
Debian Debian Linux 7.0
Cacti Cacti 0.8.3
Cacti Cacti 0.8.3a
Cacti Cacti 0.8.6c
Cacti Cacti 0.8.6d
Cacti Cacti 0.8.7
Cacti Cacti 0.8.7a
Cacti Cacti 0.8.7h
Cacti Cacti 0.8.7i
Cacti Cacti 0.8
Cacti Cacti 0.8.1
Cacti Cacti 0.8.5a
Cacti Cacti 0.8.6
Cacti Cacti 0.8.6g
Cacti Cacti 0.8.6h
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7e
Cacti Cacti 0.8.2
Cacti Cacti 0.8.2a
Cacti Cacti 0.8.6a
Cacti Cacti 0.8.6b
Cacti Cacti 0.8.6i
668
VMScore
CVE-2013-1435
(1) snmp.php and (2) rrd.php in Cacti prior to 0.8.8b allows remote malicious users to execute arbitrary commands via shell metacharacters in unspecified vectors.
Cacti Cacti 0.8
Cacti Cacti 0.8.1
Cacti Cacti 0.8.6
Cacti Cacti 0.8.6a
Cacti Cacti 0.8.6h
Cacti Cacti 0.8.6i
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7e
Cacti Cacti 0.8.7f
Cacti Cacti 0.8.2
Cacti Cacti 0.8.2a
Cacti Cacti 0.8.3
Cacti Cacti 0.8.6b
Cacti Cacti 0.8.6c
Cacti Cacti 0.8.6j
Cacti Cacti 0.8.6k
Cacti Cacti 0.8.7g
Cacti Cacti 0.8.7h
Cacti Cacti 0.8.3a
Cacti Cacti 0.8.4
Cacti Cacti 0.8.6d
Cacti Cacti 0.8.6e
668
VMScore
CVE-2011-4824
SQL injection vulnerability in auth_login.php in Cacti prior to 0.8.7h allows remote malicious users to execute arbitrary SQL commands via the login_username parameter.
Cacti Cacti 0.8.7e
Cacti Cacti 0.8.7
Cacti Cacti 0.8.6c
Cacti Cacti 0.8.6h
Cacti Cacti 0.8.3a
Cacti Cacti 0.8.7d
Cacti Cacti 0.6.8a
Cacti Cacti 0.6.8
Cacti Cacti 0.6.3
Cacti Cacti 0.8
Cacti Cacti 0.8.6b
Cacti Cacti 0.8.5
Cacti Cacti 0.8.2a
Cacti Cacti 0.8.7b
Cacti Cacti 0.5
Cacti Cacti 0.8.6j
Cacti Cacti 0.8.1
Cacti Cacti 0.6.5
Cacti Cacti 0.8.6f
Cacti Cacti 0.8.6d
Cacti Cacti 0.8.6g
Cacti Cacti 0.8.4
668
VMScore
CVE-2010-2092
SQL injection vulnerability in graph.php in Cacti 0.8.7e and previous versions allows remote malicious users to execute arbitrary SQL commands via a crafted rra_id parameter in a GET request in conjunction with a valid rra_id value in a POST request or a cookie, which causes the ...
Cacti Cacti 0.6.6
Cacti Cacti 0.6.7
Cacti Cacti 0.8.3
Cacti Cacti 0.8.3a
Cacti Cacti 0.8.6d
Cacti Cacti 0.8.6f
Cacti Cacti 0.8.7a
Cacti Cacti 0.8.7b
Cacti Cacti 0.6.4
Cacti Cacti 0.6.5
Cacti Cacti 0.8.2
Cacti Cacti 0.8.2a
Cacti Cacti 0.8.6b
Cacti Cacti 0.8.6c
Cacti Cacti 0.8.6k
Cacti Cacti 0.8.7
Cacti Cacti 0.6
Cacti Cacti 0.6.1
Cacti Cacti 0.6.8
Cacti Cacti 0.6.8a
Cacti Cacti 0.8.4
Cacti Cacti 0.8.5
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »