Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
the cacti group cacti 0.8.5a vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2004-1736
Cacti 0.8.5a allows remote malicious users to gain sensitive information via an HTTP request to (1) auth.php, (2) auth_login.php, (3) auth_changepassword.php, and possibly other php files, which reveal the installation path in a PHP error message.
The Cacti Group Cacti 0.8.5a
10
CVSSv2
CVE-2005-2149
config.php in Cacti 0.8.6e and previous versions allows remote malicious users to set the no_http_headers switch, then modify session information to gain privileges and disable the use of addslashes to conduct SQL injection attacks.
The Cacti Group Cacti 0.8.2
The Cacti Group Cacti 0.8.2a
The Cacti Group Cacti 0.8.6a
The Cacti Group Cacti 0.8.6b
The Cacti Group Cacti 0.8.4
The Cacti Group Cacti 0.8.5
The Cacti Group Cacti 0.8.6e
The Cacti Group Cacti 0.8.3
The Cacti Group Cacti 0.8.3a
The Cacti Group Cacti 0.8.6c
The Cacti Group Cacti 0.8.6d
The Cacti Group Cacti 0.8
The Cacti Group Cacti 0.8.1
The Cacti Group Cacti 0.8.5a
The Cacti Group Cacti 0.8.6
7.5
CVSSv2
CVE-2005-2148
Cacti 0.8.6e and previous versions does not perform proper input validation to protect against common attacks, which allows remote malicious users to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in ...
The Cacti Group Cacti 0.8.2a
The Cacti Group Cacti 0.8.3
The Cacti Group Cacti 0.8.1
The Cacti Group Cacti 0.8.2
The Cacti Group Cacti 0.8.6
The Cacti Group Cacti 0.8.6a
The Cacti Group Cacti 0.8.3a
The Cacti Group Cacti 0.8.4
The Cacti Group Cacti 0.8.6e
The Cacti Group Cacti 0.8.6b
The Cacti Group Cacti 0.8.6c
The Cacti Group Cacti 0.8.6d
The Cacti Group Cacti 0.8
The Cacti Group Cacti 0.8.5
The Cacti Group Cacti 0.8.5a
5
CVSSv2
CVE-2005-1524
PHP file inclusion vulnerability in top_graph_header.php in Cacti 0.8.6d and possibly earlier versions allows remote malicious users to execute arbitrary PHP code via the config[library_path] parameter.
The Cacti Group Cacti 0.6
The Cacti Group Cacti 0.6.1
The Cacti Group Cacti 0.6.8
The Cacti Group Cacti 0.6.8a
The Cacti Group Cacti 0.8.4
The Cacti Group Cacti 0.8.5a
The Cacti Group Cacti
The Cacti Group Cacti 0.6.4
The Cacti Group Cacti 0.6.5
The Cacti Group Cacti 0.8.2
The Cacti Group Cacti 0.8.2a
The Cacti Group Cacti 0.5
The Cacti Group Cacti 0.6.6
The Cacti Group Cacti 0.6.7
The Cacti Group Cacti 0.8.3
The Cacti Group Cacti 0.8.3a
The Cacti Group Cacti 0.6.2
The Cacti Group Cacti 0.6.3
The Cacti Group Cacti 0.8
The Cacti Group Cacti 0.8.1
2 EDB exploits
7.5
CVSSv2
CVE-2005-1526
PHP remote file inclusion vulnerability in config_settings.php in Cacti prior to 0.8.6e allows remote malicious users to execute arbitrary PHP code via the config[include_path] parameter.
The Cacti Group Cacti 0.6
The Cacti Group Cacti 0.6.1
The Cacti Group Cacti 0.6.8
The Cacti Group Cacti 0.6.8a
The Cacti Group Cacti 0.8.4
The Cacti Group Cacti 0.8.5a
The Cacti Group Cacti 0.6.4
The Cacti Group Cacti 0.6.5
The Cacti Group Cacti 0.8.2
The Cacti Group Cacti 0.8.2a
The Cacti Group Cacti 0.5
The Cacti Group Cacti 0.6.6
The Cacti Group Cacti 0.6.7
The Cacti Group Cacti 0.8.3
The Cacti Group Cacti 0.8.3a
The Cacti Group Cacti 0.6.2
The Cacti Group Cacti 0.6.3
The Cacti Group Cacti 0.8
The Cacti Group Cacti 0.8.1
The Cacti Group Cacti
1 EDB exploit
7.5
CVSSv2
CVE-2005-1525
SQL injection vulnerability in config_settings.php for Cacti prior to 0.8.6e allows remote malicious users to execute arbitrary SQL commands via the id parameter.
The Cacti Group Cacti 0.6.4
The Cacti Group Cacti 0.6.5
The Cacti Group Cacti 0.8.2
The Cacti Group Cacti 0.8.2a
The Cacti Group Cacti 0.6
The Cacti Group Cacti 0.6.1
The Cacti Group Cacti 0.6.8
The Cacti Group Cacti 0.6.8a
The Cacti Group Cacti 0.8.4
The Cacti Group Cacti 0.8.5a
The Cacti Group Cacti 0.6.2
The Cacti Group Cacti 0.6.3
The Cacti Group Cacti 0.8
The Cacti Group Cacti 0.8.1
The Cacti Group Cacti
The Cacti Group Cacti 0.5
The Cacti Group Cacti 0.6.6
The Cacti Group Cacti 0.6.7
The Cacti Group Cacti 0.8.3
The Cacti Group Cacti 0.8.3a
7.5
CVSSv2
CVE-2004-1737
SQL injection vulnerability in auth_login.php in Cacti 0.8.5a allows remote malicious users to execute arbitrary SQL commands and bypass authentication via the (1) username or (2) password parameters.
The Cacti Group Cacti 0.6.5
The Cacti Group Cacti 0.6.6
The Cacti Group Cacti 0.8.2a
The Cacti Group Cacti 0.8.3
The Cacti Group Cacti 0.6.3
The Cacti Group Cacti 0.6.4
The Cacti Group Cacti 0.8.1
The Cacti Group Cacti 0.8.2
The Cacti Group Cacti 0.6.1
The Cacti Group Cacti 0.6.2
The Cacti Group Cacti 0.6.8a
The Cacti Group Cacti 0.8
The Cacti Group Cacti 0.8.5
The Cacti Group Cacti 0.8.5a
The Cacti Group Cacti 0.6
The Cacti Group Cacti 0.6.7
The Cacti Group Cacti 0.6.8
The Cacti Group Cacti 0.8.3a
The Cacti Group Cacti 0.8.4
Gentoo Linux 1.4
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started