Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cacti cacti 0.6.1 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2002-1478
Cacti prior to 0.6.8 allows malicious users to execute arbitrary commands via the "Data Input" option in console mode.
The Cacti Group Cacti 0.5
The Cacti Group Cacti 0.6.7
The Cacti Group Cacti 0.6.4
The Cacti Group Cacti 0.6.1
The Cacti Group Cacti 0.6
The Cacti Group Cacti 0.6.6
The Cacti Group Cacti 0.6.5
The Cacti Group Cacti 0.6.3
The Cacti Group Cacti 0.6.8
The Cacti Group Cacti 0.6.2
7.5
CVSSv2
CVE-2011-4824
SQL injection vulnerability in auth_login.php in Cacti prior to 0.8.7h allows remote malicious users to execute arbitrary SQL commands via the login_username parameter.
Cacti Cacti 0.5
Cacti Cacti 0.8.6k
Cacti Cacti 0.8.6d
Cacti Cacti 0.6.3
Cacti Cacti 0.8.7
Cacti Cacti 0.8.5a
Cacti Cacti 0.8.3
Cacti Cacti 0.6.8
Cacti Cacti 0.8.2
Cacti Cacti 0.8.5
Cacti Cacti 0.6.6
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7b
Cacti Cacti 0.8.7a
Cacti Cacti 0.6.2
Cacti Cacti 0.6.5
Cacti Cacti 0.8.6f
Cacti Cacti 0.8.6g
Cacti Cacti 0.8.6j
Cacti Cacti 0.8.7c
Cacti Cacti 0.6.1
Cacti Cacti 0.8
7.5
CVSSv2
CVE-2010-2092
SQL injection vulnerability in graph.php in Cacti 0.8.7e and previous versions allows remote malicious users to execute arbitrary SQL commands via a crafted rra_id parameter in a GET request in conjunction with a valid rra_id value in a POST request or a cookie, which causes the ...
Cacti Cacti 0.5
Cacti Cacti 0.8.6k
Cacti Cacti 0.8.6d
Cacti Cacti 0.6.3
Cacti Cacti 0.8.7
Cacti Cacti 0.8.5a
Cacti Cacti 0.8.3
Cacti Cacti 0.6.8
Cacti Cacti 0.8.2
Cacti Cacti 0.8.5
Cacti Cacti 0.6.6
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7b
Cacti Cacti 0.8.7a
Cacti Cacti 0.6.2
Cacti Cacti 0.6.5
Cacti Cacti 0.8.6f
Cacti Cacti 0.8.6g
Cacti Cacti 0.8.6j
Cacti Cacti 0.8.7c
Cacti Cacti 0.6.1
Cacti Cacti 0.8
7.5
CVSSv2
CVE-2010-1431
SQL injection vulnerability in templates_export.php in Cacti 0.8.7e and previous versions allows remote malicious users to execute arbitrary SQL commands via the export_item_id parameter.
Cacti Cacti 0.5
Cacti Cacti 0.8.6k
Cacti Cacti 0.8.6d
Cacti Cacti 0.6.3
Cacti Cacti 0.8.7
Cacti Cacti 0.8.5a
Cacti Cacti 0.8.3
Cacti Cacti 0.6.8
Cacti Cacti 0.8.2
Cacti Cacti 0.8.5
Cacti Cacti 0.6.6
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7b
Cacti Cacti 0.8.7a
Cacti Cacti 0.6.2
Cacti Cacti 0.6.5
Cacti Cacti 0.8.6f
Cacti Cacti 0.8.6g
Cacti Cacti 0.8.6j
Cacti Cacti 0.8.7c
Cacti Cacti 0.6.1
Cacti Cacti 0.8
1 EDB exploit
7.5
CVSSv2
CVE-2005-1526
PHP remote file inclusion vulnerability in config_settings.php in Cacti prior to 0.8.6e allows remote malicious users to execute arbitrary PHP code via the config[include_path] parameter.
The Cacti Group Cacti 0.5
The Cacti Group Cacti 0.6.7
The Cacti Group Cacti 0.8.2a
The Cacti Group Cacti 0.6.4
The Cacti Group Cacti 0.6.1
The Cacti Group Cacti 0.6
The Cacti Group Cacti 0.8.3a
The Cacti Group Cacti 0.8
The Cacti Group Cacti 0.6.6
The Cacti Group Cacti
The Cacti Group Cacti 0.6.5
The Cacti Group Cacti 0.8.5a
The Cacti Group Cacti 0.8.4
The Cacti Group Cacti 0.8.3
The Cacti Group Cacti 0.8.1
The Cacti Group Cacti 0.8.2
The Cacti Group Cacti 0.6.3
The Cacti Group Cacti 0.6.8
The Cacti Group Cacti 0.6.8a
The Cacti Group Cacti 0.6.2
1 EDB exploit
7.5
CVSSv2
CVE-2005-1525
SQL injection vulnerability in config_settings.php for Cacti prior to 0.8.6e allows remote malicious users to execute arbitrary SQL commands via the id parameter.
The Cacti Group Cacti 0.5
The Cacti Group Cacti 0.6.7
The Cacti Group Cacti 0.8.2a
The Cacti Group Cacti 0.6.4
The Cacti Group Cacti 0.6.1
The Cacti Group Cacti 0.6
The Cacti Group Cacti 0.8.3a
The Cacti Group Cacti 0.8
The Cacti Group Cacti 0.6.6
The Cacti Group Cacti
The Cacti Group Cacti 0.6.5
The Cacti Group Cacti 0.8.5a
The Cacti Group Cacti 0.8.4
The Cacti Group Cacti 0.8.3
The Cacti Group Cacti 0.8.1
The Cacti Group Cacti 0.8.2
The Cacti Group Cacti 0.6.3
The Cacti Group Cacti 0.6.8
The Cacti Group Cacti 0.6.8a
The Cacti Group Cacti 0.6.2
7.5
CVSSv2
CVE-2004-1737
SQL injection vulnerability in auth_login.php in Cacti 0.8.5a allows remote malicious users to execute arbitrary SQL commands and bypass authentication via the (1) username or (2) password parameters.
The Cacti Group Cacti 0.8.5
The Cacti Group Cacti 0.6.7
The Cacti Group Cacti 0.8.2a
The Cacti Group Cacti 0.6.4
The Cacti Group Cacti 0.6.1
The Cacti Group Cacti 0.6
The Cacti Group Cacti 0.8.3a
The Cacti Group Cacti 0.8
The Cacti Group Cacti 0.6.6
The Cacti Group Cacti 0.6.5
The Cacti Group Cacti 0.8.5a
The Cacti Group Cacti 0.8.4
The Cacti Group Cacti 0.8.3
The Cacti Group Cacti 0.8.1
The Cacti Group Cacti 0.8.2
The Cacti Group Cacti 0.6.3
The Cacti Group Cacti 0.6.8
The Cacti Group Cacti 0.6.8a
The Cacti Group Cacti 0.6.2
Gentoo Linux 1.4
1 EDB exploit
7.5
CVSSv2
CVE-2002-1477
graphs.php in Cacti prior to 0.6.8 allows remote authenticated Cacti administrators to execute arbitrary commands via shell metacharacters in the title during edit mode.
The Cacti Group Cacti 0.5
The Cacti Group Cacti 0.6.7
The Cacti Group Cacti 0.6.4
The Cacti Group Cacti 0.6.1
The Cacti Group Cacti 0.6
The Cacti Group Cacti 0.6.6
The Cacti Group Cacti 0.6.5
The Cacti Group Cacti 0.6.3
The Cacti Group Cacti 0.6.8
The Cacti Group Cacti 0.6.2
6.5
CVSSv2
CVE-2010-1645
Cacti prior to 0.8.7f, as used in Red Hat High Performance Computing (HPC) Solution and other products, allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in (1) the FQDN field of a Device or (2) the Vertical Label field of a Graph T...
Cacti Cacti 0.5
Cacti Cacti 0.8.6k
Cacti Cacti 0.8.6d
Cacti Cacti 0.6.3
Cacti Cacti 0.8.7
Cacti Cacti 0.8.5a
Cacti Cacti 0.8.3
Cacti Cacti 0.6.8
Cacti Cacti 0.8.2
Cacti Cacti 0.8.5
Cacti Cacti 0.6.6
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7b
Cacti Cacti 0.8.7a
Cacti Cacti 0.6.2
Cacti Cacti 0.6.5
Cacti Cacti 0.8.6f
Cacti Cacti 0.8.6g
Cacti Cacti 0.8.6j
Cacti Cacti 0.8.7c
Cacti Cacti 0.6.1
Cacti Cacti 0.8
5
CVSSv2
CVE-2005-1524
PHP file inclusion vulnerability in top_graph_header.php in Cacti 0.8.6d and possibly earlier versions allows remote malicious users to execute arbitrary PHP code via the config[library_path] parameter.
The Cacti Group Cacti 0.5
The Cacti Group Cacti 0.6.7
The Cacti Group Cacti 0.8.2a
The Cacti Group Cacti 0.6.4
The Cacti Group Cacti 0.6.1
The Cacti Group Cacti 0.6
The Cacti Group Cacti 0.8.3a
The Cacti Group Cacti 0.8
The Cacti Group Cacti 0.6.6
The Cacti Group Cacti
The Cacti Group Cacti 0.6.5
The Cacti Group Cacti 0.8.5a
The Cacti Group Cacti 0.8.4
The Cacti Group Cacti 0.8.3
The Cacti Group Cacti 0.8.1
The Cacti Group Cacti 0.8.2
The Cacti Group Cacti 0.6.3
The Cacti Group Cacti 0.6.8
The Cacti Group Cacti 0.6.8a
The Cacti Group Cacti 0.6.2
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »