Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cacti cacti 0.8.7e vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2009-4032
Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.7e allow remote malicious users to inject arbitrary web script or HTML via vectors related to (1) graph.php, (2) include/top_graph_header.php, (3) lib/html_form.php, and (4) lib/timespan_settings.php, as demonstrate...
Cacti Cacti 0.8.7e
2 EDB exploits
7.5
CVSSv2
CVE-2014-5261
The graph settings script (graph_settings.php) in Cacti 0.8.8b and previous versions allows remote malicious users to execute arbitrary commands via shell metacharacters in a font size, related to the rrdtool commandline in lib/rrd.php.
Cacti Cacti 0.8.7f
Cacti Cacti 0.8.7e
Cacti Cacti 0.8.7i
Cacti Cacti 0.8.7g
Cacti Cacti 0.8.7
Cacti Cacti 0.8.6e
Cacti Cacti
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7c
Cacti Cacti 0.8.8a
Cacti Cacti 0.8.8
Cacti Cacti 0.8.7b
Cacti Cacti 0.8.7a
7.5
CVSSv2
CVE-2014-5262
SQL injection vulnerability in the graph settings script (graph_settings.php) in Cacti 0.8.8b and previous versions allows remote malicious users to execute arbitrary SQL commands via unspecified vectors.
Cacti Cacti
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7c
Cacti Cacti 0.8.7b
Cacti Cacti 0.8.7f
Cacti Cacti 0.8.7e
Cacti Cacti 0.8.8a
Cacti Cacti 0.8.8
Cacti Cacti 0.8.7a
Cacti Cacti 0.8.7
Cacti Cacti 0.8.7i
Cacti Cacti 0.8.7g
Cacti Cacti 0.8.6e
7.5
CVSSv2
CVE-2010-1431
SQL injection vulnerability in templates_export.php in Cacti 0.8.7e and previous versions allows remote malicious users to execute arbitrary SQL commands via the export_item_id parameter.
Cacti Cacti 0.8.5a
Cacti Cacti 0.8.5
Cacti Cacti 0.8.7
Cacti Cacti
Cacti Cacti 0.8.6d
Cacti Cacti 0.8.6b
Cacti Cacti 0.6.3
Cacti Cacti 0.6.2
Cacti Cacti 0.6.7
Cacti Cacti 0.8
Cacti Cacti 0.8.4
Cacti Cacti 0.8.3a
Cacti Cacti 0.8.6h
Cacti Cacti 0.8.6g
Cacti Cacti 0.6.5
Cacti Cacti 0.6.4
Cacti Cacti 0.8.6j
Cacti Cacti 0.8.7a
Cacti Cacti 0.8.6f
Cacti Cacti 0.8.6c
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7c
1 EDB exploit
7.5
CVSSv2
CVE-2013-1434
Multiple SQL injection vulnerabilities in (1) api_poller.php and (2) utility.php in Cacti prior to 0.8.8b allow remote malicious users to execute arbitrary SQL commands via unspecified vectors.
Cacti Cacti 0.8.7b
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7e
Cacti Cacti 0.8.6d
Cacti Cacti 0.8.6f
Cacti Cacti 0.8.5a
Cacti Cacti
Cacti Cacti 0.8.7i
Cacti Cacti 0.8.6
Cacti Cacti 0.8.6a
Cacti Cacti 0.8.6i
Cacti Cacti 0.8.6j
Cacti Cacti 0.8.7
Cacti Cacti 0.8.7a
Cacti Cacti 0.8.6b
Cacti Cacti 0.8.6c
Cacti Cacti 0.8.6k
Cacti Cacti 0.8.5
Cacti Cacti 0.8.8
Cacti Cacti 0.8.7g
Cacti Cacti 0.8.6e
Cacti Cacti 0.8.6g
7.5
CVSSv2
CVE-2013-1435
(1) snmp.php and (2) rrd.php in Cacti prior to 0.8.8b allows remote malicious users to execute arbitrary commands via shell metacharacters in unspecified vectors.
Cacti Cacti 0.8
Cacti Cacti 0.8.1
Cacti Cacti 0.8.6
Cacti Cacti 0.8.6a
Cacti Cacti 0.8.6h
Cacti Cacti 0.8.6i
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7e
Cacti Cacti 0.8.7f
Cacti Cacti 0.8.2
Cacti Cacti 0.8.2a
Cacti Cacti 0.8.3
Cacti Cacti 0.8.6b
Cacti Cacti 0.8.6c
Cacti Cacti 0.8.6j
Cacti Cacti 0.8.6k
Cacti Cacti 0.8.7g
Cacti Cacti 0.8.7h
Cacti Cacti 0.8.3a
Cacti Cacti 0.8.4
Cacti Cacti 0.8.6d
Cacti Cacti 0.8.6e
4.3
CVSSv2
CVE-2013-5588
Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b and previous versions allow remote malicious users to inject arbitrary web script or HTML via (1) the step parameter to install/index.php or (2) the id parameter to cacti/host.php.
Cacti Cacti 0.8.8
Cacti Cacti 0.8
Cacti Cacti 0.8.1
Cacti Cacti 0.8.2
Cacti Cacti 0.8.6g
Cacti Cacti 0.8.6h
Cacti Cacti 0.8.6i
Cacti Cacti 0.8.6j
Cacti Cacti 0.8.5a
Cacti Cacti 0.8.6
Cacti Cacti 0.8.6a
Cacti Cacti 0.8.6b
Cacti Cacti 0.8.7c
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7e
Cacti Cacti 0.8.7f
Cacti Cacti 0.8.7g
Cacti Cacti
Cacti Cacti 0.8.2a
Cacti Cacti 0.8.3a
Cacti Cacti 0.8.5
Cacti Cacti 0.8.6c
7.5
CVSSv2
CVE-2013-5589
SQL injection vulnerability in cacti/host.php in Cacti 0.8.8b and previous versions allows remote malicious users to execute arbitrary SQL commands via the id parameter.
Debian Debian Linux 7.0
Cacti Cacti 0.8.3
Cacti Cacti 0.8.3a
Cacti Cacti 0.8.6c
Cacti Cacti 0.8.6d
Cacti Cacti 0.8.7
Cacti Cacti 0.8.7a
Cacti Cacti 0.8.7h
Cacti Cacti 0.8.7i
Cacti Cacti 0.8
Cacti Cacti 0.8.1
Cacti Cacti 0.8.5a
Cacti Cacti 0.8.6
Cacti Cacti 0.8.6g
Cacti Cacti 0.8.6h
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7e
Cacti Cacti 0.8.2
Cacti Cacti 0.8.2a
Cacti Cacti 0.8.6a
Cacti Cacti 0.8.6b
Cacti Cacti 0.8.6i
4.3
CVSSv2
CVE-2011-5223
Cross-site request forgery (CSRF) vulnerability in logout.php in Cacti prior to 0.8.7i allows remote malicious users to hijack the authentication of unspecified victims via unknown vectors.
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7c
Cacti Cacti 0.8.6g
Cacti Cacti 0.8.6c
Cacti Cacti 0.8.5
Cacti Cacti 0.8.4
Cacti Cacti 0.6.8
Cacti Cacti 0.6.7
Cacti Cacti 0.6.6
Cacti Cacti 0.5
Cacti Cacti 0.8.7b
Cacti Cacti 0.8.7a
Cacti Cacti 0.8.7
Cacti Cacti 0.8.6h
Cacti Cacti 0.8.6k
Cacti Cacti 0.8.3
Cacti Cacti 0.8.3a
Cacti Cacti 0.6.5
Cacti Cacti 0.6.4
Cacti Cacti
Cacti Cacti 0.8.7g
Cacti Cacti 0.8.6a
4.3
CVSSv2
CVE-2010-2544
Cross-site scripting (XSS) vulnerability in utilities.php in Cacti prior to 0.8.7g, as used in Red Hat High Performance Computing (HPC) Solution and other products, allows remote malicious users to inject arbitrary web script or HTML via the filter parameter.
Cacti Cacti 0.5
Cacti Cacti 0.8.6k
Cacti Cacti 0.8.6d
Cacti Cacti 0.6.3
Cacti Cacti
Cacti Cacti 0.8.7
Cacti Cacti 0.8.5a
Cacti Cacti 0.8.3
Cacti Cacti 0.6.8
Cacti Cacti 0.8.2
Cacti Cacti 0.8.5
Cacti Cacti 0.6.6
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7b
Cacti Cacti 0.8.7a
Cacti Cacti 0.6.2
Cacti Cacti 0.6.5
Cacti Cacti 0.8.6f
Cacti Cacti 0.8.6g
Cacti Cacti 0.8.6j
Cacti Cacti 0.8.7c
Cacti Cacti 0.6.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »