Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cacti cacti 0.8.7g vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2014-5261
The graph settings script (graph_settings.php) in Cacti 0.8.8b and previous versions allows remote malicious users to execute arbitrary commands via shell metacharacters in a font size, related to the rrdtool commandline in lib/rrd.php.
Cacti Cacti 0.8.7
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7b
Cacti Cacti 0.8.6e
Cacti Cacti 0.8.7a
Cacti Cacti 0.8.8
Cacti Cacti 0.8.8a
Cacti Cacti 0.8.7c
Cacti Cacti 0.8.7f
Cacti Cacti 0.8.7e
Cacti Cacti 0.8.7i
Cacti Cacti
Cacti Cacti 0.8.7g
7.5
CVSSv2
CVE-2014-5262
SQL injection vulnerability in the graph settings script (graph_settings.php) in Cacti 0.8.8b and previous versions allows remote malicious users to execute arbitrary SQL commands via unspecified vectors.
Cacti Cacti 0.8.7
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7b
Cacti Cacti 0.8.6e
Cacti Cacti 0.8.7a
Cacti Cacti 0.8.8
Cacti Cacti 0.8.8a
Cacti Cacti 0.8.7c
Cacti Cacti 0.8.7f
Cacti Cacti 0.8.7e
Cacti Cacti 0.8.7i
Cacti Cacti
Cacti Cacti 0.8.7g
7.5
CVSSv2
CVE-2014-2709
lib/rrd.php in Cacti 0.8.7g, 0.8.8b, and previous versions allows remote malicious users to execute arbitrary commands via shell metacharacters in unspecified parameters.
Cacti Cacti
Debian Debian Linux 8.0
Debian Debian Linux 7.0
7.5
CVSSv2
CVE-2014-2708
Multiple SQL injection vulnerabilities in graph_xport.php in Cacti 0.8.7g, 0.8.8b, and previous versions allow remote malicious users to execute arbitrary SQL commands via the (1) graph_start, (2) graph_end, (3) graph_height, (4) graph_width, (5) graph_nolegend, (6) print_source,...
Cacti Cacti 0.8.8b
7.5
CVSSv2
CVE-2013-5589
SQL injection vulnerability in cacti/host.php in Cacti 0.8.8b and previous versions allows remote malicious users to execute arbitrary SQL commands via the id parameter.
Debian Debian Linux 7.0
Cacti Cacti 0.8.6k
Cacti Cacti 0.8.6d
Cacti Cacti 0.8.7
Cacti Cacti 0.8.5a
Cacti Cacti 0.8.3
Cacti Cacti 0.8.2
Cacti Cacti 0.8.5
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7b
Cacti Cacti 0.8.6e
Cacti Cacti 0.8.7a
Cacti Cacti 0.8.8
Cacti Cacti 0.8.8a
Cacti Cacti 0.8.6f
Cacti Cacti 0.8.6g
Cacti Cacti 0.8.6j
Cacti Cacti 0.8.7h
Cacti Cacti 0.8.7c
Cacti Cacti 0.8
Cacti Cacti 0.8.7f
Cacti Cacti 0.8.7e
7.5
CVSSv2
CVE-2013-1434
Multiple SQL injection vulnerabilities in (1) api_poller.php and (2) utility.php in Cacti prior to 0.8.8b allow remote malicious users to execute arbitrary SQL commands via unspecified vectors.
Cacti Cacti 0.8.6k
Cacti Cacti 0.8.6d
Cacti Cacti 0.8.7
Cacti Cacti 0.8.5a
Cacti Cacti 0.8.5
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7b
Cacti Cacti 0.8.6e
Cacti Cacti 0.8.7a
Cacti Cacti 0.8.8
Cacti Cacti 0.8.6f
Cacti Cacti 0.8.6g
Cacti Cacti 0.8.6j
Cacti Cacti 0.8.7e
Cacti Cacti 0.8.6a
Cacti Cacti 0.8.6i
Cacti Cacti 0.8.6
Cacti Cacti
Cacti Cacti 0.8.7i
Cacti Cacti 0.8.6c
Cacti Cacti 0.8.6b
Cacti Cacti 0.8.7g
7.5
CVSSv2
CVE-2013-1435
(1) snmp.php and (2) rrd.php in Cacti prior to 0.8.8b allows remote malicious users to execute arbitrary commands via shell metacharacters in unspecified vectors.
Cacti Cacti 0.8.6k
Cacti Cacti 0.8.6d
Cacti Cacti 0.8.7
Cacti Cacti 0.8.5a
Cacti Cacti 0.8.3
Cacti Cacti 0.8.2
Cacti Cacti 0.8.5
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7b
Cacti Cacti 0.8.6e
Cacti Cacti 0.8.7a
Cacti Cacti 0.8.8
Cacti Cacti 0.8.8a
Cacti Cacti 0.8.6f
Cacti Cacti 0.8.6g
Cacti Cacti 0.8.6j
Cacti Cacti 0.8.7h
Cacti Cacti 0.8.7c
Cacti Cacti 0.8
Cacti Cacti 0.8.7f
Cacti Cacti 0.8.7e
Cacti Cacti 0.8.6a
7.5
CVSSv2
CVE-2011-4824
SQL injection vulnerability in auth_login.php in Cacti prior to 0.8.7h allows remote malicious users to execute arbitrary SQL commands via the login_username parameter.
Cacti Cacti 0.5
Cacti Cacti 0.8.6k
Cacti Cacti 0.8.6d
Cacti Cacti 0.6.3
Cacti Cacti 0.8.7
Cacti Cacti 0.8.5a
Cacti Cacti 0.8.3
Cacti Cacti 0.6.8
Cacti Cacti 0.8.2
Cacti Cacti 0.8.5
Cacti Cacti 0.6.6
Cacti Cacti 0.8.7d
Cacti Cacti 0.8.7b
Cacti Cacti 0.8.7a
Cacti Cacti 0.6.2
Cacti Cacti 0.6.5
Cacti Cacti 0.8.6f
Cacti Cacti 0.8.6g
Cacti Cacti 0.8.6j
Cacti Cacti 0.8.7c
Cacti Cacti 0.6.1
Cacti Cacti 0.8
6.8
CVSSv2
CVE-2014-2327
Cross-site request forgery (CSRF) vulnerability in Cacti 0.8.7g, 0.8.8b, and previous versions allows remote malicious users to hijack the authentication of users for unspecified commands, as demonstrated by requests that (1) modify binary files, (2) modify configurations, or (3)...
Cacti Cacti
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
6.5
CVSSv2
CVE-2014-2328
lib/graph_export.php in Cacti 0.8.7g, 0.8.8b, and previous versions allows remote authenticated users to execute arbitrary commands via shell metacharacters in unspecified vectors.
Cacti Cacti
Fedoraproject Fedora 20
Fedoraproject Fedora 19
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Debian Debian Linux 7.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »