Max CVSS | 9.0 | Min CVSS | 4.0 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2020-7106 | 4.3 |
Cacti 1.2.8 has stored XSS in data_sources.php, color_templates_item.php, graphs.php, graph_items.php, lib/api_automation.php, user_admin.php, and user_group_admin.php, as demonstrated by the description parameter in data_sources.php (a raw string fr
|
24-05-2022 - 15:27 | 16-01-2020 - 04:15 | |
CVE-2019-17358 | 5.5 |
Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti
|
24-08-2020 - 17:37 | 12-12-2019 - 14:15 | |
CVE-2019-17357 | 4.0 |
Cacti through 1.2.7 is affected by a graphs.php?template_id= SQL injection vulnerability affecting how template identifiers are handled when a string and id composite value are used to identify the template type and id. An authenticated attacker can
|
01-03-2020 - 22:15 | 21-01-2020 - 19:15 | |
CVE-2020-7237 | 9.0 |
Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, an
|
19-02-2020 - 03:15 | 20-01-2020 - 05:15 | |
CVE-2019-16723 | 4.0 |
In Cacti through 1.2.6, authenticated users may bypass authorization checks (for viewing a graph) via a direct graph_json.php request with a modified local_graph_id parameter.
|
20-12-2019 - 03:15 | 23-09-2019 - 15:15 |