Max CVSS | 9.0 | Min CVSS | 3.5 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2020-7106 | 4.3 |
Cacti 1.2.8 has stored XSS in data_sources.php, color_templates_item.php, graphs.php, graph_items.php, lib/api_automation.php, user_admin.php, and user_group_admin.php, as demonstrated by the description parameter in data_sources.php (a raw string fr
|
24-05-2022 - 15:27 | 16-01-2020 - 04:15 | |
CVE-2019-17358 | 5.5 |
Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti
|
24-08-2020 - 17:37 | 12-12-2019 - 14:15 | |
CVE-2018-20725 | 3.5 |
A cross-site scripting (XSS) vulnerability exists in graph_templates.php in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Graph Vertical Label.
|
01-03-2020 - 22:15 | 16-01-2019 - 16:29 | |
CVE-2018-20723 | 3.5 |
A cross-site scripting (XSS) vulnerability exists in color_templates.php in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Name field for a Color.
|
01-03-2020 - 22:15 | 16-01-2019 - 16:29 | |
CVE-2018-20724 | 3.5 |
A cross-site scripting (XSS) vulnerability exists in pollers.php in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Website Hostname for Data Collectors.
|
01-03-2020 - 22:15 | 16-01-2019 - 16:29 | |
CVE-2018-20726 | 3.5 |
A cross-site scripting (XSS) vulnerability exists in host.php (via tree.php) in Cacti before 1.2.0 due to lack of escaping of unintended characters in the Website Hostname field for Devices.
|
01-03-2020 - 22:15 | 16-01-2019 - 16:29 | |
CVE-2019-17357 | 4.0 |
Cacti through 1.2.7 is affected by a graphs.php?template_id= SQL injection vulnerability affecting how template identifiers are handled when a string and id composite value are used to identify the template type and id. An authenticated attacker can
|
01-03-2020 - 22:15 | 21-01-2020 - 19:15 | |
CVE-2020-7237 | 9.0 |
Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, an
|
19-02-2020 - 03:15 | 20-01-2020 - 05:15 | |
CVE-2019-16723 | 4.0 |
In Cacti through 1.2.6, authenticated users may bypass authorization checks (for viewing a graph) via a direct graph_json.php request with a modified local_graph_id parameter.
|
20-12-2019 - 03:15 | 23-09-2019 - 15:15 | |
CVE-2009-4112 | 9.0 |
Cacti 0.8.7e and earlier allows remote authenticated administrators to gain privileges by modifying the "Data Input Method" for the "Linux - Get Memory Usage" setting to contain arbitrary commands.
|
10-10-2018 - 19:48 | 30-11-2009 - 21:30 |