Show filters
152 Total Results
Displaying 61-70 of 152
Sort by:
Attacker Value
Unknown
CVE-2020-25706
Disclosure Date: November 12, 2020 (last updated February 22, 2025)
A cross-site scripting (XSS) vulnerability exists in templates_import.php (Cacti 1.2.13) due to Improper escaping of error message during template import preview in the xml_path field
0
Attacker Value
Unknown
CVE-2020-13231
Disclosure Date: May 20, 2020 (last updated February 21, 2025)
In Cacti before 1.2.11, auth_profile.php?action=edit allows CSRF for an admin email change.
0
Attacker Value
Unknown
CVE-2020-13230
Disclosure Date: May 20, 2020 (last updated February 21, 2025)
In Cacti before 1.2.11, disabling a user account does not immediately invalidate any permissions granted to that account (e.g., permission to view logs).
0
Attacker Value
Unknown
CVE-2020-8813
Disclosure Date: February 22, 2020 (last updated February 21, 2025)
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
0
Attacker Value
Unknown
CVE-2020-7237
Disclosure Date: January 20, 2020 (last updated February 21, 2025)
Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
0
Attacker Value
Unknown
CVE-2020-7106
Disclosure Date: January 16, 2020 (last updated February 21, 2025)
Cacti 1.2.8 has stored XSS in data_sources.php, color_templates_item.php, graphs.php, graph_items.php, lib/api_automation.php, user_admin.php, and user_group_admin.php, as demonstrated by the description parameter in data_sources.php (a raw string from the database that is displayed by $header to trigger the XSS).
0
Attacker Value
Unknown
CVE-2020-7058
Disclosure Date: January 15, 2020 (last updated February 21, 2025)
data_input.php in Cacti 1.2.8 allows remote code execution via a crafted Input String to Data Collection -> Data Input Methods -> Unix -> Ping Host. NOTE: the vendor has stated "This is a false alarm.
0
Attacker Value
Unknown
CVE-2019-17358
Disclosure Date: December 12, 2019 (last updated November 27, 2024)
Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP module.
0
Attacker Value
Unknown
CVE-2019-16723
Disclosure Date: September 23, 2019 (last updated November 08, 2023)
In Cacti through 1.2.6, authenticated users may bypass authorization checks (for viewing a graph) via a direct graph_json.php request with a modified local_graph_id parameter.
0
Attacker Value
Unknown
CVE-2019-17357
Disclosure Date: May 15, 2019 (last updated February 21, 2025)
Cacti through 1.2.7 is affected by a graphs.php?template_id= SQL injection vulnerability affecting how template identifiers are handled when a string and id composite value are used to identify the template type and id. An authenticated attacker can exploit this to extract data from the database, or an unauthenticated remote attacker could exploit this via Cross-Site Request Forgery.
0