Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 313,825
With exploit
cacti / cacti
You can search for specific versions with
https://synscan.net/product/cacti/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2011-5223
Low
Oct 25, 2012
== 0.8.6k
== 0.8.6d
== 0.6.3
== 0.5
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.7f
== 0.8.7e
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
<= 0.8.7h
== 0.8.6b
== 0.8.7g
== 0.8.3a
== 0.8.6h
== 0.6
CVE-2011-4824
High
Dec 15, 2011
== 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
<= 0.8.7g
== 0.8.7e
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
== 0.6
CVE-2010-2543
Low
Aug 23, 2010
== 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
<= 0.8.7f
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.7e
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
== 0.6
CVE-2010-2544
Low
Aug 23, 2010
== 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
<= 0.8.7f
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.7e
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
== 0.6
CVE-2010-2545
Low
Aug 23, 2010
== 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
<= 0.8.7f
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.7e
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
== 0.6
CVE-2010-1644
Low
Aug 23, 2010
== 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
<= 0.8.7e
== 0.6
CVE-2010-1645
Medium
Aug 23, 2010
== 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
<= 0.8.7e
== 0.6
CVE-2010-2092
High
May 27, 2010
== 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
<= 0.8.7e
== 0.6
CVE-2010-1431
High
May 4, 2010
== 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
<= 0.8.7e
== 0.6
CVE-2009-4112
High
Nov 30, 2009
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.8.2
== 0.8.5
== 0.8.7a
== 0.8.6f
== 0.8
== 0.8.6i
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.8.2a
== 0.8.3a
<= 0.8.7e
‹
›
‹
1
2
...
9
10
11
12
13
14
›