Vulnerability Database

With exploit

cacti / cacti

Title Severity Exploit Date Affected Version
CVE-2015-8377 Medium Dec 15, 2015 <= 0.8.8f
CVE-2015-4634 High Aug 11, 2015 <= 0.8.8d
CVE-2014-5025 Low Oct 20, 2014 == 0.8.8b
CVE-2014-5026 Low Oct 20, 2014 == 0.8.8b
CVE-2014-2326 Low Mar 27, 2014 == 0.8.7g
CVE-2013-5588 Low Aug 29, 2013 == 0.8.6k
== 0.8.6d
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.8.2
== 0.8.5
== 0.8.7d
== 0.8.7b
== 0.8.6e
== 0.8.7a
== 0.8.8
== 0.8.8a
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7h
== 0.8.7c
== 0.8
== 0.8.7f
== 0.8.7e
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.8.7i
== 0.8.1
== 0.8.4
== 0.8.6c
<= 0.8.8b
== 0.8.6b
== 0.8.7g
== 0.8.2a
== 0.8.3a
== 0.8.6h
CVE-2010-2544 Low Aug 24, 2010 == 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
<= 0.8.7f
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.7e
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
== 0.6
CVE-2010-2545 Low Aug 24, 2010 == 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
<= 0.8.7f
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.7e
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
== 0.6
CVE-2010-2092 High May 28, 2010 == 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
<= 0.8.7e
== 0.6
CVE-2009-4112 High Nov 30, 2009 == 0.8.7
== 0.8.5a
== 0.8.3
== 0.8.2
== 0.8.5
== 0.8.7a
== 0.8.6f
== 0.8
== 0.8.6i
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.8.2a
== 0.8.3a
<= 0.8.7e