Vulnerability Database

With exploit

cacti / cacti

Title Severity Exploit Date Affected Version
CVE-2011-4824 High Dec 15, 2011 == 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
<= 0.8.7g
== 0.8.7e
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
== 0.6
CVE-2010-1644 Low Aug 24, 2010 == 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
<= 0.8.7e
== 0.6
CVE-2010-1645 Medium Aug 24, 2010 == 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
<= 0.8.7e
== 0.6
CVE-2010-2543 Low Aug 24, 2010 == 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
<= 0.8.7f
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.7e
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
== 0.6
CVE-2010-2544 Low Aug 24, 2010 == 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
<= 0.8.7f
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.7e
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
== 0.6
CVE-2010-2545 Low Aug 24, 2010 == 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
<= 0.8.7f
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.7e
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
== 0.6
CVE-2010-2092 High May 28, 2010 == 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
<= 0.8.7e
== 0.6
CVE-2010-1431 High May 4, 2010 == 0.5
== 0.8.6k
== 0.8.6d
== 0.6.3
== 0.8.7
== 0.8.5a
== 0.8.3
== 0.6.8
== 0.8.2
== 0.8.5
== 0.6.6
== 0.8.7d
== 0.8.7b
== 0.8.7a
== 0.6.2
== 0.6.5
== 0.8.6f
== 0.8.6g
== 0.8.6j
== 0.8.7c
== 0.6.1
== 0.8
== 0.8.6a
== 0.8.6i
== 0.8.6
== 0.6.8a
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.6.4
== 0.8.6b
== 0.8.2a
== 0.8.3a
== 0.8.6h
<= 0.8.7e
== 0.6
CVE-2009-4112 High Nov 30, 2009 == 0.8.7
== 0.8.5a
== 0.8.3
== 0.8.2
== 0.8.5
== 0.8.7a
== 0.8.6f
== 0.8
== 0.8.6i
== 0.6.7
== 0.8.1
== 0.8.4
== 0.8.6c
== 0.8.2a
== 0.8.3a
<= 0.8.7e
CVE-2009-4032 Low Nov 29, 2009 == 0.8.7e