Total vulnerabilities in the database
Cacti before 0.6.8 allows attackers to execute arbitrary commands via the "Data Input" option in console mode.
Software | From | Fixed in |
---|---|---|
the_cacti_group / cacti | 0.5 | 0.5.x |
the_cacti_group / cacti | 0.6.7 | 0.6.7.x |
the_cacti_group / cacti | 0.6.4 | 0.6.4.x |
the_cacti_group / cacti | 0.6.1 | 0.6.1.x |
the_cacti_group / cacti | 0.6 | 0.6.x |
the_cacti_group / cacti | 0.6.6 | 0.6.6.x |
the_cacti_group / cacti | 0.6.5 | 0.6.5.x |
the_cacti_group / cacti | 0.6.3 | 0.6.3.x |
the_cacti_group / cacti | 0.6.8 | 0.6.8.x |
the_cacti_group / cacti | 0.6.2 | 0.6.2.x |