Total vulnerabilities in the database
Cacti 0.8.7e and earlier allows remote authenticated administrators to gain privileges by modifying the "Data Input Method" for the "Linux - Get Memory Usage" setting to contain arbitrary commands.
Software | From | Fixed in |
---|---|---|
cacti / cacti | 0.8.7 | 0.8.7.x |
cacti / cacti | 0.8.5a | 0.8.5a.x |
cacti / cacti | 0.8.3 | 0.8.3.x |
cacti / cacti | 0.8.2 | 0.8.2.x |
cacti / cacti | 0.8.5 | 0.8.5.x |
cacti / cacti | 0.8.7a | 0.8.7a.x |
cacti / cacti | 0.8.6f | 0.8.6f.x |
cacti / cacti | 0.8 | 0.8.x |
cacti / cacti | 0.8.6i | 0.8.6i.x |
cacti / cacti | 0.6.7 | 0.6.7.x |
cacti / cacti | 0.8.1 | 0.8.1.x |
cacti / cacti | 0.8.4 | 0.8.4.x |
cacti / cacti | 0.8.6c | 0.8.6c.x |
cacti / cacti | 0.8.2a | 0.8.2a.x |
cacti / cacti | 0.8.3a | 0.8.3a.x |
cacti / cacti | - | 0.8.7e.x |