Vulnerabilities > Cacti > Cacti > 0.8.7e

DATE CVE VULNERABILITY TITLE RISK
2010-08-23 CVE-2010-1645 Improper Input Validation vulnerability in Cacti
Cacti before 0.8.7f, as used in Red Hat High Performance Computing (HPC) Solution and other products, allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in (1) the FQDN field of a Device or (2) the Vertical Label field of a Graph Template.
network
low complexity
cacti CWE-20
6.5
2010-05-27 CVE-2010-2092 SQL Injection vulnerability in Cacti
SQL injection vulnerability in graph.php in Cacti 0.8.7e and earlier allows remote attackers to execute arbitrary SQL commands via a crafted rra_id parameter in a GET request in conjunction with a valid rra_id value in a POST request or a cookie, which causes the POST or cookie value to bypass the validation routine, but inserts the $_GET value into the resulting query.
network
low complexity
cacti CWE-89
7.5
2010-05-04 CVE-2010-1431 SQL Injection vulnerability in Cacti
SQL injection vulnerability in templates_export.php in Cacti 0.8.7e and earlier allows remote attackers to execute arbitrary SQL commands via the export_item_id parameter.
network
low complexity
cacti CWE-89
7.5
2009-11-30 CVE-2009-4112 Permissions, Privileges, and Access Controls vulnerability in Cacti
Cacti 0.8.7e and earlier allows remote authenticated administrators to gain privileges by modifying the "Data Input Method" for the "Linux - Get Memory Usage" setting to contain arbitrary commands.
network
low complexity
cacti CWE-264
critical
9.0