Vulnerabilities > THE Cacti Group > Cacti > 0.8.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2005-07-06 | CVE-2005-2149 | Unspecified vulnerability in the Cacti Group Cacti config.php in Cacti 0.8.6e and earlier allows remote attackers to set the no_http_headers switch, then modify session information to gain privileges and disable the use of addslashes to conduct SQL injection attacks. | 10.0 |
2005-07-06 | CVE-2005-2148 | SQL Injection vulnerability in RaXnet Cacti Input Filter Cacti 0.8.6e and earlier does not perform proper input validation to protect against common attacks, which allows remote attackers to execute arbitrary commands or SQL by sending a legitimate value in a POST request or cookie, then specifying the attack string in the URL, which causes the get_request_var function to return the wrong value in the $_REQUEST variable, which is cleansed while the original malicious $_GET value remains unmodified, as demonstrated in (1) graph_image.php and (2) graph.php. | 7.5 |
2005-06-22 | CVE-2005-1526 | Remote File Include vulnerability in RaXnet Cacti Config_Settings.PHP PHP remote file inclusion vulnerability in config_settings.php in Cacti before 0.8.6e allows remote attackers to execute arbitrary PHP code via the config[include_path] parameter. | 7.5 |
2005-06-22 | CVE-2005-1525 | SQL Injection vulnerability in RaXnet Cacti SQL injection vulnerability in config_settings.php for Cacti before 0.8.6e allows remote attackers to execute arbitrary SQL commands via the id parameter. | 7.5 |
2005-06-22 | CVE-2005-1524 | Unspecified vulnerability in the Cacti Group Cacti PHP file inclusion vulnerability in top_graph_header.php in Cacti 0.8.6d and possibly earlier versions allows remote attackers to execute arbitrary PHP code via the config[library_path] parameter. | 5.0 |
2004-08-16 | CVE-2004-1737 | SQL Injection vulnerability in RaXnet Cacti Auth_Login.PHP SQL injection vulnerability in auth_login.php in Cacti 0.8.5a allows remote attackers to execute arbitrary SQL commands and bypass authentication via the (1) username or (2) password parameters. | 7.5 |