Lucene search

K
CactiCacti

13 matches found

CVE
CVE
added 2022/12/05 9:15 p.m.681 views

CVE-2022-46169

Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data sour...

9.8CVSS10AI score0.94469EPSS
CVE
CVE
added 2020/02/22 2:15 a.m.332 views

CVE-2020-8813

graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.

9.3CVSS8.8AI score0.94137EPSS
CVE
CVE
added 2020/01/20 5:15 a.m.226 views

CVE-2020-7237

Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Sett...

9CVSS8.6AI score0.46813EPSS
CVE
CVE
added 2024/05/14 3:5 p.m.170 views

CVE-2024-25641

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable through the "Package Import" feature, allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web ser...

9.1CVSS9.3AI score0.85176EPSS
CVE
CVE
added 2009/11/30 9:30 p.m.153 views

CVE-2009-4112

Cacti 0.8.7e and earlier allows remote authenticated administrators to gain privileges by modifying the "Data Input Method" for the "Linux - Get Memory Usage" setting to contain arbitrary commands.

9CVSS8.7AI score0.0843EPSS
CVE
CVE
added 2022/03/03 11:15 p.m.153 views

CVE-2022-0730

Under certain ldap conditions, Cacti authentication can be bypassed with certain credential types.

9.8CVSS9.4AI score0.00435EPSS
CVE
CVE
added 2025/01/27 5:15 p.m.112 views

CVE-2025-22604

Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an arra...

9.1CVSS7AI score0.40571EPSS
CVE
CVE
added 2023/09/05 9:15 p.m.74 views

CVE-2023-39361

Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a SQL injection discovered in graph_view.php. Since guest users can access graph_view.php without authentication by default, if guest users are being utilized in an enabled state, there c...

9.8CVSS10AI score0.93059EPSS
CVE
CVE
added 2024/05/14 3:38 p.m.72 views

CVE-2024-34340

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, Cacti calls compat_password_hash when users set their password. compat_password_hash use password_hash if there is it, else use md5. When verifying password, it calls compat_password_verify. In compat_...

9.1CVSS9.1AI score0.00635EPSS
CVE
CVE
added 2025/02/12 7:15 a.m.62 views

CVE-2025-26520

Cacti through 1.2.29 allows SQL injection in the template function in host_templates.php via the graph_template parameter. NOTE: this issue exists because of an incomplete fix for CVE-2024-54146.

9.8CVSS8.1AI score0.0017EPSS
CVE
CVE
added 2017/08/01 5:29 a.m.55 views

CVE-2017-12065

spikekill.php in Cacti before 1.1.16 might allow remote attackers to execute arbitrary code via the avgnan, outlier-start, or outlier-end parameter.

9.8CVSS9.6AI score0.03315EPSS
CVE
CVE
added 2017/11/07 8:29 p.m.50 views

CVE-2017-16641

lib/rrd.php in Cacti 1.1.27 allows remote authenticated administrators to execute arbitrary OS commands via the path_rrdtool parameter in an action=save request to settings.php.

9CVSS7AI score0.00465EPSS
CVE
CVE
added 2017/11/08 5:29 a.m.49 views

CVE-2017-16660

Cacti 1.1.27 allows remote authenticated administrators to conduct Remote Code Execution attacks by placing the Log Path under the web root, and then making a remote_agent.php request containing PHP code in a Client-ip header.

9CVSS6.9AI score0.01457EPSS