[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

125989

 
 

909

 
 

104883

 
 

152

 
 
Paid content will be excluded from the download.

Filter
Matches : 14543 Download | Alert*

The host is installed with Cacti version before 1.1.18 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle the issue in lib/html.php component. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Cacti version 1.1.17 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle the method parameter in spikekill.php. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Cacti before 1.2.0 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle a issue in the website hostname field for devices. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Cacti version 1.1.27 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle the issue in PATH_INFO to host.php. Successful exploitation could allow attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object.

The host is installed with Cacti version 1.1.27 and is prone to an arbitrary OS command execution vulnerability. A flaw is present in the application, which fails to handle the issue in path_rrdtool parameter in an action=save request. Successful exploitation could allow remote authenticated administrators to execute arbitrary OS commands.

The host is installed with Cacti version before 1.1.16 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle the issue in aggregate_graphs.php component. Successful exploitation could allow remote authenticated users to inject arbitrary web script or HTML via specially crafted HTTP Referer headers, related to the $cancel_url variable.

The host is installed with Cacti version before 1.1.16 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle the issue in spikekill.php component. Successful exploitation allows remote attackers to execute arbitrary code via the avgnan, outlier-start, or outlier-end parameter.

The host is installed with Cacti before 1.0.0 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle the stripslashes function issue. Successful exploitation could allow attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object.

The host is installed with Cacti version 1.1.13 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle the issue in auth_profile.php component. Successful exploitation allows remote attackers to inject arbitrary web script or HTML via specially crafted HTTP Referer headers.

The host is installed with Cacti version 1.1.12 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to handle the issue in aggregate_graphs.php component. Successful exploitation allows remote authenticated attackers to inject arbitrary web script or HTML via specially crafted HTTP Referer headers, related to the $cancel_url variable.


Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   1454

© SecPod Technologies