Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-8369 (GCVE-0-2015-8369)
Vulnerability from cvelistv5 – Published: 2015-12-17 19:00 – Updated: 2024-08-06 08:13
VLAI?
EPSS
Summary
SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Date Public ?
2015-12-09 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T08:13:32.542Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "GLSA-201607-05",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201607-05"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugs.cacti.net/view.php?id=2646"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html"
},
{
"name": "DSA-3423",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2015/dsa-3423"
},
{
"name": "20151209 [CVE-2015-8369] Cacti SQL injection in graph.php",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2015/Dec/8"
},
{
"name": "1034497",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1034497"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-12-09T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-05T20:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "GLSA-201607-05",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201607-05"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugs.cacti.net/view.php?id=2646"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html"
},
{
"name": "DSA-3423",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2015/dsa-3423"
},
{
"name": "20151209 [CVE-2015-8369] Cacti SQL injection in graph.php",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2015/Dec/8"
},
{
"name": "1034497",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1034497"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-8369",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "GLSA-201607-05",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-05"
},
{
"name": "http://bugs.cacti.net/view.php?id=2646",
"refsource": "MISC",
"url": "http://bugs.cacti.net/view.php?id=2646"
},
{
"name": "http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html"
},
{
"name": "DSA-3423",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3423"
},
{
"name": "20151209 [CVE-2015-8369] Cacti SQL injection in graph.php",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Dec/8"
},
{
"name": "1034497",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034497"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2015-8369",
"datePublished": "2015-12-17T19:00:00.000Z",
"dateReserved": "2015-11-27T00:00:00.000Z",
"dateUpdated": "2024-08-06T08:13:32.542Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2015-8369",
"date": "2026-04-26",
"epss": "0.00495",
"percentile": "0.65831"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2015-8369\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-12-17T19:59:11.683\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de inyecci\u00f3n SQL en include/top_graph_header.php en Cacti 0.8.8f y en versiones anteriores permite a atacantes remotos ejecutar comandosSQL arbitrarios a trav\u00e9s del par\u00e1metro rra_id en una acci\u00f3n de propiedades en graph.php.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.8.8f\",\"matchCriteriaId\":\"A2C69488-CAAE-4612-B3A3-C5789C2D772B\"}]}]}],\"references\":[{\"url\":\"http://bugs.cacti.net/view.php?id=2646\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://seclists.org/fulldisclosure/2015/Dec/8\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3423\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1034497\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201607-05\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.cacti.net/view.php?id=2646\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2015/Dec/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3423\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1034497\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201607-05\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
GHSA-JHRC-RCVV-9RPC
Vulnerability from github – Published: 2022-05-17 03:25 – Updated: 2022-05-17 03:25
VLAI?
Details
SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php.
{
"affected": [],
"aliases": [
"CVE-2015-8369"
],
"database_specific": {
"cwe_ids": [
"CWE-89"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2015-12-17T19:59:00Z",
"severity": "HIGH"
},
"details": "SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php.",
"id": "GHSA-jhrc-rcvv-9rpc",
"modified": "2022-05-17T03:25:23Z",
"published": "2022-05-17T03:25:23Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8369"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201607-05"
},
{
"type": "WEB",
"url": "http://bugs.cacti.net/view.php?id=2646"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2015/Dec/8"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2015/dsa-3423"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1034497"
}
],
"schema_version": "1.4.0",
"severity": []
}
CNVD-2015-08486
Vulnerability from cnvd - Published: 2015-12-28
VLAI Severity ?
Title
Cacti SQL注入漏洞(CNVD-2015-08486)
Description
Cacti是Cacti集团的一套开源的网络流量监测和分析工具。该工具通过snmpget来获取数据,使用RRDtool绘画图形进行分析,并提供数据和用户管理功能。
Cacti 0.8.8f以前版本存在SQL注入漏洞。允许远程攻击者通过graphphp属性行动中的rra_id参数执行任意SQL命令。
Severity
高
Patch Name
Cacti SQL注入漏洞(CNVD-2015-08486)的补丁
Patch Description
Cacti是Cacti集团的一套开源的网络流量监测和分析工具。该工具通过snmpget来获取数据,使用RRDtool绘画图形进行分析,并提供数据和用户管理功能。
Cacti 0.8.8f以前版本存在SQL注入漏洞。允许远程攻击者通过graphphp属性行动中的rra_id参数执行任意SQL命令。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞: http://seclists.org/fulldisclosure/2015/Dec/8
Reference
http://seclists.org/fulldisclosure/2015/Dec/8
Impacted products
| Name | Cacti Cacti <=0.8.8f |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2015-8369"
}
},
"description": "Cacti\u662fCacti\u96c6\u56e2\u7684\u4e00\u5957\u5f00\u6e90\u7684\u7f51\u7edc\u6d41\u91cf\u76d1\u6d4b\u548c\u5206\u6790\u5de5\u5177\u3002\u8be5\u5de5\u5177\u901a\u8fc7snmpget\u6765\u83b7\u53d6\u6570\u636e\uff0c\u4f7f\u7528RRDtool\u7ed8\u753b\u56fe\u5f62\u8fdb\u884c\u5206\u6790\uff0c\u5e76\u63d0\u4f9b\u6570\u636e\u548c\u7528\u6237\u7ba1\u7406\u529f\u80fd\u3002\r\n\r\nCacti 0.8.8f\u4ee5\u524d\u7248\u672c\u5b58\u5728SQL\u6ce8\u5165\u6f0f\u6d1e\u3002\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u901a\u8fc7graphphp\u5c5e\u6027\u884c\u52a8\u4e2d\u7684rra_id\u53c2\u6570\u6267\u884c\u4efb\u610fSQL\u547d\u4ee4\u3002",
"discovererName": "changzhao.mao",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u53d6\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://seclists.org/fulldisclosure/2015/Dec/8",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-08486",
"openTime": "2015-12-28",
"patchDescription": "Cacti\u662fCacti\u96c6\u56e2\u7684\u4e00\u5957\u5f00\u6e90\u7684\u7f51\u7edc\u6d41\u91cf\u76d1\u6d4b\u548c\u5206\u6790\u5de5\u5177\u3002\u8be5\u5de5\u5177\u901a\u8fc7snmpget\u6765\u83b7\u53d6\u6570\u636e\uff0c\u4f7f\u7528RRDtool\u7ed8\u753b\u56fe\u5f62\u8fdb\u884c\u5206\u6790\uff0c\u5e76\u63d0\u4f9b\u6570\u636e\u548c\u7528\u6237\u7ba1\u7406\u529f\u80fd\u3002\r\n\r\nCacti 0.8.8f\u4ee5\u524d\u7248\u672c\u5b58\u5728SQL\u6ce8\u5165\u6f0f\u6d1e\u3002\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u901a\u8fc7graphphp\u5c5e\u6027\u884c\u52a8\u4e2d\u7684rra_id\u53c2\u6570\u6267\u884c\u4efb\u610fSQL\u547d\u4ee4\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Cacti SQL\u6ce8\u5165\u6f0f\u6d1e\uff08CNVD-2015-08486\uff09\u7684\u8865\u4e01",
"products": {
"product": "Cacti Cacti \u003c=0.8.8f"
},
"referenceLink": "http://seclists.org/fulldisclosure/2015/Dec/8",
"serverity": "\u9ad8",
"submitTime": "2015-12-25",
"title": "Cacti SQL\u6ce8\u5165\u6f0f\u6d1e\uff08CNVD-2015-08486\uff09"
}
GSD-2015-8369
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2015-8369",
"description": "SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php.",
"id": "GSD-2015-8369",
"references": [
"https://www.suse.com/security/cve/CVE-2015-8369.html",
"https://www.debian.org/security/2015/dsa-3423",
"https://advisories.mageia.org/CVE-2015-8369.html",
"https://packetstormsecurity.com/files/cve/CVE-2015-8369"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2015-8369"
],
"details": "SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php.",
"id": "GSD-2015-8369",
"modified": "2023-12-13T01:20:02.947475Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-8369",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "GLSA-201607-05",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-05"
},
{
"name": "http://bugs.cacti.net/view.php?id=2646",
"refsource": "MISC",
"url": "http://bugs.cacti.net/view.php?id=2646"
},
{
"name": "http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html"
},
{
"name": "DSA-3423",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3423"
},
{
"name": "20151209 [CVE-2015-8369] Cacti SQL injection in graph.php",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/Dec/8"
},
{
"name": "1034497",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034497"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "0.8.8f",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-8369"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://bugs.cacti.net/view.php?id=2646",
"refsource": "MISC",
"tags": [
"Exploit"
],
"url": "http://bugs.cacti.net/view.php?id=2646"
},
{
"name": "20151209 [CVE-2015-8369] Cacti SQL injection in graph.php",
"refsource": "FULLDISC",
"tags": [
"Exploit"
],
"url": "http://seclists.org/fulldisclosure/2015/Dec/8"
},
{
"name": "GLSA-201607-05",
"refsource": "GENTOO",
"tags": [],
"url": "https://security.gentoo.org/glsa/201607-05"
},
{
"name": "http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html",
"refsource": "MISC",
"tags": [],
"url": "http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html"
},
{
"name": "DSA-3423",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2015/dsa-3423"
},
{
"name": "1034497",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id/1034497"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2016-12-07T18:27Z",
"publishedDate": "2015-12-17T19:59Z"
}
}
}
FKIE_CVE-2015-8369
Vulnerability from fkie_nvd - Published: 2015-12-17 19:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2C69488-CAAE-4612-B3A3-C5789C2D772B",
"versionEndIncluding": "0.8.8f",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en include/top_graph_header.php en Cacti 0.8.8f y en versiones anteriores permite a atacantes remotos ejecutar comandosSQL arbitrarios a trav\u00e9s del par\u00e1metro rra_id en una acci\u00f3n de propiedades en graph.php."
}
],
"id": "CVE-2015-8369",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-12-17T19:59:11.683",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://bugs.cacti.net/view.php?id=2646"
},
{
"source": "cve@mitre.org",
"url": "http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://seclists.org/fulldisclosure/2015/Dec/8"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2015/dsa-3423"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id/1034497"
},
{
"source": "cve@mitre.org",
"url": "https://security.gentoo.org/glsa/201607-05"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://bugs.cacti.net/view.php?id=2646"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://seclists.org/fulldisclosure/2015/Dec/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2015/dsa-3423"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1034497"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201607-05"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
OPENSUSE-SU-2024:10084-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
cacti-0.8.8h-1.2 on GA media
Severity
Moderate
Notes
Title of the patch: cacti-0.8.8h-1.2 on GA media
Description of the patch: These are all security issues fixed in the cacti-0.8.8h-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-10084
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "cacti-0.8.8h-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the cacti-0.8.8h-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10084",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10084-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-5588 page",
"url": "https://www.suse.com/security/cve/CVE-2013-5588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-5589 page",
"url": "https://www.suse.com/security/cve/CVE-2013-5589/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2326 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2326/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2327 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2327/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2328 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2708 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2708/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2709 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2709/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4002 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-5025 page",
"url": "https://www.suse.com/security/cve/CVE-2014-5025/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-5026 page",
"url": "https://www.suse.com/security/cve/CVE-2014-5026/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-4342 page",
"url": "https://www.suse.com/security/cve/CVE-2015-4342/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-4634 page",
"url": "https://www.suse.com/security/cve/CVE-2015-4634/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8369 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8369/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8377 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8377/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8604 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8604/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2313 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2313/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3172 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3659 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3659/"
}
],
"title": "cacti-0.8.8h-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10084-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cacti-0.8.8h-1.2.aarch64",
"product": {
"name": "cacti-0.8.8h-1.2.aarch64",
"product_id": "cacti-0.8.8h-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "cacti-doc-0.8.8h-1.2.aarch64",
"product": {
"name": "cacti-doc-0.8.8h-1.2.aarch64",
"product_id": "cacti-doc-0.8.8h-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "cacti-0.8.8h-1.2.ppc64le",
"product": {
"name": "cacti-0.8.8h-1.2.ppc64le",
"product_id": "cacti-0.8.8h-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "cacti-doc-0.8.8h-1.2.ppc64le",
"product": {
"name": "cacti-doc-0.8.8h-1.2.ppc64le",
"product_id": "cacti-doc-0.8.8h-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cacti-0.8.8h-1.2.s390x",
"product": {
"name": "cacti-0.8.8h-1.2.s390x",
"product_id": "cacti-0.8.8h-1.2.s390x"
}
},
{
"category": "product_version",
"name": "cacti-doc-0.8.8h-1.2.s390x",
"product": {
"name": "cacti-doc-0.8.8h-1.2.s390x",
"product_id": "cacti-doc-0.8.8h-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cacti-0.8.8h-1.2.x86_64",
"product": {
"name": "cacti-0.8.8h-1.2.x86_64",
"product_id": "cacti-0.8.8h-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "cacti-doc-0.8.8h-1.2.x86_64",
"product": {
"name": "cacti-doc-0.8.8h-1.2.x86_64",
"product_id": "cacti-doc-0.8.8h-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cacti-0.8.8h-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64"
},
"product_reference": "cacti-0.8.8h-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cacti-0.8.8h-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le"
},
"product_reference": "cacti-0.8.8h-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cacti-0.8.8h-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x"
},
"product_reference": "cacti-0.8.8h-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cacti-0.8.8h-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64"
},
"product_reference": "cacti-0.8.8h-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cacti-doc-0.8.8h-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64"
},
"product_reference": "cacti-doc-0.8.8h-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cacti-doc-0.8.8h-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le"
},
"product_reference": "cacti-doc-0.8.8h-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cacti-doc-0.8.8h-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x"
},
"product_reference": "cacti-doc-0.8.8h-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cacti-doc-0.8.8h-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
},
"product_reference": "cacti-doc-0.8.8h-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-5588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-5588"
}
],
"notes": [
{
"category": "general",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the step parameter to install/index.php or (2) the id parameter to cacti/host.php.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-5588",
"url": "https://www.suse.com/security/cve/CVE-2013-5588"
},
{
"category": "external",
"summary": "SUSE Bug 837440 for CVE-2013-5588",
"url": "https://bugzilla.suse.com/837440"
},
{
"category": "external",
"summary": "SUSE Bug 920399 for CVE-2013-5588",
"url": "https://bugzilla.suse.com/920399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2013-5588"
},
{
"cve": "CVE-2013-5589",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-5589"
}
],
"notes": [
{
"category": "general",
"text": "SQL injection vulnerability in cacti/host.php in Cacti 0.8.8b and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-5589",
"url": "https://www.suse.com/security/cve/CVE-2013-5589"
},
{
"category": "external",
"summary": "SUSE Bug 837440 for CVE-2013-5589",
"url": "https://bugzilla.suse.com/837440"
},
{
"category": "external",
"summary": "SUSE Bug 920399 for CVE-2013-5589",
"url": "https://bugzilla.suse.com/920399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2013-5589"
},
{
"cve": "CVE-2014-2326",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2326"
}
],
"notes": [
{
"category": "general",
"text": "Cross-site scripting (XSS) vulnerability in cdef.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2326",
"url": "https://www.suse.com/security/cve/CVE-2014-2326"
},
{
"category": "external",
"summary": "SUSE Bug 870821 for CVE-2014-2326",
"url": "https://bugzilla.suse.com/870821"
},
{
"category": "external",
"summary": "SUSE Bug 920399 for CVE-2014-2326",
"url": "https://bugzilla.suse.com/920399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2326"
},
{
"cve": "CVE-2014-2327",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2327"
}
],
"notes": [
{
"category": "general",
"text": "Cross-site request forgery (CSRF) vulnerability in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to hijack the authentication of users for unspecified commands, as demonstrated by requests that (1) modify binary files, (2) modify configurations, or (3) add arbitrary users.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2327",
"url": "https://www.suse.com/security/cve/CVE-2014-2327"
},
{
"category": "external",
"summary": "SUSE Bug 920399 for CVE-2014-2327",
"url": "https://bugzilla.suse.com/920399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2327"
},
{
"cve": "CVE-2014-2328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2328"
}
],
"notes": [
{
"category": "general",
"text": "lib/graph_export.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote authenticated users to execute arbitrary commands via shell metacharacters in unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2328",
"url": "https://www.suse.com/security/cve/CVE-2014-2328"
},
{
"category": "external",
"summary": "SUSE Bug 920399 for CVE-2014-2328",
"url": "https://bugzilla.suse.com/920399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2328"
},
{
"cve": "CVE-2014-2708",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2708"
}
],
"notes": [
{
"category": "general",
"text": "Multiple SQL injection vulnerabilities in graph_xport.php in Cacti 0.8.7g, 0.8.8b, and earlier allow remote attackers to execute arbitrary SQL commands via the (1) graph_start, (2) graph_end, (3) graph_height, (4) graph_width, (5) graph_nolegend, (6) print_source, (7) local_graph_id, or (8) rra_id parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2708",
"url": "https://www.suse.com/security/cve/CVE-2014-2708"
},
{
"category": "external",
"summary": "SUSE Bug 872008 for CVE-2014-2708",
"url": "https://bugzilla.suse.com/872008"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-2708"
},
{
"cve": "CVE-2014-2709",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2709"
}
],
"notes": [
{
"category": "general",
"text": "lib/rrd.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified parameters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2709",
"url": "https://www.suse.com/security/cve/CVE-2014-2709"
},
{
"category": "external",
"summary": "SUSE Bug 872008 for CVE-2014-2709",
"url": "https://bugzilla.suse.com/872008"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-2709"
},
{
"cve": "CVE-2014-4002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4002"
}
],
"notes": [
{
"category": "general",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b allow remote attackers to inject arbitrary web script or HTML via the (1) drp_action parameter to cdef.php, (2) data_input.php, (3) data_queries.php, (4) data_sources.php, (5) data_templates.php, (6) graph_templates.php, (7) graphs.php, (8) host.php, or (9) host_templates.php or the (10) graph_template_input_id or (11) graph_template_id parameter to graph_templates_inputs.php.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4002",
"url": "https://www.suse.com/security/cve/CVE-2014-4002"
},
{
"category": "external",
"summary": "SUSE Bug 884326 for CVE-2014-4002",
"url": "https://bugzilla.suse.com/884326"
},
{
"category": "external",
"summary": "SUSE Bug 920399 for CVE-2014-4002",
"url": "https://bugzilla.suse.com/920399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-4002"
},
{
"cve": "CVE-2014-5025",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-5025"
}
],
"notes": [
{
"category": "general",
"text": "Cross-site scripting (XSS) vulnerability in data_sources.php in Cacti 0.8.8b allows remote authenticated users with console access to inject arbitrary web script or HTML via the name_cache parameter in a ds_edit action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-5025",
"url": "https://www.suse.com/security/cve/CVE-2014-5025"
},
{
"category": "external",
"summary": "SUSE Bug 888686 for CVE-2014-5025",
"url": "https://bugzilla.suse.com/888686"
},
{
"category": "external",
"summary": "SUSE Bug 920399 for CVE-2014-5025",
"url": "https://bugzilla.suse.com/920399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2014-5025"
},
{
"cve": "CVE-2014-5026",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-5026"
}
],
"notes": [
{
"category": "general",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b allow remote authenticated users with console access to inject arbitrary web script or HTML via a (1) Graph Tree Title in a delete or (2) edit action; (3) CDEF Name, (4) Data Input Method Name, or (5) Host Templates Name in a delete action; (6) Data Source Title; (7) Graph Title; or (8) Graph Template Name in a delete or (9) duplicate action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-5026",
"url": "https://www.suse.com/security/cve/CVE-2014-5026"
},
{
"category": "external",
"summary": "SUSE Bug 888686 for CVE-2014-5026",
"url": "https://bugzilla.suse.com/888686"
},
{
"category": "external",
"summary": "SUSE Bug 920399 for CVE-2014-5026",
"url": "https://bugzilla.suse.com/920399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2014-5026"
},
{
"cve": "CVE-2015-4342",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-4342"
}
],
"notes": [
{
"category": "general",
"text": "SQL injection vulnerability in Cacti before 0.8.8d allows remote attackers to execute arbitrary SQL commands via unspecified vectors involving a cdef id.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-4342",
"url": "https://www.suse.com/security/cve/CVE-2015-4342"
},
{
"category": "external",
"summary": "SUSE Bug 934187 for CVE-2015-4342",
"url": "https://bugzilla.suse.com/934187"
},
{
"category": "external",
"summary": "SUSE Bug 935199 for CVE-2015-4342",
"url": "https://bugzilla.suse.com/935199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-4342"
},
{
"cve": "CVE-2015-4634",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-4634"
}
],
"notes": [
{
"category": "general",
"text": "SQL injection vulnerability in graphs.php in Cacti before 0.8.8e allows remote attackers to execute arbitrary SQL commands via the local_graph_id parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-4634",
"url": "https://www.suse.com/security/cve/CVE-2015-4634"
},
{
"category": "external",
"summary": "SUSE Bug 937997 for CVE-2015-4634",
"url": "https://bugzilla.suse.com/937997"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-4634"
},
{
"cve": "CVE-2015-8369",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8369"
}
],
"notes": [
{
"category": "general",
"text": "SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8369",
"url": "https://www.suse.com/security/cve/CVE-2015-8369"
},
{
"category": "external",
"summary": "SUSE Bug 958863 for CVE-2015-8369",
"url": "https://bugzilla.suse.com/958863"
},
{
"category": "external",
"summary": "SUSE Bug 958977 for CVE-2015-8369",
"url": "https://bugzilla.suse.com/958977"
},
{
"category": "external",
"summary": "SUSE Bug 960678 for CVE-2015-8369",
"url": "https://bugzilla.suse.com/960678"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-8369"
},
{
"cve": "CVE-2015-8377",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8377"
}
],
"notes": [
{
"category": "general",
"text": "SQL injection vulnerability in the host_new_graphs_save function in graphs_new.php in Cacti 0.8.8f and earlier allows remote authenticated users to execute arbitrary SQL commands via crafted serialized data in the selected_graphs_array parameter in a save action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8377",
"url": "https://www.suse.com/security/cve/CVE-2015-8377"
},
{
"category": "external",
"summary": "SUSE Bug 958863 for CVE-2015-8377",
"url": "https://bugzilla.suse.com/958863"
},
{
"category": "external",
"summary": "SUSE Bug 958977 for CVE-2015-8377",
"url": "https://bugzilla.suse.com/958977"
},
{
"category": "external",
"summary": "SUSE Bug 960678 for CVE-2015-8377",
"url": "https://bugzilla.suse.com/960678"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-8377"
},
{
"cve": "CVE-2015-8604",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8604"
}
],
"notes": [
{
"category": "general",
"text": "SQL injection vulnerability in the host_new_graphs function in graphs_new.php in Cacti 0.8.8f and earlier allows remote authenticated users to execute arbitrary SQL commands via the cg_g parameter in a save action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8604",
"url": "https://www.suse.com/security/cve/CVE-2015-8604"
},
{
"category": "external",
"summary": "SUSE Bug 960678 for CVE-2015-8604",
"url": "https://bugzilla.suse.com/960678"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-8604"
},
{
"cve": "CVE-2016-2313",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2313"
}
],
"notes": [
{
"category": "general",
"text": "auth_login.php in Cacti before 0.8.8g allows remote authenticated users who use web authentication to bypass intended access restrictions by logging in as a user not in the cacti database.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2313",
"url": "https://www.suse.com/security/cve/CVE-2016-2313"
},
{
"category": "external",
"summary": "SUSE Bug 1022564 for CVE-2016-2313",
"url": "https://bugzilla.suse.com/1022564"
},
{
"category": "external",
"summary": "SUSE Bug 1069693 for CVE-2016-2313",
"url": "https://bugzilla.suse.com/1069693"
},
{
"category": "external",
"summary": "SUSE Bug 965930 for CVE-2016-2313",
"url": "https://bugzilla.suse.com/965930"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-2313"
},
{
"cve": "CVE-2016-3172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3172"
}
],
"notes": [
{
"category": "general",
"text": "SQL injection vulnerability in tree.php in Cacti 0.8.8g and earlier allows remote authenticated users to execute arbitrary SQL commands via the parent_id parameter in an item_edit action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3172",
"url": "https://www.suse.com/security/cve/CVE-2016-3172"
},
{
"category": "external",
"summary": "SUSE Bug 971357 for CVE-2016-3172",
"url": "https://bugzilla.suse.com/971357"
},
{
"category": "external",
"summary": "SUSE Bug 974013 for CVE-2016-3172",
"url": "https://bugzilla.suse.com/974013"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-3172"
},
{
"cve": "CVE-2016-3659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3659"
}
],
"notes": [
{
"category": "general",
"text": "SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3659",
"url": "https://www.suse.com/security/cve/CVE-2016-3659"
},
{
"category": "external",
"summary": "SUSE Bug 974013 for CVE-2016-3659",
"url": "https://bugzilla.suse.com/974013"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-3659"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…