Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-3659 (GCVE-0-2016-3659)
Vulnerability from cvelistv5 – Published: 2016-04-11 15:00 – Updated: 2024-08-06 00:03
VLAI?
EPSS
Summary
SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Date Public ?
2016-03-31 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T00:03:34.424Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "GLSA-201607-05",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201607-05"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugs.cacti.net/view.php?id=2673"
},
{
"name": "20160404 [CVE-2016-3659]Cacti graph_view.php SQL Injection Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2016/Apr/4"
},
{
"name": "openSUSE-SU-2016:1328",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00074.html"
},
{
"name": "85806",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/85806"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-03-31T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-11-29T16:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "GLSA-201607-05",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201607-05"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugs.cacti.net/view.php?id=2673"
},
{
"name": "20160404 [CVE-2016-3659]Cacti graph_view.php SQL Injection Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2016/Apr/4"
},
{
"name": "openSUSE-SU-2016:1328",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00074.html"
},
{
"name": "85806",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/85806"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-3659",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "GLSA-201607-05",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-05"
},
{
"name": "http://bugs.cacti.net/view.php?id=2673",
"refsource": "MISC",
"url": "http://bugs.cacti.net/view.php?id=2673"
},
{
"name": "20160404 [CVE-2016-3659]Cacti graph_view.php SQL Injection Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Apr/4"
},
{
"name": "openSUSE-SU-2016:1328",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00074.html"
},
{
"name": "85806",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/85806"
},
{
"name": "http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2016-3659",
"datePublished": "2016-04-11T15:00:00.000Z",
"dateReserved": "2016-03-24T00:00:00.000Z",
"dateUpdated": "2024-08-06T00:03:34.424Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2016-3659",
"date": "2026-04-26",
"epss": "0.00587",
"percentile": "0.69184"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2016-3659\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2016-04-11T15:59:07.657\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de inyecci\u00f3n SQL en graph_view.php en Cacti 0.8.8.g permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro host_group_data.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-89\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.8.8g\",\"matchCriteriaId\":\"0BADE3A0-FB6D-42BD-9BAF-CB6BF20CE47F\"}]}]}],\"references\":[{\"url\":\"http://bugs.cacti.net/view.php?id=2673\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-05/msg00074.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://seclists.org/fulldisclosure/2016/Apr/4\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/bid/85806\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201607-05\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.cacti.net/view.php?id=2673\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-05/msg00074.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://seclists.org/fulldisclosure/2016/Apr/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/bid/85806\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201607-05\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
OPENSUSE-SU-2024:10084-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
cacti-0.8.8h-1.2 on GA media
Severity
Moderate
Notes
Title of the patch: cacti-0.8.8h-1.2 on GA media
Description of the patch: These are all security issues fixed in the cacti-0.8.8h-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-10084
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "cacti-0.8.8h-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the cacti-0.8.8h-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10084",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10084-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-5588 page",
"url": "https://www.suse.com/security/cve/CVE-2013-5588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-5589 page",
"url": "https://www.suse.com/security/cve/CVE-2013-5589/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2326 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2326/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2327 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2327/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2328 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2708 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2708/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2709 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2709/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4002 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-5025 page",
"url": "https://www.suse.com/security/cve/CVE-2014-5025/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-5026 page",
"url": "https://www.suse.com/security/cve/CVE-2014-5026/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-4342 page",
"url": "https://www.suse.com/security/cve/CVE-2015-4342/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-4634 page",
"url": "https://www.suse.com/security/cve/CVE-2015-4634/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8369 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8369/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8377 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8377/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8604 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8604/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2313 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2313/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3172 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3659 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3659/"
}
],
"title": "cacti-0.8.8h-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10084-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cacti-0.8.8h-1.2.aarch64",
"product": {
"name": "cacti-0.8.8h-1.2.aarch64",
"product_id": "cacti-0.8.8h-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "cacti-doc-0.8.8h-1.2.aarch64",
"product": {
"name": "cacti-doc-0.8.8h-1.2.aarch64",
"product_id": "cacti-doc-0.8.8h-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "cacti-0.8.8h-1.2.ppc64le",
"product": {
"name": "cacti-0.8.8h-1.2.ppc64le",
"product_id": "cacti-0.8.8h-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "cacti-doc-0.8.8h-1.2.ppc64le",
"product": {
"name": "cacti-doc-0.8.8h-1.2.ppc64le",
"product_id": "cacti-doc-0.8.8h-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cacti-0.8.8h-1.2.s390x",
"product": {
"name": "cacti-0.8.8h-1.2.s390x",
"product_id": "cacti-0.8.8h-1.2.s390x"
}
},
{
"category": "product_version",
"name": "cacti-doc-0.8.8h-1.2.s390x",
"product": {
"name": "cacti-doc-0.8.8h-1.2.s390x",
"product_id": "cacti-doc-0.8.8h-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cacti-0.8.8h-1.2.x86_64",
"product": {
"name": "cacti-0.8.8h-1.2.x86_64",
"product_id": "cacti-0.8.8h-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "cacti-doc-0.8.8h-1.2.x86_64",
"product": {
"name": "cacti-doc-0.8.8h-1.2.x86_64",
"product_id": "cacti-doc-0.8.8h-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cacti-0.8.8h-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64"
},
"product_reference": "cacti-0.8.8h-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cacti-0.8.8h-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le"
},
"product_reference": "cacti-0.8.8h-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cacti-0.8.8h-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x"
},
"product_reference": "cacti-0.8.8h-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cacti-0.8.8h-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64"
},
"product_reference": "cacti-0.8.8h-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cacti-doc-0.8.8h-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64"
},
"product_reference": "cacti-doc-0.8.8h-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cacti-doc-0.8.8h-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le"
},
"product_reference": "cacti-doc-0.8.8h-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cacti-doc-0.8.8h-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x"
},
"product_reference": "cacti-doc-0.8.8h-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cacti-doc-0.8.8h-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
},
"product_reference": "cacti-doc-0.8.8h-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-5588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-5588"
}
],
"notes": [
{
"category": "general",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the step parameter to install/index.php or (2) the id parameter to cacti/host.php.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-5588",
"url": "https://www.suse.com/security/cve/CVE-2013-5588"
},
{
"category": "external",
"summary": "SUSE Bug 837440 for CVE-2013-5588",
"url": "https://bugzilla.suse.com/837440"
},
{
"category": "external",
"summary": "SUSE Bug 920399 for CVE-2013-5588",
"url": "https://bugzilla.suse.com/920399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2013-5588"
},
{
"cve": "CVE-2013-5589",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-5589"
}
],
"notes": [
{
"category": "general",
"text": "SQL injection vulnerability in cacti/host.php in Cacti 0.8.8b and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-5589",
"url": "https://www.suse.com/security/cve/CVE-2013-5589"
},
{
"category": "external",
"summary": "SUSE Bug 837440 for CVE-2013-5589",
"url": "https://bugzilla.suse.com/837440"
},
{
"category": "external",
"summary": "SUSE Bug 920399 for CVE-2013-5589",
"url": "https://bugzilla.suse.com/920399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2013-5589"
},
{
"cve": "CVE-2014-2326",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2326"
}
],
"notes": [
{
"category": "general",
"text": "Cross-site scripting (XSS) vulnerability in cdef.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2326",
"url": "https://www.suse.com/security/cve/CVE-2014-2326"
},
{
"category": "external",
"summary": "SUSE Bug 870821 for CVE-2014-2326",
"url": "https://bugzilla.suse.com/870821"
},
{
"category": "external",
"summary": "SUSE Bug 920399 for CVE-2014-2326",
"url": "https://bugzilla.suse.com/920399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2326"
},
{
"cve": "CVE-2014-2327",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2327"
}
],
"notes": [
{
"category": "general",
"text": "Cross-site request forgery (CSRF) vulnerability in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to hijack the authentication of users for unspecified commands, as demonstrated by requests that (1) modify binary files, (2) modify configurations, or (3) add arbitrary users.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2327",
"url": "https://www.suse.com/security/cve/CVE-2014-2327"
},
{
"category": "external",
"summary": "SUSE Bug 920399 for CVE-2014-2327",
"url": "https://bugzilla.suse.com/920399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2327"
},
{
"cve": "CVE-2014-2328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2328"
}
],
"notes": [
{
"category": "general",
"text": "lib/graph_export.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote authenticated users to execute arbitrary commands via shell metacharacters in unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2328",
"url": "https://www.suse.com/security/cve/CVE-2014-2328"
},
{
"category": "external",
"summary": "SUSE Bug 920399 for CVE-2014-2328",
"url": "https://bugzilla.suse.com/920399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2328"
},
{
"cve": "CVE-2014-2708",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2708"
}
],
"notes": [
{
"category": "general",
"text": "Multiple SQL injection vulnerabilities in graph_xport.php in Cacti 0.8.7g, 0.8.8b, and earlier allow remote attackers to execute arbitrary SQL commands via the (1) graph_start, (2) graph_end, (3) graph_height, (4) graph_width, (5) graph_nolegend, (6) print_source, (7) local_graph_id, or (8) rra_id parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2708",
"url": "https://www.suse.com/security/cve/CVE-2014-2708"
},
{
"category": "external",
"summary": "SUSE Bug 872008 for CVE-2014-2708",
"url": "https://bugzilla.suse.com/872008"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-2708"
},
{
"cve": "CVE-2014-2709",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2709"
}
],
"notes": [
{
"category": "general",
"text": "lib/rrd.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified parameters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2709",
"url": "https://www.suse.com/security/cve/CVE-2014-2709"
},
{
"category": "external",
"summary": "SUSE Bug 872008 for CVE-2014-2709",
"url": "https://bugzilla.suse.com/872008"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-2709"
},
{
"cve": "CVE-2014-4002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4002"
}
],
"notes": [
{
"category": "general",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b allow remote attackers to inject arbitrary web script or HTML via the (1) drp_action parameter to cdef.php, (2) data_input.php, (3) data_queries.php, (4) data_sources.php, (5) data_templates.php, (6) graph_templates.php, (7) graphs.php, (8) host.php, or (9) host_templates.php or the (10) graph_template_input_id or (11) graph_template_id parameter to graph_templates_inputs.php.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4002",
"url": "https://www.suse.com/security/cve/CVE-2014-4002"
},
{
"category": "external",
"summary": "SUSE Bug 884326 for CVE-2014-4002",
"url": "https://bugzilla.suse.com/884326"
},
{
"category": "external",
"summary": "SUSE Bug 920399 for CVE-2014-4002",
"url": "https://bugzilla.suse.com/920399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-4002"
},
{
"cve": "CVE-2014-5025",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-5025"
}
],
"notes": [
{
"category": "general",
"text": "Cross-site scripting (XSS) vulnerability in data_sources.php in Cacti 0.8.8b allows remote authenticated users with console access to inject arbitrary web script or HTML via the name_cache parameter in a ds_edit action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-5025",
"url": "https://www.suse.com/security/cve/CVE-2014-5025"
},
{
"category": "external",
"summary": "SUSE Bug 888686 for CVE-2014-5025",
"url": "https://bugzilla.suse.com/888686"
},
{
"category": "external",
"summary": "SUSE Bug 920399 for CVE-2014-5025",
"url": "https://bugzilla.suse.com/920399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2014-5025"
},
{
"cve": "CVE-2014-5026",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-5026"
}
],
"notes": [
{
"category": "general",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b allow remote authenticated users with console access to inject arbitrary web script or HTML via a (1) Graph Tree Title in a delete or (2) edit action; (3) CDEF Name, (4) Data Input Method Name, or (5) Host Templates Name in a delete action; (6) Data Source Title; (7) Graph Title; or (8) Graph Template Name in a delete or (9) duplicate action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-5026",
"url": "https://www.suse.com/security/cve/CVE-2014-5026"
},
{
"category": "external",
"summary": "SUSE Bug 888686 for CVE-2014-5026",
"url": "https://bugzilla.suse.com/888686"
},
{
"category": "external",
"summary": "SUSE Bug 920399 for CVE-2014-5026",
"url": "https://bugzilla.suse.com/920399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2014-5026"
},
{
"cve": "CVE-2015-4342",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-4342"
}
],
"notes": [
{
"category": "general",
"text": "SQL injection vulnerability in Cacti before 0.8.8d allows remote attackers to execute arbitrary SQL commands via unspecified vectors involving a cdef id.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-4342",
"url": "https://www.suse.com/security/cve/CVE-2015-4342"
},
{
"category": "external",
"summary": "SUSE Bug 934187 for CVE-2015-4342",
"url": "https://bugzilla.suse.com/934187"
},
{
"category": "external",
"summary": "SUSE Bug 935199 for CVE-2015-4342",
"url": "https://bugzilla.suse.com/935199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-4342"
},
{
"cve": "CVE-2015-4634",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-4634"
}
],
"notes": [
{
"category": "general",
"text": "SQL injection vulnerability in graphs.php in Cacti before 0.8.8e allows remote attackers to execute arbitrary SQL commands via the local_graph_id parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-4634",
"url": "https://www.suse.com/security/cve/CVE-2015-4634"
},
{
"category": "external",
"summary": "SUSE Bug 937997 for CVE-2015-4634",
"url": "https://bugzilla.suse.com/937997"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-4634"
},
{
"cve": "CVE-2015-8369",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8369"
}
],
"notes": [
{
"category": "general",
"text": "SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8369",
"url": "https://www.suse.com/security/cve/CVE-2015-8369"
},
{
"category": "external",
"summary": "SUSE Bug 958863 for CVE-2015-8369",
"url": "https://bugzilla.suse.com/958863"
},
{
"category": "external",
"summary": "SUSE Bug 958977 for CVE-2015-8369",
"url": "https://bugzilla.suse.com/958977"
},
{
"category": "external",
"summary": "SUSE Bug 960678 for CVE-2015-8369",
"url": "https://bugzilla.suse.com/960678"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-8369"
},
{
"cve": "CVE-2015-8377",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8377"
}
],
"notes": [
{
"category": "general",
"text": "SQL injection vulnerability in the host_new_graphs_save function in graphs_new.php in Cacti 0.8.8f and earlier allows remote authenticated users to execute arbitrary SQL commands via crafted serialized data in the selected_graphs_array parameter in a save action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8377",
"url": "https://www.suse.com/security/cve/CVE-2015-8377"
},
{
"category": "external",
"summary": "SUSE Bug 958863 for CVE-2015-8377",
"url": "https://bugzilla.suse.com/958863"
},
{
"category": "external",
"summary": "SUSE Bug 958977 for CVE-2015-8377",
"url": "https://bugzilla.suse.com/958977"
},
{
"category": "external",
"summary": "SUSE Bug 960678 for CVE-2015-8377",
"url": "https://bugzilla.suse.com/960678"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-8377"
},
{
"cve": "CVE-2015-8604",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8604"
}
],
"notes": [
{
"category": "general",
"text": "SQL injection vulnerability in the host_new_graphs function in graphs_new.php in Cacti 0.8.8f and earlier allows remote authenticated users to execute arbitrary SQL commands via the cg_g parameter in a save action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8604",
"url": "https://www.suse.com/security/cve/CVE-2015-8604"
},
{
"category": "external",
"summary": "SUSE Bug 960678 for CVE-2015-8604",
"url": "https://bugzilla.suse.com/960678"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-8604"
},
{
"cve": "CVE-2016-2313",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2313"
}
],
"notes": [
{
"category": "general",
"text": "auth_login.php in Cacti before 0.8.8g allows remote authenticated users who use web authentication to bypass intended access restrictions by logging in as a user not in the cacti database.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2313",
"url": "https://www.suse.com/security/cve/CVE-2016-2313"
},
{
"category": "external",
"summary": "SUSE Bug 1022564 for CVE-2016-2313",
"url": "https://bugzilla.suse.com/1022564"
},
{
"category": "external",
"summary": "SUSE Bug 1069693 for CVE-2016-2313",
"url": "https://bugzilla.suse.com/1069693"
},
{
"category": "external",
"summary": "SUSE Bug 965930 for CVE-2016-2313",
"url": "https://bugzilla.suse.com/965930"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-2313"
},
{
"cve": "CVE-2016-3172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3172"
}
],
"notes": [
{
"category": "general",
"text": "SQL injection vulnerability in tree.php in Cacti 0.8.8g and earlier allows remote authenticated users to execute arbitrary SQL commands via the parent_id parameter in an item_edit action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3172",
"url": "https://www.suse.com/security/cve/CVE-2016-3172"
},
{
"category": "external",
"summary": "SUSE Bug 971357 for CVE-2016-3172",
"url": "https://bugzilla.suse.com/971357"
},
{
"category": "external",
"summary": "SUSE Bug 974013 for CVE-2016-3172",
"url": "https://bugzilla.suse.com/974013"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-3172"
},
{
"cve": "CVE-2016-3659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3659"
}
],
"notes": [
{
"category": "general",
"text": "SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3659",
"url": "https://www.suse.com/security/cve/CVE-2016-3659"
},
{
"category": "external",
"summary": "SUSE Bug 974013 for CVE-2016-3659",
"url": "https://bugzilla.suse.com/974013"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-0.8.8h-1.2.x86_64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.aarch64",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.ppc64le",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.s390x",
"openSUSE Tumbleweed:cacti-doc-0.8.8h-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-3659"
}
]
}
CNVD-2016-02028
Vulnerability from cnvd - Published: 2016-04-07
VLAI Severity ?
Title
Cacti SQL注入漏洞(CNVD-2016-02028)
Description
Cacti是Cacti集团的一套开源的网络流量监测和分析工具。该工具通过snmpget来获取数据,使用RRDtool绘画图形进行分析,并提供数据和用户管理功能。
Cacti 0.8.8g及之前版本中存在SQL注入漏洞。远程攻击者可利用该漏洞执行任意SQL命令。
Severity
高
Formal description
目前厂商还没有提供此漏洞的相关补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://cacti.net/
Reference
https://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html
Impacted products
| Name | Cacti Cacti <=0.8.8g |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2016-3659"
}
},
"description": "Cacti\u662fCacti\u96c6\u56e2\u7684\u4e00\u5957\u5f00\u6e90\u7684\u7f51\u7edc\u6d41\u91cf\u76d1\u6d4b\u548c\u5206\u6790\u5de5\u5177\u3002\u8be5\u5de5\u5177\u901a\u8fc7snmpget\u6765\u83b7\u53d6\u6570\u636e\uff0c\u4f7f\u7528RRDtool\u7ed8\u753b\u56fe\u5f62\u8fdb\u884c\u5206\u6790\uff0c\u5e76\u63d0\u4f9b\u6570\u636e\u548c\u7528\u6237\u7ba1\u7406\u529f\u80fd\u3002\r\n\r\nCacti 0.8.8g\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728SQL\u6ce8\u5165\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610fSQL\u547d\u4ee4\u3002",
"discovererName": "Xiaotian Wang",
"formalWay": "\u76ee\u524d\u5382\u5546\u8fd8\u6ca1\u6709\u63d0\u4f9b\u6b64\u6f0f\u6d1e\u7684\u76f8\u5173\u8865\u4e01\u6216\u8005\u5347\u7ea7\u7a0b\u5e8f\uff0c\u5efa\u8bae\u4f7f\u7528\u6b64\u8f6f\u4ef6\u7684\u7528\u6237\u968f\u65f6\u5173\u6ce8\u5382\u5546\u7684\u4e3b\u9875\u4ee5\u83b7\u53d6\u6700\u65b0\u7248\u672c\uff1a\r\nhttp://cacti.net/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-02028",
"openTime": "2016-04-07",
"products": {
"product": "Cacti Cacti \u003c=0.8.8g"
},
"referenceLink": "https://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html",
"serverity": "\u9ad8",
"submitTime": "2016-04-06",
"title": "Cacti SQL\u6ce8\u5165\u6f0f\u6d1e\uff08CNVD-2016-02028\uff09"
}
GSD-2016-3659
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2016-3659",
"description": "SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter.",
"id": "GSD-2016-3659",
"references": [
"https://www.suse.com/security/cve/CVE-2016-3659.html",
"https://advisories.mageia.org/CVE-2016-3659.html",
"https://alas.aws.amazon.com/cve/html/CVE-2016-3659.html",
"https://packetstormsecurity.com/files/cve/CVE-2016-3659"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-3659"
],
"details": "SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter.",
"id": "GSD-2016-3659",
"modified": "2023-12-13T01:21:27.896222Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-3659",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "GLSA-201607-05",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-05"
},
{
"name": "http://bugs.cacti.net/view.php?id=2673",
"refsource": "MISC",
"url": "http://bugs.cacti.net/view.php?id=2673"
},
{
"name": "20160404 [CVE-2016-3659]Cacti graph_view.php SQL Injection Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Apr/4"
},
{
"name": "openSUSE-SU-2016:1328",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00074.html"
},
{
"name": "85806",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/85806"
},
{
"name": "http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "0.8.8g",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-3659"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://bugs.cacti.net/view.php?id=2673",
"refsource": "MISC",
"tags": [
"Exploit"
],
"url": "http://bugs.cacti.net/view.php?id=2673"
},
{
"name": "20160404 [CVE-2016-3659]Cacti graph_view.php SQL Injection Vulnerability",
"refsource": "FULLDISC",
"tags": [
"Exploit"
],
"url": "http://seclists.org/fulldisclosure/2016/Apr/4"
},
{
"name": "http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html",
"refsource": "MISC",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html"
},
{
"name": "GLSA-201607-05",
"refsource": "GENTOO",
"tags": [],
"url": "https://security.gentoo.org/glsa/201607-05"
},
{
"name": "85806",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/85806"
},
{
"name": "openSUSE-SU-2016:1328",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00074.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM"
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2016-12-01T03:10Z",
"publishedDate": "2016-04-11T15:59Z"
}
}
}
GHSA-GFQC-77C8-MW92
Vulnerability from github – Published: 2022-05-17 03:35 – Updated: 2022-05-17 03:35
VLAI?
Details
SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter.
Severity ?
8.8 (High)
{
"affected": [],
"aliases": [
"CVE-2016-3659"
],
"database_specific": {
"cwe_ids": [
"CWE-89"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2016-04-11T15:59:00Z",
"severity": "HIGH"
},
"details": "SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter.",
"id": "GHSA-gfqc-77c8-mw92",
"modified": "2022-05-17T03:35:54Z",
"published": "2022-05-17T03:35:54Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3659"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201607-05"
},
{
"type": "WEB",
"url": "http://bugs.cacti.net/view.php?id=2673"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00074.html"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2016/Apr/4"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/85806"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2016-3659
Vulnerability from fkie_nvd - Published: 2016-04-11 15:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://bugs.cacti.net/view.php?id=2673 | Exploit | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2016-05/msg00074.html | ||
| cve@mitre.org | http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html | Exploit | |
| cve@mitre.org | http://seclists.org/fulldisclosure/2016/Apr/4 | Exploit | |
| cve@mitre.org | http://www.securityfocus.com/bid/85806 | ||
| cve@mitre.org | https://security.gentoo.org/glsa/201607-05 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://bugs.cacti.net/view.php?id=2673 | Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2016-05/msg00074.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html | Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2016/Apr/4 | Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/85806 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201607-05 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0BADE3A0-FB6D-42BD-9BAF-CB6BF20CE47F",
"versionEndIncluding": "0.8.8g",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en graph_view.php en Cacti 0.8.8.g permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro host_group_data."
}
],
"id": "CVE-2016-3659",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-04-11T15:59:07.657",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://bugs.cacti.net/view.php?id=2673"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00074.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://seclists.org/fulldisclosure/2016/Apr/4"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/85806"
},
{
"source": "cve@mitre.org",
"url": "https://security.gentoo.org/glsa/201607-05"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://bugs.cacti.net/view.php?id=2673"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00074.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://seclists.org/fulldisclosure/2016/Apr/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/85806"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201607-05"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…