Cacti

Cacti

140 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.33%
  • Veröffentlicht 05.09.2023 21:15:46
  • Zuletzt bearbeitet 21.11.2024 08:15:15

Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data stored in the _cacti_'s database. These data...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 22.08.2023 19:16:31
  • Zuletzt bearbeitet 21.11.2024 07:33:29

In Cacti 1.2.19, there is an authentication bypass in the web login functionality because of improper validation in the PHP code: cacti_ldap_auth() allows a zero as the password.

Exploit
  • EPSS 0.6%
  • Veröffentlicht 22.08.2023 19:16:31
  • Zuletzt bearbeitet 21.11.2024 07:33:30

A reflected cross-site scripting (XSS) vulnerability in Cacti 0.8.7g and earlier allows unauthenticated remote attackers to inject arbitrary web script or HTML in the "ref" parameter at auth_changepassword.php.

Exploit
  • EPSS 0.29%
  • Veröffentlicht 22.08.2023 19:16:28
  • Zuletzt bearbeitet 04.11.2025 16:15:52

Cross Site Scripting (XSS) vulnerability in Cacti 1.2.21 via crafted POST request to graphs_new.php.

  • EPSS 0.62%
  • Veröffentlicht 10.08.2023 15:15:09
  • Zuletzt bearbeitet 21.11.2024 08:11:54

Cacti before 1.2.6 allows IDOR (Insecure Direct Object Reference) for accessing any graph via a modified local_graph_id parameter to graph_xport.php. This is a different vulnerability than CVE-2019-16723.

Warnung Exploit
  • EPSS 94.47%
  • Veröffentlicht 05.12.2022 21:15:10
  • Zuletzt bearbeitet 24.10.2025 14:47:01

Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code o...

  • EPSS 0.32%
  • Veröffentlicht 03.03.2022 23:15:08
  • Zuletzt bearbeitet 21.11.2024 06:39:16

Under certain ldap conditions, Cacti authentication can be bypassed with certain credential types.

  • EPSS 0.49%
  • Veröffentlicht 19.01.2022 21:15:08
  • Zuletzt bearbeitet 21.11.2024 05:51:24

Cacti 1.1.38 allows authenticated users with User Management permissions to inject arbitrary web script or HTML in the "new_username" field during creation of a new user via "Copy" method at user_admin.php.

  • EPSS 21.04%
  • Veröffentlicht 19.01.2022 21:15:08
  • Zuletzt bearbeitet 21.11.2024 05:55:58

As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" to successfully execute the JavaScript payload present in the "ref" URL parameter.

  • EPSS 0.26%
  • Veröffentlicht 19.01.2022 21:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:31

Cacti 1.1.38 allows authenticated users with User Management permissions to inject arbitrary HTML in the group_prefix field during the creation of a new group via "Copy" method at user_group_admin.php.