The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Cacti

Cacti: Cross Site Scripting via Template Import Preview
An attacker can trigger a Cross Site Scripting via Template Import Preview of Cacti, in order to run JavaScript code in the context of the web site...
VIGILANCE-VUL-32993
Cacti: SQL injection via Editing Colors
An attacker can use a SQL injection via Editing Colors of Cacti, in order to read or alter data...
CVE-2020-14295, FEDORA-2020-7dddce530c, FEDORA-2020-8a15713da2, openSUSE-SU-2020:1060-1, openSUSE-SU-2020:1106-1, VIGILANCE-VUL-32795
Cacti: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cacti, in order to run JavaScript code in the context of the web site...
VIGILANCE-VUL-32794
PHPMailer: Cross Site Scripting via File Attachment Names
An attacker can trigger a Cross Site Scripting via File Attachment Names of PHPMailer, in order to run JavaScript code in the context of the web site...
CVE-2020-13625, DLA-2244-1, DLA-2306-1, FEDORA-2020-06e87e71fe, FEDORA-2020-0bbe6304e3, FEDORA-2020-6d2e1105f2, FEDORA-2020-7dddce530c, FEDORA-2020-8a15713da2, FEDORA-2020-d67df93aa6, openSUSE-SU-2020:1060-1, openSUSE-SU-2020:1106-1, USN-4505-1, VIGILANCE-VUL-32453
Cacti: Cross Site Scripting via Color Items
An attacker can trigger a Cross Site Scripting via Color Items of Cacti, in order to run JavaScript code in the context of the web site...
CVE-2020-7106-ERROR, openSUSE-SU-2020:0654-1, VIGILANCE-VUL-32169
jQuery Core: Cross Site Scripting via HtmlPrefilter Regex
An attacker can trigger a Cross Site Scripting via HtmlPrefilter Regex of jQuery Core, in order to run JavaScript code in the context of the web site...
20200601, 20200602, 20200603, 20200604, 20200605, 6217392, 6253319, 6344075, CERTFR-2020-AVI-310, CERTFR-2020-AVI-335, cpujul2020, cpuoct2020, CVE-2020-11022, CVE-2020-11023, DRUPAL-SA-CORE-2020-002, DRUPAL-SA-CORE-2020-003, DSA-4693-1, FEDORA-2020-0b32a59b54, FEDORA-2020-11be4b36d4, FEDORA-2020-7dddce530c, FEDORA-2020-8a15713da2, FEDORA-2020-fbb94073a1, K02453220, K66544153, NPM-1518, openSUSE-SU-2020:1060-1, openSUSE-SU-2020:1106-1, OSA-2020-14, RHSA-2020:3936-01, VIGILANCE-VUL-32007
Cacti: multiple vulnerabilities
An attacker can use several vulnerabilities of Cacti...
CVE-2020-13230, CVE-2020-13231, FEDORA-2020-70fa57d566, FEDORA-2020-8560db8779, FEDORA-2020-c1745db1aa, FEDORA-2020-d50b988a2f, VIGILANCE-VUL-31941
Cacti: code execution via Data Input Method
An attacker can use a vulnerability via Data Input Method of Cacti, in order to run code...
CVE-2009-4112, DSA-1954-1, openSUSE-SU-2020:0272-1, openSUSE-SU-2020:0284-1, openSUSE-SU-2020:0558-1, openSUSE-SU-2020:0565-1, SUSE-SR:2009:020, VIGILANCE-VUL-31715
Cacti: code execution via Graph Real-time Privilege
An attacker can use a vulnerability via Graph Real-time Privilege of Cacti, in order to run code...
3285, CVE-2020-8813, FEDORA-2020-10fe60d68b, FEDORA-2020-552e4e7879, openSUSE-SU-2020:0272-1, openSUSE-SU-2020:0558-1, openSUSE-SU-2020:0565-1, VIGILANCE-VUL-31659
Cacti: code execution via Performance Boost Debug Log
An attacker can use a vulnerability via Performance Boost Debug Log of Cacti, in order to run code...
3201, CVE-2020-7237, FEDORA-2020-0fc6dd0fd2, FEDORA-2020-90f1c8229e, openSUSE-SU-2020:0272-1, openSUSE-SU-2020:0284-1, openSUSE-SU-2020:0558-1, openSUSE-SU-2020:0565-1, VIGILANCE-VUL-31370
Our database contains other pages. You can request a free trial to read them.

Display information about Cacti: