cacti vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the cacti package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Arbitrary Code Injection

<1.2.28-r0
  • M
Cross-site Scripting (XSS)

<1.2.28-r0
  • H
Cross-site Scripting (XSS)

<1.2.28-r0
  • H
Cross-site Scripting (XSS)

<1.2.28-r0
  • H
OS Command Injection

<1.2.8-r0
  • H
CVE-2024-25641

<1.2.27-r0
  • H
SQL Injection

<1.2.27-r0
  • H
OS Command Injection

<1.2.8-r0
  • H
CVE-2024-31459

<1.2.27-r0
  • M
Cross-site Scripting (XSS)

<1.2.27-r0
  • M
Cross-site Scripting (XSS)

<1.2.27-r0
  • C
Insufficient Comparison

<1.2.27-r0
  • M
Cross-site Scripting (XSS)

<1.2.8-r0
  • H
SQL Injection

<1.2.27-r0
  • H
Improper Input Validation

<1.2.25-r0
  • M
Cross-site Scripting (XSS)

<1.2.27-r0
  • M
SQL Injection

<1.2.25-r0
  • H
SQL Injection

<1.2.27-r0
  • M
SQL Injection

<1.2.26-r0
  • H
PHP Remote File Inclusion

<1.2.26-r0
  • M
Cross-site Scripting (XSS)

<1.2.26-r0
  • H
SQL Injection

<1.2.25-r0
  • H
OS Command Injection

<1.2.25-r0
  • M
Cross-site Scripting (XSS)

<1.2.25-r0
  • M
Cross-site Scripting (XSS)

<1.2.25-r0
  • M
Cross-site Scripting (XSS)

<1.2.26-r0
  • H
SQL Injection

<1.2.26-r0
  • M
Open Redirect

<1.2.25-r0
  • M
Cross-site Scripting (XSS)

<1.2.26-r0
  • M
Cross-site Scripting (XSS)

<1.2.25-r0
  • M
Deserialization of Untrusted Data

<1.2.25-r0
  • H
SQL Injection

<1.2.26-r0
  • M
Cross-site Scripting (XSS)

<1.2.25-r0
  • M
Cross-site Scripting (XSS)

<1.2.25-r0
  • H
SQL Injection

<1.2.25-r0
  • M
Cross-site Scripting (XSS)

<1.2.25-r0
  • M
Cross-site Scripting (XSS)

<1.2.13-r0
  • C
SQL Injection

<1.2.25-r0
  • M
Cross-site Scripting (XSS)

<1.2.25-r0
  • H
SQL Injection

<1.2.13-r0
  • M
Cross-site Scripting (XSS)

<1.2.25-r0
  • M
Cross-site Scripting (XSS)

<1.2.25-r0
  • C
Improper Authentication

<1.2.20-r0
  • H
Improper Encoding or Escaping of Output

<1.2.13-r0
  • M
Cross-site Scripting (XSS)

<1.2.13-r0
  • H
SQL Injection

<1.2.17-r0
  • M
Cross-site Scripting (XSS)

<1.2.25-r0