cacti vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the cacti package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Improper Preservation of Permissions

*
  • M
Cross-site Scripting (XSS)

<0.8.8b+dfsg-8+deb8u9
  • H
Improper Input Validation

*
  • H
Out-of-bounds Write

<0.8.8b+dfsg-8+deb8u8
  • M
Cross-site Scripting (XSS)

<0.8.8b+dfsg-8+deb8u7
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • H
Access Restriction Bypass

<0.8.8b+dfsg-8+deb8u6
  • H
Arbitrary Code Injection

<0.8.8b+dfsg-8+deb8u2
  • H
OS Command Injection

*
  • H
SQL Injection

*
  • M
Cross-site Scripting (XSS)

<0.8.8b+dfsg-6
  • H
Access Restriction Bypass

<0.8.8b+dfsg-8+deb8u5
  • H
SQL Injection

<0.8.8b+dfsg-8+deb8u5
  • H
SQL Injection

<0.8.8b+dfsg-8+deb8u4
  • H
SQL Injection

<0.8.8b+dfsg-8+deb8u5
  • H
SQL Injection

<0.8.8b+dfsg-8+deb8u3
  • M
SQL Injection

<0.8.8b+dfsg-8+deb8u4
  • H
SQL Injection

<0.8.8b+dfsg-8+deb8u2
  • M
Cross-site Scripting (XSS)

<0.8.8b+dfsg-8+deb8u1
  • H
SQL Injection

<0.8.8b+dfsg-8+deb8u1
  • M
Cross-site Scripting (XSS)

<0.8.8b+dfsg-8+deb8u1
  • H
SQL Injection

<0.8.8b+dfsg-8+deb8u1
  • M
SQL Injection

<0.8.6f-1
  • L
Cross-site Scripting (XSS)

<0.8.8b+dfsg-7
  • L
Cross-site Scripting (XSS)

<0.8.8b+dfsg-7
  • H
SQL Injection

<0.8.8b+dfsg-8
  • H
Arbitrary Code Injection

<0.8.8b+dfsg-8
  • M
Cross-site Scripting (XSS)

<0.8.8b+dfsg-6
  • M
CVE-2014-2328

<0.8.8b+dfsg-4
  • H
CVE-2014-2709

<0.8.8b+dfsg-4
  • M
Cross-site Request Forgery (CSRF)

<0.8.8b+dfsg-6
  • H
SQL Injection

<0.8.8b+dfsg-4
  • M
Cross-site Scripting (XSS)

<0.8.8b+dfsg-4
  • H
SQL Injection

<0.8.8b+dfsg-3
  • M
Cross-site Scripting (XSS)

<0.8.8b+dfsg-3
  • H
SQL Injection

<0.8.8b+dfsg-1
  • H
Arbitrary Code Injection

<0.8.8b+dfsg-1
  • M
Cross-site Scripting (XSS)

<0.8.7i-1
  • H
SQL Injection

<0.8.7i-1
  • M
Improper Input Validation

<0.8.7g-1
  • M
Cross-site Scripting (XSS)

<0.8.7g-1
  • M
Cross-site Scripting (XSS)

<0.8.7g-1
  • M
Cross-site Scripting (XSS)

<0.8.7g-1
  • M
Cross-site Scripting (XSS)

<0.8.7g-1
  • H
SQL Injection

<0.8.7e-4
  • H
SQL Injection

<0.8.7e-3
  • H
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

<0.8.7e-1.1
  • M
Arbitrary Code Injection

<0.8.7b-1
  • M
Cross-site Scripting (XSS)

<0.8.7b-1
  • M
Information Exposure

<0.8.7b-1
  • H
SQL Injection

<0.8.7b-1
  • H
SQL Injection

<0.8.7a-1
  • M
CVE-2007-3113

<0.8.6j-1.1
  • H
CVE-2007-3112

<0.8.6j-1.1
  • H
CVE-2006-6799

<0.8.6i-3
  • M
Cross-site Scripting (XSS)

<0.8.6d-1
  • M
CVE-2006-0410

<0.8.6d-1
  • H
CVE-2006-0147

<0.8.6d-1
  • H
SQL Injection

<0.8.6d-1
  • H
CVE-2005-2148

<0.8.6f-1
  • C
CVE-2005-2149

<0.8.6f-1
  • M
CVE-2005-1524

<0.8.6e-1
  • H
CVE-2005-1525

<0.8.6e-1
  • H
CVE-2005-1526

<0.8.6e-1
  • M
CVE-2004-1736

<0.8.5a-5
  • H
CVE-2004-1737

<0.8.5a-5
  • C
CVE-2002-1478

<0.6.8a-2
  • H
CVE-2002-1477

<0.6.8a-2
  • M
CVE-2002-1479

<0.6.8-1