The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade Debian:13
cacti
to version 1.2.27+ds1-1 or higher.
Note: Versions mentioned in the description apply only to the upstream cacti
package and not the cacti
package as distributed by Debian
.
See How to fix?
for Debian:13
relevant fixed versions and status.
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, a SQL injection vulnerability in automation_get_new_graphs_sql
function of api_automation.php
allows authenticated users to exploit these SQL injection vulnerabilities to perform privilege escalation and remote code execution. In api_automation.php
line 856, the get_request_var('filter')
is being concatenated into the SQL statement without any sanitization. In api_automation.php
line 717, The filter of 'filter'
is FILTER_DEFAULT
, which means there is no filter for it. Version 1.2.27 contains a patch for the issue.