Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8f93-437m-m53h

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

SQL injection vulnerability in Cacti 0.8.6i and earlier, when register_argc_argv is enabled, allows remote attackers to execute arbitrary SQL commands via the (1) second or (2) third arguments to cmd.php. NOTE: this issue can be leveraged to execute arbitrary commands since the SQL query results are later used in the polling_items array and popen function.

SQL injection vulnerability in Cacti 0.8.6i and earlier, when register_argc_argv is enabled, allows remote attackers to execute arbitrary SQL commands via the (1) second or (2) third arguments to cmd.php. NOTE: this issue can be leveraged to execute arbitrary commands since the SQL query results are later used in the polling_items array and popen function.

EPSS

Процентиль: 83%
0.02031
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

SQL injection vulnerability in Cacti 0.8.6i and earlier, when register_argc_argv is enabled, allows remote attackers to execute arbitrary SQL commands via the (1) second or (2) third arguments to cmd.php. NOTE: this issue can be leveraged to execute arbitrary commands since the SQL query results are later used in the polling_items array and popen function.

nvd
больше 18 лет назад

SQL injection vulnerability in Cacti 0.8.6i and earlier, when register_argc_argv is enabled, allows remote attackers to execute arbitrary SQL commands via the (1) second or (2) third arguments to cmd.php. NOTE: this issue can be leveraged to execute arbitrary commands since the SQL query results are later used in the polling_items array and popen function.

debian
больше 18 лет назад

SQL injection vulnerability in Cacti 0.8.6i and earlier, when register ...

EPSS

Процентиль: 83%
0.02031
Низкий