Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-2092

Опубликовано: 27 мая 2010
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

SQL injection vulnerability in graph.php in Cacti 0.8.7e and earlier allows remote attackers to execute arbitrary SQL commands via a crafted rra_id parameter in a GET request in conjunction with a valid rra_id value in a POST request or a cookie, which causes the POST or cookie value to bypass the validation routine, but inserts the $_GET value into the resulting query.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

0.8.7e-4
hardy

ignored

end of life
jaunty

ignored

end of life
karmic

ignored

end of life
lucid

released

0.8.7e-2ubuntu0.1
maverick

not-affected

0.8.7e-4
natty

not-affected

0.8.7e-4
oneiric

not-affected

0.8.7e-4
upstream

released

0.8.7e-4

Показывать по

Ссылки на источники

EPSS

Процентиль: 35%
0.00139
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

SQL injection vulnerability in graph.php in Cacti 0.8.7e and earlier allows remote attackers to execute arbitrary SQL commands via a crafted rra_id parameter in a GET request in conjunction with a valid rra_id value in a POST request or a cookie, which causes the POST or cookie value to bypass the validation routine, but inserts the $_GET value into the resulting query.

nvd
больше 15 лет назад

SQL injection vulnerability in graph.php in Cacti 0.8.7e and earlier allows remote attackers to execute arbitrary SQL commands via a crafted rra_id parameter in a GET request in conjunction with a valid rra_id value in a POST request or a cookie, which causes the POST or cookie value to bypass the validation routine, but inserts the $_GET value into the resulting query.

debian
больше 15 лет назад

SQL injection vulnerability in graph.php in Cacti 0.8.7e and earlier a ...

github
больше 3 лет назад

SQL injection vulnerability in graph.php in Cacti 0.8.7e and earlier allows remote attackers to execute arbitrary SQL commands via a crafted rra_id parameter in a GET request in conjunction with a valid rra_id value in a POST request or a cookie, which causes the POST or cookie value to bypass the validation routine, but inserts the $_GET value into the resulting query.

EPSS

Процентиль: 35%
0.00139
Низкий

7.5 High

CVSS2