Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-7058

Опубликовано: 15 янв. 2020
Источник: ubuntu
Приоритет: low
CVSS2: 6.5
CVSS3: 8.8

Описание

data_input.php in Cacti 1.2.8 allows remote code execution via a crafted Input String to Data Collection -> Data Input Methods -> Unix -> Ping Host. NOTE: the vendor has stated "This is a false alarm.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

disputed
disco

ignored

end of life
eoan

ignored

end of life
esm-apps/bionic

not-affected

disputed
esm-apps/focal

not-affected

disputed
esm-apps/jammy

not-affected

disputed
esm-apps/noble

not-affected

disputed
esm-apps/xenial

not-affected

disputed
esm-infra-legacy/trusty

not-affected

disputed

Показывать по

6.5 Medium

CVSS2

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
около 6 лет назад

data_input.php in Cacti 1.2.8 allows remote code execution via a crafted Input String to Data Collection -> Data Input Methods -> Unix -> Ping Host. NOTE: the vendor has stated "This is a false alarm.

CVSS3: 8.8
debian
около 6 лет назад

data_input.php in Cacti 1.2.8 allows remote code execution via a craft ...

CVSS3: 8.8
github
больше 3 лет назад

** DISPUTED ** data_input.php in Cacti 1.2.8 allows remote code execution via a crafted Input String to Data Collection -> Data Input Methods -> Unix -> Ping Host. NOTE: the vendor has stated "This is a false alarm."

6.5 Medium

CVSS2

8.8 High

CVSS3