Логотип exploitDog
bind:CVE-2005-2149
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2005-2149

Количество 4

Количество 4

ubuntu логотип

CVE-2005-2149

около 20 лет назад

config.php in Cacti 0.8.6e and earlier allows remote attackers to set the no_http_headers switch, then modify session information to gain privileges and disable the use of addslashes to conduct SQL injection attacks.

CVSS2: 10
EPSS: Низкий
nvd логотип

CVE-2005-2149

около 20 лет назад

config.php in Cacti 0.8.6e and earlier allows remote attackers to set the no_http_headers switch, then modify session information to gain privileges and disable the use of addslashes to conduct SQL injection attacks.

CVSS2: 10
EPSS: Низкий
debian логотип

CVE-2005-2149

около 20 лет назад

config.php in Cacti 0.8.6e and earlier allows remote attackers to set ...

CVSS2: 10
EPSS: Низкий
github логотип

GHSA-r2fr-8m3m-rwqg

больше 3 лет назад

config.php in Cacti 0.8.6e and earlier allows remote attackers to set the no_http_headers switch, then modify session information to gain privileges and disable the use of addslashes to conduct SQL injection attacks.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2005-2149

config.php in Cacti 0.8.6e and earlier allows remote attackers to set the no_http_headers switch, then modify session information to gain privileges and disable the use of addslashes to conduct SQL injection attacks.

CVSS2: 10
1%
Низкий
около 20 лет назад
nvd логотип
CVE-2005-2149

config.php in Cacti 0.8.6e and earlier allows remote attackers to set the no_http_headers switch, then modify session information to gain privileges and disable the use of addslashes to conduct SQL injection attacks.

CVSS2: 10
1%
Низкий
около 20 лет назад
debian логотип
CVE-2005-2149

config.php in Cacti 0.8.6e and earlier allows remote attackers to set ...

CVSS2: 10
1%
Низкий
около 20 лет назад
github логотип
GHSA-r2fr-8m3m-rwqg

config.php in Cacti 0.8.6e and earlier allows remote attackers to set the no_http_headers switch, then modify session information to gain privileges and disable the use of addslashes to conduct SQL injection attacks.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу