lib/graph_export.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote authenticated users to execute arbitrary commands via shell metacharacters in unspecified vectors.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
lib/graph_export.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote authenticated users to execute arbitrary commands via shell metacharacters in unspecified vectors.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131821.html | vendor-advisory x_refsource_FEDORA |
http://bugs.cacti.net/view.php?id=2433 | x_refsource_CONFIRM |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742768 | x_refsource_CONFIRM |
http://svn.cacti.net/viewvc?view=rev&revision=7442 | x_refsource_CONFIRM |
http://www.securityfocus.com/archive/1/531588 | mailing-list x_refsource_BUGTRAQ |
http://secunia.com/advisories/59203 | third-party-advisory x_refsource_SECUNIA |
http://lists.opensuse.org/opensuse-updates/2015-03/msg00034.html | vendor-advisory x_refsource_SUSE |
http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131842.html | vendor-advisory x_refsource_FEDORA |
http://www.debian.org/security/2014/dsa-2970 | vendor-advisory x_refsource_DEBIAN |
https://security.gentoo.org/glsa/201509-03 | vendor-advisory x_refsource_GENTOO |
http://www.securityfocus.com/bid/66387 | vdb-entry x_refsource_BID |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
lib/graph_export.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote authenticated users to execute arbitrary commands via shell metacharacters in unspecified vectors.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 6.5 | MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-noinfo | Primary | nvd@nist.gov |