Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2010-1644

Multiple cross-site scripting (XSS) vulnerabilities in Cacti before 0.8.7f, as used in Red Hat High Performance Computing (HPC) Solution and other products, allow remote attackers to inject arbitrary web script or HTML via the (1) hostname or (2) description parameter to host.php, or (3) the host_id parameter to data_sources.php.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.018
EPSS Ranking 81.9%
CVSS Severity
CVSS v2 Score 4.3
References
Products affected by CVE-2010-1644
  • Cacti » Cacti » Version: N/A
    cpe:2.3:a:cacti:cacti:-
  • Cacti » Cacti » Version: 0.5
    cpe:2.3:a:cacti:cacti:0.5
  • Cacti » Cacti » Version: 0.6
    cpe:2.3:a:cacti:cacti:0.6
  • Cacti » Cacti » Version: 0.6.1
    cpe:2.3:a:cacti:cacti:0.6.1
  • Cacti » Cacti » Version: 0.6.2
    cpe:2.3:a:cacti:cacti:0.6.2
  • Cacti » Cacti » Version: 0.6.3
    cpe:2.3:a:cacti:cacti:0.6.3
  • Cacti » Cacti » Version: 0.6.4
    cpe:2.3:a:cacti:cacti:0.6.4
  • Cacti » Cacti » Version: 0.6.5
    cpe:2.3:a:cacti:cacti:0.6.5
  • Cacti » Cacti » Version: 0.6.6
    cpe:2.3:a:cacti:cacti:0.6.6
  • Cacti » Cacti » Version: 0.6.7
    cpe:2.3:a:cacti:cacti:0.6.7
  • Cacti » Cacti » Version: 0.6.8
    cpe:2.3:a:cacti:cacti:0.6.8
  • Cacti » Cacti » Version: 0.6.8a
    cpe:2.3:a:cacti:cacti:0.6.8a
  • Cacti » Cacti » Version: 0.8
    cpe:2.3:a:cacti:cacti:0.8
  • Cacti » Cacti » Version: 0.8.1
    cpe:2.3:a:cacti:cacti:0.8.1
  • Cacti » Cacti » Version: 0.8.2
    cpe:2.3:a:cacti:cacti:0.8.2
  • Cacti » Cacti » Version: 0.8.2a
    cpe:2.3:a:cacti:cacti:0.8.2a
  • Cacti » Cacti » Version: 0.8.3
    cpe:2.3:a:cacti:cacti:0.8.3
  • Cacti » Cacti » Version: 0.8.3a
    cpe:2.3:a:cacti:cacti:0.8.3a
  • Cacti » Cacti » Version: 0.8.4
    cpe:2.3:a:cacti:cacti:0.8.4
  • Cacti » Cacti » Version: 0.8.5
    cpe:2.3:a:cacti:cacti:0.8.5
  • Cacti » Cacti » Version: 0.8.5a
    cpe:2.3:a:cacti:cacti:0.8.5a
  • Cacti » Cacti » Version: 0.8.6
    cpe:2.3:a:cacti:cacti:0.8.6
  • Cacti » Cacti » Version: 0.8.6a
    cpe:2.3:a:cacti:cacti:0.8.6a
  • Cacti » Cacti » Version: 0.8.6b
    cpe:2.3:a:cacti:cacti:0.8.6b
  • Cacti » Cacti » Version: 0.8.6c
    cpe:2.3:a:cacti:cacti:0.8.6c
  • Cacti » Cacti » Version: 0.8.6d
    cpe:2.3:a:cacti:cacti:0.8.6d
  • Cacti » Cacti » Version: 0.8.6e
    cpe:2.3:a:cacti:cacti:0.8.6e
  • Cacti » Cacti » Version: 0.8.6f
    cpe:2.3:a:cacti:cacti:0.8.6f
  • Cacti » Cacti » Version: 0.8.6g
    cpe:2.3:a:cacti:cacti:0.8.6g
  • Cacti » Cacti » Version: 0.8.6h
    cpe:2.3:a:cacti:cacti:0.8.6h
  • Cacti » Cacti » Version: 0.8.6i
    cpe:2.3:a:cacti:cacti:0.8.6i
  • Cacti » Cacti » Version: 0.8.6j
    cpe:2.3:a:cacti:cacti:0.8.6j
  • Cacti » Cacti » Version: 0.8.6k
    cpe:2.3:a:cacti:cacti:0.8.6k
  • Cacti » Cacti » Version: 0.8.7
    cpe:2.3:a:cacti:cacti:0.8.7
  • Cacti » Cacti » Version: 0.8.7a
    cpe:2.3:a:cacti:cacti:0.8.7a
  • Cacti » Cacti » Version: 0.8.7b
    cpe:2.3:a:cacti:cacti:0.8.7b
  • Cacti » Cacti » Version: 0.8.7c
    cpe:2.3:a:cacti:cacti:0.8.7c
  • Cacti » Cacti » Version: 0.8.7d
    cpe:2.3:a:cacti:cacti:0.8.7d
  • Cacti » Cacti » Version: 0.8.7e
    cpe:2.3:a:cacti:cacti:0.8.7e


Contact Us

Shodan ® - All rights reserved