Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2010-2092

SQL injection vulnerability in graph.php in Cacti 0.8.7e and earlier allows remote attackers to execute arbitrary SQL commands via a crafted rra_id parameter in a GET request in conjunction with a valid rra_id value in a POST request or a cookie, which causes the POST or cookie value to bypass the validation routine, but inserts the $_GET value into the resulting query.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 53.2%
CVSS Severity
CVSS v2 Score 7.5
Products affected by CVE-2010-2092
  • Cacti » Cacti » Version: N/A
    cpe:2.3:a:cacti:cacti:-
  • Cacti » Cacti » Version: 0.5
    cpe:2.3:a:cacti:cacti:0.5
  • Cacti » Cacti » Version: 0.6
    cpe:2.3:a:cacti:cacti:0.6
  • Cacti » Cacti » Version: 0.6.1
    cpe:2.3:a:cacti:cacti:0.6.1
  • Cacti » Cacti » Version: 0.6.2
    cpe:2.3:a:cacti:cacti:0.6.2
  • Cacti » Cacti » Version: 0.6.3
    cpe:2.3:a:cacti:cacti:0.6.3
  • Cacti » Cacti » Version: 0.6.4
    cpe:2.3:a:cacti:cacti:0.6.4
  • Cacti » Cacti » Version: 0.6.5
    cpe:2.3:a:cacti:cacti:0.6.5
  • Cacti » Cacti » Version: 0.6.6
    cpe:2.3:a:cacti:cacti:0.6.6
  • Cacti » Cacti » Version: 0.6.7
    cpe:2.3:a:cacti:cacti:0.6.7
  • Cacti » Cacti » Version: 0.6.8
    cpe:2.3:a:cacti:cacti:0.6.8
  • Cacti » Cacti » Version: 0.6.8a
    cpe:2.3:a:cacti:cacti:0.6.8a
  • Cacti » Cacti » Version: 0.8
    cpe:2.3:a:cacti:cacti:0.8
  • Cacti » Cacti » Version: 0.8.1
    cpe:2.3:a:cacti:cacti:0.8.1
  • Cacti » Cacti » Version: 0.8.2
    cpe:2.3:a:cacti:cacti:0.8.2
  • Cacti » Cacti » Version: 0.8.2a
    cpe:2.3:a:cacti:cacti:0.8.2a
  • Cacti » Cacti » Version: 0.8.3
    cpe:2.3:a:cacti:cacti:0.8.3
  • Cacti » Cacti » Version: 0.8.3a
    cpe:2.3:a:cacti:cacti:0.8.3a
  • Cacti » Cacti » Version: 0.8.4
    cpe:2.3:a:cacti:cacti:0.8.4
  • Cacti » Cacti » Version: 0.8.5
    cpe:2.3:a:cacti:cacti:0.8.5
  • Cacti » Cacti » Version: 0.8.5a
    cpe:2.3:a:cacti:cacti:0.8.5a
  • Cacti » Cacti » Version: 0.8.6
    cpe:2.3:a:cacti:cacti:0.8.6
  • Cacti » Cacti » Version: 0.8.6a
    cpe:2.3:a:cacti:cacti:0.8.6a
  • Cacti » Cacti » Version: 0.8.6b
    cpe:2.3:a:cacti:cacti:0.8.6b
  • Cacti » Cacti » Version: 0.8.6c
    cpe:2.3:a:cacti:cacti:0.8.6c
  • Cacti » Cacti » Version: 0.8.6d
    cpe:2.3:a:cacti:cacti:0.8.6d
  • Cacti » Cacti » Version: 0.8.6e
    cpe:2.3:a:cacti:cacti:0.8.6e
  • Cacti » Cacti » Version: 0.8.6f
    cpe:2.3:a:cacti:cacti:0.8.6f
  • Cacti » Cacti » Version: 0.8.6g
    cpe:2.3:a:cacti:cacti:0.8.6g
  • Cacti » Cacti » Version: 0.8.6h
    cpe:2.3:a:cacti:cacti:0.8.6h
  • Cacti » Cacti » Version: 0.8.6i
    cpe:2.3:a:cacti:cacti:0.8.6i
  • Cacti » Cacti » Version: 0.8.6j
    cpe:2.3:a:cacti:cacti:0.8.6j
  • Cacti » Cacti » Version: 0.8.6k
    cpe:2.3:a:cacti:cacti:0.8.6k
  • Cacti » Cacti » Version: 0.8.7
    cpe:2.3:a:cacti:cacti:0.8.7
  • Cacti » Cacti » Version: 0.8.7a
    cpe:2.3:a:cacti:cacti:0.8.7a
  • Cacti » Cacti » Version: 0.8.7b
    cpe:2.3:a:cacti:cacti:0.8.7b
  • Cacti » Cacti » Version: 0.8.7c
    cpe:2.3:a:cacti:cacti:0.8.7c
  • Cacti » Cacti » Version: 0.8.7d
    cpe:2.3:a:cacti:cacti:0.8.7d
  • Cacti » Cacti » Version: 0.8.7e
    cpe:2.3:a:cacti:cacti:0.8.7e


Contact Us

Shodan ® - All rights reserved