Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2010-2545

Multiple cross-site scripting (XSS) vulnerabilities in Cacti before 0.8.7g, as used in Red Hat High Performance Computing (HPC) Solution and other products, allow remote attackers to inject arbitrary web script or HTML via (1) the name element in an XML template to templates_import.php; and allow remote authenticated administrators to inject arbitrary web script or HTML via vectors related to (2) cdef.php, (3) data_input.php, (4) data_queries.php, (5) data_sources.php, (6) data_templates.php, (7) gprint_presets.php, (8) graph.php, (9) graphs_new.php, (10) graphs.php, (11) graph_templates_inputs.php, (12) graph_templates_items.php, (13) graph_templates.php, (14) graph_view.php, (15) host.php, (16) host_templates.php, (17) lib/functions.php, (18) lib/html_form.php, (19) lib/html_form_template.php, (20) lib/html.php, (21) lib/html_tree.php, (22) lib/rrd.php, (23) rra.php, (24) tree.php, and (25) user_admin.php.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.013
EPSS Ranking 79.2%
CVSS Severity
CVSS v2 Score 4.3
References
Products affected by CVE-2010-2545
  • Cacti » Cacti » Version: N/A
    cpe:2.3:a:cacti:cacti:-
  • Cacti » Cacti » Version: 0.5
    cpe:2.3:a:cacti:cacti:0.5
  • Cacti » Cacti » Version: 0.6
    cpe:2.3:a:cacti:cacti:0.6
  • Cacti » Cacti » Version: 0.6.1
    cpe:2.3:a:cacti:cacti:0.6.1
  • Cacti » Cacti » Version: 0.6.2
    cpe:2.3:a:cacti:cacti:0.6.2
  • Cacti » Cacti » Version: 0.6.3
    cpe:2.3:a:cacti:cacti:0.6.3
  • Cacti » Cacti » Version: 0.6.4
    cpe:2.3:a:cacti:cacti:0.6.4
  • Cacti » Cacti » Version: 0.6.5
    cpe:2.3:a:cacti:cacti:0.6.5
  • Cacti » Cacti » Version: 0.6.6
    cpe:2.3:a:cacti:cacti:0.6.6
  • Cacti » Cacti » Version: 0.6.7
    cpe:2.3:a:cacti:cacti:0.6.7
  • Cacti » Cacti » Version: 0.6.8
    cpe:2.3:a:cacti:cacti:0.6.8
  • Cacti » Cacti » Version: 0.6.8a
    cpe:2.3:a:cacti:cacti:0.6.8a
  • Cacti » Cacti » Version: 0.8
    cpe:2.3:a:cacti:cacti:0.8
  • Cacti » Cacti » Version: 0.8.1
    cpe:2.3:a:cacti:cacti:0.8.1
  • Cacti » Cacti » Version: 0.8.2
    cpe:2.3:a:cacti:cacti:0.8.2
  • Cacti » Cacti » Version: 0.8.2a
    cpe:2.3:a:cacti:cacti:0.8.2a
  • Cacti » Cacti » Version: 0.8.3
    cpe:2.3:a:cacti:cacti:0.8.3
  • Cacti » Cacti » Version: 0.8.3a
    cpe:2.3:a:cacti:cacti:0.8.3a
  • Cacti » Cacti » Version: 0.8.4
    cpe:2.3:a:cacti:cacti:0.8.4
  • Cacti » Cacti » Version: 0.8.5
    cpe:2.3:a:cacti:cacti:0.8.5
  • Cacti » Cacti » Version: 0.8.5a
    cpe:2.3:a:cacti:cacti:0.8.5a
  • Cacti » Cacti » Version: 0.8.6
    cpe:2.3:a:cacti:cacti:0.8.6
  • Cacti » Cacti » Version: 0.8.6a
    cpe:2.3:a:cacti:cacti:0.8.6a
  • Cacti » Cacti » Version: 0.8.6b
    cpe:2.3:a:cacti:cacti:0.8.6b
  • Cacti » Cacti » Version: 0.8.6c
    cpe:2.3:a:cacti:cacti:0.8.6c
  • Cacti » Cacti » Version: 0.8.6d
    cpe:2.3:a:cacti:cacti:0.8.6d
  • Cacti » Cacti » Version: 0.8.6e
    cpe:2.3:a:cacti:cacti:0.8.6e
  • Cacti » Cacti » Version: 0.8.6f
    cpe:2.3:a:cacti:cacti:0.8.6f
  • Cacti » Cacti » Version: 0.8.6g
    cpe:2.3:a:cacti:cacti:0.8.6g
  • Cacti » Cacti » Version: 0.8.6h
    cpe:2.3:a:cacti:cacti:0.8.6h
  • Cacti » Cacti » Version: 0.8.6i
    cpe:2.3:a:cacti:cacti:0.8.6i
  • Cacti » Cacti » Version: 0.8.6j
    cpe:2.3:a:cacti:cacti:0.8.6j
  • Cacti » Cacti » Version: 0.8.6k
    cpe:2.3:a:cacti:cacti:0.8.6k
  • Cacti » Cacti » Version: 0.8.7
    cpe:2.3:a:cacti:cacti:0.8.7
  • Cacti » Cacti » Version: 0.8.7a
    cpe:2.3:a:cacti:cacti:0.8.7a
  • Cacti » Cacti » Version: 0.8.7b
    cpe:2.3:a:cacti:cacti:0.8.7b
  • Cacti » Cacti » Version: 0.8.7c
    cpe:2.3:a:cacti:cacti:0.8.7c
  • Cacti » Cacti » Version: 0.8.7d
    cpe:2.3:a:cacti:cacti:0.8.7d
  • Cacti » Cacti » Version: 0.8.7e
    cpe:2.3:a:cacti:cacti:0.8.7e
  • Cacti » Cacti » Version: 0.8.7f
    cpe:2.3:a:cacti:cacti:0.8.7f


Contact Us

Shodan ® - All rights reserved