CVE-2010-1644
23.08.2010, 22:00
Multiple cross-site scripting (XSS) vulnerabilities in Cacti before 0.8.7f, as used in Red Hat High Performance Computing (HPC) Solution and other products, allow remote attackers to inject arbitrary web script or HTML via the (1) hostname or (2) description parameter to host.php, or (3) the host_id parameter to data_sources.php.
Vendor | Product | Version |
---|---|---|
cacti | cacti | 𝑥 ≤ 0.8.7e |
cacti | cacti | 0.5 |
cacti | cacti | 0.6 |
cacti | cacti | 0.6.1 |
cacti | cacti | 0.6.2 |
cacti | cacti | 0.6.3 |
cacti | cacti | 0.6.4 |
cacti | cacti | 0.6.5 |
cacti | cacti | 0.6.6 |
cacti | cacti | 0.6.7 |
cacti | cacti | 0.6.8 |
cacti | cacti | 0.6.8a:a |
cacti | cacti | 0.8 |
cacti | cacti | 0.8.1 |
cacti | cacti | 0.8.2 |
cacti | cacti | 0.8.2a:a |
cacti | cacti | 0.8.3 |
cacti | cacti | 0.8.3a:a |
cacti | cacti | 0.8.4 |
cacti | cacti | 0.8.5 |
cacti | cacti | 0.8.5a:a |
cacti | cacti | 0.8.6 |
cacti | cacti | 0.8.6a:a |
cacti | cacti | 0.8.6b:b |
cacti | cacti | 0.8.6c:c |
cacti | cacti | 0.8.6d:d |
cacti | cacti | 0.8.6f:f |
cacti | cacti | 0.8.6g:g |
cacti | cacti | 0.8.6h:h |
cacti | cacti | 0.8.6i:i |
cacti | cacti | 0.8.6j:j |
cacti | cacti | 0.8.6k:k |
cacti | cacti | 0.8.7 |
cacti | cacti | 0.8.7a:a |
cacti | cacti | 0.8.7b:b |
cacti | cacti | 0.8.7c:c |
cacti | cacti | 0.8.7d:d |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References