CVE-2011-4824
15.12.2011, 03:57
SQL injection vulnerability in auth_login.php in Cacti before 0.8.7h allows remote attackers to execute arbitrary SQL commands via the login_username parameter.
| Vendor | Product | Version |
|---|---|---|
| cacti | cacti | 𝑥 ≤ 0.8.7g |
| cacti | cacti | 0.5 |
| cacti | cacti | 0.6 |
| cacti | cacti | 0.6.1 |
| cacti | cacti | 0.6.2 |
| cacti | cacti | 0.6.3 |
| cacti | cacti | 0.6.4 |
| cacti | cacti | 0.6.5 |
| cacti | cacti | 0.6.6 |
| cacti | cacti | 0.6.7 |
| cacti | cacti | 0.6.8 |
| cacti | cacti | 0.6.8a:a |
| cacti | cacti | 0.8 |
| cacti | cacti | 0.8.1 |
| cacti | cacti | 0.8.2 |
| cacti | cacti | 0.8.2a:a |
| cacti | cacti | 0.8.3 |
| cacti | cacti | 0.8.3a:a |
| cacti | cacti | 0.8.4 |
| cacti | cacti | 0.8.5 |
| cacti | cacti | 0.8.5a:a |
| cacti | cacti | 0.8.6 |
| cacti | cacti | 0.8.6a:a |
| cacti | cacti | 0.8.6b:b |
| cacti | cacti | 0.8.6c:c |
| cacti | cacti | 0.8.6d:d |
| cacti | cacti | 0.8.6f:f |
| cacti | cacti | 0.8.6g:g |
| cacti | cacti | 0.8.6h:h |
| cacti | cacti | 0.8.6i:i |
| cacti | cacti | 0.8.6j:j |
| cacti | cacti | 0.8.6k:k |
| cacti | cacti | 0.8.7 |
| cacti | cacti | 0.8.7a:a |
| cacti | cacti | 0.8.7b:b |
| cacti | cacti | 0.8.7c:c |
| cacti | cacti | 0.8.7d:d |
| cacti | cacti | 0.8.7e:e |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
References