CVE-2005-1524

PHP file inclusion vulnerability in top_graph_header.php in Cacti 0.8.6d and possibly earlier versions allows remote attackers to execute arbitrary PHP code via the config[library_path] parameter.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:the_cacti_group:cacti:*:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.5:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.6:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.6.4:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.6.5:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.6.6:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.6.7:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.6.8:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.6.8a:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.2a:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.3a:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:the_cacti_group:cacti:0.8.5a:*:*:*:*:*:*:*

History

20 Nov 2024, 23:57

Type Values Removed Values Added
References () http://distro.conectiva.com/atualizacoes/index.php?id=a&anuncio=000978 - () http://distro.conectiva.com/atualizacoes/index.php?id=a&anuncio=000978 -
References () http://secunia.com/advisories/15490 - () http://secunia.com/advisories/15490 -
References () http://secunia.com/advisories/15931 - () http://secunia.com/advisories/15931 -
References () http://secunia.com/advisories/16136 - () http://secunia.com/advisories/16136 -
References () http://securitytracker.com/id?1014252 - () http://securitytracker.com/id?1014252 -
References () http://www.cacti.net/release_notes_0_8_6e.php - Patch, Vendor Advisory () http://www.cacti.net/release_notes_0_8_6e.php - Patch, Vendor Advisory
References () http://www.debian.org/security/2005/dsa-764 - () http://www.debian.org/security/2005/dsa-764 -
References () http://www.gentoo.org/security/en/glsa/glsa-200506-20.xml - Patch, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200506-20.xml - Patch, Vendor Advisory
References () http://www.idefense.com/application/poi/display?id=265&type=vulnerabilities&flashstatus=true - Patch, Vendor Advisory () http://www.idefense.com/application/poi/display?id=265&type=vulnerabilities&flashstatus=true - Patch, Vendor Advisory
References () http://www.osvdb.org/17426 - () http://www.osvdb.org/17426 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/21118 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/21118 -

Information

Published : 2005-06-22 04:00

Updated : 2024-11-20 23:57


NVD link : CVE-2005-1524

Mitre link : CVE-2005-1524

CVE.ORG link : CVE-2005-1524


JSON object : View

Products Affected

the_cacti_group

  • cacti