CVE-2010-1645

Severity CVSS v4.0:
Pending analysis
Type:
CWE-20 Input Validation
Publication date:
23/08/2010
Last modified:
11/04/2025

Description

Cacti before 0.8.7f, as used in Red Hat High Performance Computing (HPC) Solution and other products, allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in (1) the FQDN field of a Device or (2) the Vertical Label field of a Graph Template.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:* 0.8.7e (including)
cpe:2.3:a:cacti:cacti:0.5:-:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.4:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.5:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.6:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.7:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.8:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.6.8a:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:cacti:cacti:0.8.2:*:*:*:*:*:*:*