Executive Summary

Informations
Name CVE-2005-1524 First vendor Publication 2005-06-22
Vendor Cve Last vendor Modification 2024-11-20

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

PHP file inclusion vulnerability in top_graph_header.php in Cacti 0.8.6d and possibly earlier versions allows remote attackers to execute arbitrary PHP code via the config[library_path] parameter.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1524

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 24

OpenVAS Exploits

Date Description
2008-09-24 Name : Gentoo Security Advisory GLSA 200506-20 (cacti)
File : nvt/glsa_200506_20.nasl
2008-01-17 Name : Debian Security Advisory DSA 764-1 (cacti)
File : nvt/deb_764_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
17426 Cacti top_graph_header.php config Parameter Remote File Inclusion

Snort® IPS/IDS

Date Description
2014-01-10 cacti graph_image arbitrary command execution attempt
RuleID : 8712 - Revision : 7 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

Date Description
2015-03-03 Name : The remote web server is running a PHP application that is affected by multip...
File : cacti_086e_vcheck.nasl - Type : ACT_GATHER_INFO
2005-07-21 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-764.nasl - Type : ACT_GATHER_INFO
2005-06-23 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200506-20.nasl - Type : ACT_GATHER_INFO
2005-06-22 Name : The remote web server is running a PHP application that is affected by a loca...
File : cacti_086e.nasl - Type : ACT_ATTACK

Sources (Detail)

http://distro.conectiva.com/atualizacoes/index.php?id=a&anuncio=000978
http://secunia.com/advisories/15490
http://secunia.com/advisories/15931
http://secunia.com/advisories/16136
http://securitytracker.com/id?1014252
http://www.cacti.net/release_notes_0_8_6e.php
http://www.debian.org/security/2005/dsa-764
http://www.gentoo.org/security/en/glsa/glsa-200506-20.xml
http://www.idefense.com/application/poi/display?id=265&type=vulnerabiliti...
http://www.osvdb.org/17426
https://exchange.xforce.ibmcloud.com/vulnerabilities/21118
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
Date Informations
2024-11-28 23:22:04
  • Multiple Updates
2024-11-28 12:07:03
  • Multiple Updates
2021-05-05 01:01:50
  • Multiple Updates
2021-05-04 12:02:57
  • Multiple Updates
2021-04-22 01:03:12
  • Multiple Updates
2020-05-23 01:36:40
  • Multiple Updates
2020-05-23 00:16:33
  • Multiple Updates
2017-07-11 12:01:55
  • Multiple Updates
2016-06-28 15:17:48
  • Multiple Updates
2016-04-26 13:31:07
  • Multiple Updates
2015-03-04 13:24:58
  • Multiple Updates
2014-02-17 10:31:23
  • Multiple Updates
2014-01-19 21:22:44
  • Multiple Updates
2013-05-11 11:25:59
  • Multiple Updates