CVE-2019-17358 PUBLISHED

Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP module.

EPSS 2.30% · 84.6th percentile

Risk Scores

EPSS Score
2.30%
84.6th percentile

Affected Products

VendorProductVersions
Ubuntu:Pro:16.04:LTScacti0.8.8f+ds1-4ubuntu4.16.04, 0.8.8f+ds1-4ubuntu4.16.04.2+esm2, 0.8.8f+ds1-4ubuntu4.16.04.2+esm1
Ubuntu:Pro:18.04:LTScacti1.1.38+ds1-1ubuntu0.1~esm4, 1.1.35+ds1-1, 1.1.36+ds1-1
Ubuntu:Pro:14.04:LTScacti0.8.8b+dfsg-5ubuntu0.2, 0.8.8b+dfsg-5ubuntu0.1, 0.8.8b+dfsg-5

Timeline

References

Open in Interactive Console →