cacti 0.8.8b+dfsg-5ubuntu0.2 source package in Ubuntu
Changelog
cacti (0.8.8b+dfsg-5ubuntu0.2) trusty-security; urgency=medium * Security update (backport patches from upstream) - CVE-2014-4000 - PHP Object Injection Vulnerabilities - CVE-2015-4634 - SQL injection vulnerability in graphs.php - CVE-2015-8369 - SQL injection vulnerability in include/top_graph_header.php - CVE-2015-8377 - SQL injection vulnerability in host_new_graphs_save - CVE-2015-8604 - SQL injection vulnerability in host_new_graphs - CVE-2016-2313 - auth_login.php access restrictions could be bypassed - CVE-2016-3172 - SQL injection vulnerability in tree.php - CVE-2016-3659 - SQL injection vulnerability in graph_view.php -- Paul Gevers <email address hidden> Sat, 11 Feb 2017 14:51:18 +0100
Upload details
- Uploaded by:
- Paul Gevers
- Sponsored by:
- Seth Arnold
- Uploaded to:
- Trusty
- Original maintainer:
- Ubuntu Developers
- Architectures:
- all
- Section:
- web
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Trusty | updates | universe | web | |
Trusty | security | universe | web |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
cacti_0.8.8b+dfsg.orig.tar.bz2 | 2.0 MiB | bc4b733055e66e1f75e67e697d97793c072ce82e31c5cfa21aab781cc470171b |
cacti_0.8.8b+dfsg-5ubuntu0.2.debian.tar.gz | 136.2 KiB | 01f213e6c8bf0cc171726ba864c28865f3eea067910b478326472f32f0234056 |
cacti_0.8.8b+dfsg-5ubuntu0.2.dsc | 1.7 KiB | 76d2791d83fd70ef736eb4a05d66605980a0f52bb7822597957c429bd0b98a88 |
Available diffs
Binary packages built by this source
- cacti: web interface for graphing of monitoring systems
Cacti is a complete PHP-driven front-end for RRDTool. It stores all of
the necessary data source information to create graphs, handles the data
gathering, and populates the MySQL database with round-robin archives.
It also includes SNMP support for those used to creating traffic graphs
with MRTG.
.
This package requires a functional MySQL database server on either the
installation host or a remotely accessible system.