|
Test ID: | 1.3.6.1.4.1.25623.1.0.67653 |
Category: | FreeBSD Local Security Checks |
Title: | FreeBSD Ports: cacti |
Summary: | FreeBSD Ports: cacti |
Description: | Description: The remote host is missing an update to the system as announced in the referenced advisory. The following package is affected: cacti Solution: Update your system with the appropriate patches or software upgrades. http://php-security.org/2010/05/13/mops-2010-023-cacti-graph-viewer-sql-injection-vulnerability/index.html http://www.cacti.net/release_notes_0_8_7f.php http://www.bonsai-sec.com/en/research/vulnerabilities/cacti-os-command-injection-0105.php http://www.vupen.com/english/advisories/2010/1204 http://www.vuxml.org/freebsd/e02e6a4e-6b26-11df-96b2-0015587e2cc1.html |
Copyright | Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com |
This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |
|