Cacti Monitoring Tool Spiked by Critical SQL Injection Vulnerability
Attackers can exploit the issue to access all data in Cacti database; and, it enables RCE when chained with a previous vulnerability.
Cacti Monitoring Tool Spiked by Critical SQL Injection Vulnerability
Attackers can exploit the issue to access all data in Cacti database; and, it enables RCE when chained with a previous vulnerability.
No replies yet.