[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-10309":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":51,"name":52,"published":53,"updated":34},10309,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},3,"OpenVAS",{"id":25,"codename":34,"description":34,"severity":35,"risk_description":36,"public_description":37,"public_recommendation":38,"recommendation":34,"references":39,"cvssv3":43,"epss_score":44,"epss_percentile":45,"cve":46,"in_cisa_catalog":49,"date":50,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"high","The following vulnerabilities exist: - Stored XSS vulnerability in data_sources.php, color_templates_item.php, graphs.php, graph_items.php, lib/api_automation.php, user_admin.php and user_group_admin.php, as demonstrated by the description parameter in data_sources.php (a raw string from the database that is displayed by $header to trigger the XSS). - Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated and must have access to modify the Performance Settings. Successful exploitation would have effects ranging from the attacker injection arbitrary HTML and JavaScript into the site to the attacker gaining full control over the target system.","Cacti is prone to multiple vulnerabilities.","Update to Cacti version 1.2.9 or later.",[40,41,42],"https://lists.debian.org/debian-lts-announce/2020/01/msg00014.html","https://github.com/Cacti/cacti/issues/3191","https://github.com/Cacti/cacti/issues/3201",8.8,0.46813,0.97655,[47,48],"CVE-2020-7106","CVE-2020-7237",false,"2020-01-16T00:00:00Z","NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.113627","Cacti \u003C 1.2.9 Multiple Vulnerabilities - Windows","2020-01-21T00:00:00Z"]