Show plain JSON{"id": "CVE-2004-1737", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2004-08-16T04:00:00.000", "references": [{"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-August/025376.html", "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=bugtraq&m=109272483621038&w=2", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/12308", "tags": ["Exploit", "Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.gentoo.org/security/en/glsa/glsa-200408-21.xml", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/10960", "tags": ["Exploit", "Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17011", "source": "cve@mitre.org"}, {"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-August/025376.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://marc.info/?l=bugtraq&m=109272483621038&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/12308", "tags": ["Exploit", "Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.gentoo.org/security/en/glsa/glsa-200408-21.xml", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/10960", "tags": ["Exploit", "Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17011", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "SQL injection vulnerability in auth_login.php in Cacti 0.8.5a allows remote attackers to execute arbitrary SQL commands and bypass authentication via the (1) username or (2) password parameters."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88AB7EF7-FD9D-4854-8B18-9BB214E9C03E"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97372003-62C9-4981-8E8E-22C1D19333F3"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "421F4C7D-A2C4-47CC-B663-4E12CD130D04"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70A04BE7-5893-45F1-9F9A-B869E3963EAF"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59471E38-C230-43D5-9533-5B2CB327DB39"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04D3E0EF-80B7-49E0-9DAF-3752E08AD64D"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D46F997-5FE7-477A-A161-4E682579124A"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51B5B1BE-1B7D-4338-A189-C5D401AF1857"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFD527D7-C79F-42D5-9CB7-B5CA9B242BDA"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.6.8a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D099FE2B-13CA-447E-B5E7-75A1D407A971"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3BBF3F3-18C0-49C5-99B0-80FCD133532B"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1896A7C-6938-494D-90A5-E10BC91EB37D"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19CD9A10-32F6-45A4-8793-87E0C2E78675"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.2a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6EF1390-E1B5-45B0-8732-A7004351E1BF"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D3D7996-E56A-4B72-864E-EC6037028351"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.3a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "000AE712-7298-4CA1-930B-4DF372671EDD"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFD258DF-CB70-484C-9A6F-F9ABDB012C8C"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFF12ADC-83AA-45FE-9678-F49D05234D39"}, {"criteria": "cpe:2.3:a:the_cacti_group:cacti:0.8.5a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43FD0F4A-4811-4B4A-AF03-8FBC63A99CE9"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65ED9D8C-604D-4B0B-A192-C0DA4D2E9AEB"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}