Cacti Monitoring Tool Spiked by Critical SQL Injection Vulnerability

Attackers can exploit the issue to access all data in Cacti database; and, it enables RCE when chained with a previous vulnerability.
Scroll to Top