-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 3.0 (quilt) Source: cacti Binary: cacti Architecture: all Version: 0.8.8b+dfsg-8+deb8u1 Maintainer: Cacti Maintainer <[email protected]> Uploaders: Sean Finney <[email protected]>, Mahyuddin Susanto <[email protected]>, Paul Gevers <[email protected]> Homepage: http://www.cacti.net/ Standards-Version: 3.9.5 Vcs-Browser: http://anonscm.debian.org/gitweb/?p=pkg-cacti/cacti.git Vcs-Git: git://anonscm.debian.org/pkg-cacti/cacti.git Build-Depends: debhelper (>= 7.0.50~), po-debconf Package-List: cacti deb web extra arch=all Checksums-Sha1: 20b635f831d3219e93c11ea435c3389ab429cad7 2081800 cacti_0.8.8b+dfsg.orig.tar.bz2 f9d389e41b002d3fbded86421d51f458d5de3046 106740 cacti_0.8.8b+dfsg-8+deb8u1.debian.tar.xz Checksums-Sha256: bc4b733055e66e1f75e67e697d97793c072ce82e31c5cfa21aab781cc470171b 2081800 cacti_0.8.8b+dfsg.orig.tar.bz2 366cdf950707e7dd02521304d25dbedd0a8655c2742fe7dc4535d9a0771d6aa1 106740 cacti_0.8.8b+dfsg-8+deb8u1.debian.tar.xz Files: 337a1717260090a420918aac627c61ba 2081800 cacti_0.8.8b+dfsg.orig.tar.bz2 b9a83621f156ebadd20828b52a6da53f 106740 cacti_0.8.8b+dfsg-8+deb8u1.debian.tar.xz -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBCAAGBQJViaY7AAoJEJxcmesFvXUKjgkIAKPRIqJC2DWOoTTFM3TkNMVT 9kTx0jnULGVsGhaXjHnSRlyaV0q7HjOaN8udVRGCtVub/k8izGN8soINAGtcyt9T a/P4APIQWpZLH+Nu4OsSYpyvNhO8rWMEIalwtmwvMg+UMKXDC+WZstsCGB84Pmdr uL7iEnT6561IZ8vFj1v20nFq9Obo/OYhTq6V6bFxdls9duk/b09dA23c0hUNGz9t G8206SMMXdkwZk8lFxuExZSHVPdkqmO/GDMjM+HA8pveoKNMot07r6nOHXfZUDUs mlXMztbYOCx9nZvJ8DyswbT2U5SWakXmXjjaqoN3mA06ODMsdeKdm/sUUGhgCJY= =0s2G -----END PGP SIGNATURE----- Changes: cacti (0.8.8b+dfsg-8+deb8u1) jessie-security; urgency=high * Security update - CVE-2015-2665 Cross-site scripting (XSS) vulnerability in Cacti before 0.8.8d allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. - CVE-2015-4342 SQL Injection and Location header injection from cdef id - CVE-2015-4454 SQL injection vulnerability in the get_hash_graph_template function in lib/functions.php in Cacti before 0.8.8d allows remote attackers to execute arbitrary SQL commands via the graph_template_id parameter to graph_templates.php. - Unassigned CVE SQL injection VN:JVN#78187936 / TN:JPCERT#98968540 -- Paul Gevers <[email protected]> Mon, 22 Jun 2015 20:55:59 +0200