Vigilance.fr - Cacti: SQL injection via Request Automation Devices, analyzed on 27/01/2025
An attacker can use a SQL injection of Cacti, via Request Automation Devices, in order to read or alter data. - Security Vulnerability

An attacker can use a SQL injection of Cacti, via Request Automation Devices, in order to read or alter data.