{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T02:00:21.578","vulnerabilities":[{"cve":{"id":"CVE-2004-1737","sourceIdentifier":"cve@mitre.org","published":"2004-08-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SQL injection vulnerability in auth_login.php in Cacti 0.8.5a allows remote attackers to execute arbitrary SQL commands and bypass authentication via the (1) username or (2) password parameters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.6:*:*:*:*:*:*:*","matchCriteriaId":"88AB7EF7-FD9D-4854-8B18-9BB214E9C03E"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.6.1:*:*:*:*:*:*:*","matchCriteriaId":"97372003-62C9-4981-8E8E-22C1D19333F3"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.6.2:*:*:*:*:*:*:*","matchCriteriaId":"421F4C7D-A2C4-47CC-B663-4E12CD130D04"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.6.3:*:*:*:*:*:*:*","matchCriteriaId":"70A04BE7-5893-45F1-9F9A-B869E3963EAF"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.6.4:*:*:*:*:*:*:*","matchCriteriaId":"59471E38-C230-43D5-9533-5B2CB327DB39"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.6.5:*:*:*:*:*:*:*","matchCriteriaId":"04D3E0EF-80B7-49E0-9DAF-3752E08AD64D"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.6.6:*:*:*:*:*:*:*","matchCriteriaId":"9D46F997-5FE7-477A-A161-4E682579124A"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.6.7:*:*:*:*:*:*:*","matchCriteriaId":"51B5B1BE-1B7D-4338-A189-C5D401AF1857"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.6.8:*:*:*:*:*:*:*","matchCriteriaId":"BFD527D7-C79F-42D5-9CB7-B5CA9B242BDA"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.6.8a:*:*:*:*:*:*:*","matchCriteriaId":"D099FE2B-13CA-447E-B5E7-75A1D407A971"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.8:*:*:*:*:*:*:*","matchCriteriaId":"B3BBF3F3-18C0-49C5-99B0-80FCD133532B"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.8.1:*:*:*:*:*:*:*","matchCriteriaId":"D1896A7C-6938-494D-90A5-E10BC91EB37D"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.8.2:*:*:*:*:*:*:*","matchCriteriaId":"19CD9A10-32F6-45A4-8793-87E0C2E78675"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.8.2a:*:*:*:*:*:*:*","matchCriteriaId":"C6EF1390-E1B5-45B0-8732-A7004351E1BF"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.8.3:*:*:*:*:*:*:*","matchCriteriaId":"5D3D7996-E56A-4B72-864E-EC6037028351"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.8.3a:*:*:*:*:*:*:*","matchCriteriaId":"000AE712-7298-4CA1-930B-4DF372671EDD"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.8.4:*:*:*:*:*:*:*","matchCriteriaId":"CFD258DF-CB70-484C-9A6F-F9ABDB012C8C"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.8.5:*:*:*:*:*:*:*","matchCriteriaId":"DFF12ADC-83AA-45FE-9678-F49D05234D39"},{"vulnerable":true,"criteria":"cpe:2.3:a:the_cacti_group:cacti:0.8.5a:*:*:*:*:*:*:*","matchCriteriaId":"43FD0F4A-4811-4B4A-AF03-8FBC63A99CE9"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*","matchCriteriaId":"65ED9D8C-604D-4B0B-A192-C0DA4D2E9AEB"}]}]}],"references":[{"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2004-August/025376.html","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=109272483621038&w=2","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/12308","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200408-21.xml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/10960","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17011","source":"cve@mitre.org"},{"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2004-August/025376.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=109272483621038&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/12308","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200408-21.xml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/10960","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17011","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}