Description
|
|
Three vulnerabilities have been identified in Cacti, which could be exploited to conduct cross site scripting attacks. These issues are caused by input validation errors when processing the "hostname", "host_id" and "description" parameters, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
|