(:A SQL injection vulnerability has been identified in Cacti.:A remote attacker could exploit it by using URLs that include specially crafted SQL statements in order to modify or delete entries in some database tables.::The vulnerability is due to an improper validation of user-supplied input used in SQL queries in the "parent_id" parameter in the "tree.php" page.::A proof of concept is available.::The cacti packages provided by Debian Wheezy 7 and Jessie 8 are vulnerable.)