{"id":"CVE-2017-12065","details":"spikekill.php in Cacti before 1.1.16 might allow remote attackers to execute arbitrary code via the avgnan, outlier-start, or outlier-end parameter.","modified":"2026-04-16T06:18:33.070276534Z","published":"2017-08-01T05:29:00.257Z","related":["openSUSE-SU-2024:10670-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/100080"},{"type":"ADVISORY","url":"https://cacti.net/release_notes.php?version=1.1.16"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201711-10"},{"type":"FIX","url":"https://github.com/Cacti/cacti/commit/bd0e586f6f46d814930226f1516a194e7e72293e"},{"type":"FIX","url":"https://github.com/Cacti/cacti/issues/877"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/cacti/cacti","events":[{"introduced":"0"},{"last_affected":"de5d91da56b814a91655b18cb75effb582872d29"},{"fixed":"bd0e586f6f46d814930226f1516a194e7e72293e"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.1.15"}]}}],"versions":["release/1.0.0","release/1.0.1","release/1.0.2","release/1.0.3","release/1.0.4","release/1.0.5","release/1.0.6","release/1.1.0","release/1.1.1","release/1.1.11","release/1.1.12","release/1.1.13","release/1.1.14","release/1.1.15","release/1.1.2","release/1.1.3","release/1.1.4","release/1.1.5","release/1.1.6","release/1.1.7","release/1.1.8"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-12065.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}