Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
07_cli-include-path.patch | Fix cli path =================================================================== |
Sean Finney <seanius@debian.org>, Slavko <linux@slavino.sk> | not-needed | debian | 2018-10-13 | |
enable-system-jqueryui-by-putting-cacti-changes-in-main.css.patch | Upstream embeds jquery-ui.css, but we want to use the system version of that file. To honor cacti's changes to jquery-ui.css, the delta is added as an overload in main.css instead. =================================================================== |
Paul Gevers <elbrus@debian.org> | yes | upstream | ||
perl-path.patch | Debian has perl on the path =================================================================== |
Paul Gevers <elbrus@debian.org> | not-needed | |||
font-awesome-path.patch | the file on Debian systems is named slightly different =================================================================== |
Paul Gevers <elbrus@debian.org> | no | |||
dont-process-.github-in-docs.patch | =================================================================== | no | ||||
adapt-check_all_pagest.sh-for-debian.patch | =================================================================== | no | ||||
adapt-check_cli_version.sh-for-debian.patch | =================================================================== | no | ||||
remove-external-images.patch | lintian detected privacy breach fix=================================================================== | Paul Gevers <elbrus@debian.org> | no | |||
CVE-2023-39357.patch | [PATCH] Correct against possible SQL Injections | TheWitness <thewitness@cacti.net> | no | 2023-08-04 | ||
CVE-2023-39358_1.patch | [PATCH] Fixing another SQL Injection issue | TheWitness <thewitness@cacti.net> | no | 2023-08-04 | ||
CVE-2023-39358_2.patch | [PATCH] Minor update to SQL Injection fix | TheWitness <thewitness@cacti.net> | no | 2023-08-04 | ||
CVE-2023-39359.patch | [PATCH] Fixing XSS in graphs.php | TheWitness <thewitness@cacti.net> | no | 2023-08-04 | ||
CVE-2023-39360.patch | [PATCH] Protect against XSS Reflection attacks | TheWitness <thewitness@cacti.net> | no | 2023-08-04 | ||
CVE-2023-39361.patch | [PATCH] QA: Additional REGEXP and RLIKE changes | TheWitness <thewitness@cacti.net> | no | 2023-08-04 | ||
CVE-2023-39362_1.patch | [PATCH] Addressing some potential command level injections | TheWitness <thewitness@cacti.net> | no | 2023-08-04 | ||
CVE-2023-39362_2.patch | [PATCH] QA: On command injection | TheWitness <thewitness@cacti.net> | no | 2023-08-04 | ||
CVE-2023-39364.patch | [PATCH] Correct issue with Hijacking Reference URL | TheWitness <thewitness@cacti.net> | no | 2023-08-04 | ||
CVE-2023-39365.patch | [PATCH] Fixing #5348 - Issues with Regular Expression searches in Cacti Unchecked Regular expressions can lead to privilege escalation and data leakage |
TheWitness <thewitness@cacti.net> | no | 2023-06-04 | ||
0001-Fixing-5318-Multiple-minor-stored-XSS-vulnerabilitie.patch | [PATCH] Fixing #5318 - Multiple minor stored XSS vulnerabilities | TheWitness <thewitness@cacti.net> | no | 2023-04-29 | ||
0001-Fixing-5318-Additional-XSS-in-Cacti.patch | [PATCH] Fixing #5318 - Additional XSS in Cacti | TheWitness <thewitness@cacti.net> | no | 2023-06-19 |