This indicates an attack attempt to exploit an SQL Injection Vulnerability in Cacti Group Cacti.
The vulnerability is due to improper validation of user supplied input in requests to graphs.php. A remote, authenticated attacker can exploit this vulnerability by sending an HTTP request with crafted HTTP parameters to the target server. Successful exploitation could result in the execution of arbitrary SQL commands against the database on the target server.
Cacti Group Cacti 1.2.7 and prior
System Compromise: Remote attackers can add, view, delete or modify data in the database of the affected application
Apply the most recent upgrade or patch from the vendor.