| 0 |
| url |
VCID-34z4-1zqk-afcm |
| vulnerability_id |
VCID-34z4-1zqk-afcm |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39515 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49161 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49131 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49205 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49207 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.4916 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49155 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49181 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49164 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49167 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49113 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39515 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2023-39515
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-34z4-1zqk-afcm |
|
| 1 |
| url |
VCID-3tqy-g42y-9fef |
| vulnerability_id |
VCID-3tqy-g42y-9fef |
| summary |
A cross-site scripting (XSS) vulnerability exists in templates_import.php (Cacti 1.2.13) due to Improper escaping of error message during template import preview in the xml_path field |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-25706 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01458 |
| scoring_system |
epss |
| scoring_elements |
0.80772 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01458 |
| scoring_system |
epss |
| scoring_elements |
0.80781 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01458 |
| scoring_system |
epss |
| scoring_elements |
0.80802 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01458 |
| scoring_system |
epss |
| scoring_elements |
0.80799 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01458 |
| scoring_system |
epss |
| scoring_elements |
0.80826 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01458 |
| scoring_system |
epss |
| scoring_elements |
0.80835 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01458 |
| scoring_system |
epss |
| scoring_elements |
0.80851 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01458 |
| scoring_system |
epss |
| scoring_elements |
0.80836 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01458 |
| scoring_system |
epss |
| scoring_elements |
0.80829 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01458 |
| scoring_system |
epss |
| scoring_elements |
0.80866 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01458 |
| scoring_system |
epss |
| scoring_elements |
0.80868 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-25706 |
|
| 1 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2020-25706
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3tqy-g42y-9fef |
|
| 2 |
| url |
VCID-3y7d-ujep-4ydm |
| vulnerability_id |
VCID-3y7d-ujep-4ydm |
| summary |
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, Cacti calls `compat_password_hash` when users set their password. `compat_password_hash` use `password_hash` if there is it, else use `md5`. When verifying password, it calls `compat_password_verify`. In `compat_password_verify`, `password_verify` is called if there is it, else use `md5`. `password_verify` and `password_hash` are supported on PHP < 5.5.0, following PHP manual. The vulnerability is in `compat_password_verify`. Md5-hashed user input is compared with correct password in database by `$md5 == $hash`. It is a loose comparison, not `===`. It is a type juggling vulnerability. Version 1.2.27 contains a patch for the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-34340 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74784 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.7477 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74749 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74739 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74776 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74699 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74726 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.747 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74732 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74747 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-34340 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-34340
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3y7d-ujep-4ydm |
|
| 3 |
| url |
VCID-44fx-4w2y-y3dy |
| vulnerability_id |
VCID-44fx-4w2y-y3dy |
| summary |
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in `form_save()` function in `graph_template_inputs.php` is not thoroughly checked and is used to concatenate the SQL statement in `draw_nontemplated_fields_graph_item()` function from `lib/html_form_templates.php` , finally resulting in SQL injection. Version 1.2.27 contains a patch for the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31458 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06015 |
| scoring_system |
epss |
| scoring_elements |
0.90728 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.06015 |
| scoring_system |
epss |
| scoring_elements |
0.90714 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.06015 |
| scoring_system |
epss |
| scoring_elements |
0.90715 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.06015 |
| scoring_system |
epss |
| scoring_elements |
0.90711 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.06015 |
| scoring_system |
epss |
| scoring_elements |
0.9073 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.06015 |
| scoring_system |
epss |
| scoring_elements |
0.9067 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.06015 |
| scoring_system |
epss |
| scoring_elements |
0.9068 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.06015 |
| scoring_system |
epss |
| scoring_elements |
0.90689 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.06015 |
| scoring_system |
epss |
| scoring_elements |
0.907 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.06015 |
| scoring_system |
epss |
| scoring_elements |
0.90705 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31458 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-31458
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-44fx-4w2y-y3dy |
|
| 4 |
| url |
VCID-4twv-1yys-eban |
| vulnerability_id |
VCID-4twv-1yys-eban |
| summary |
Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-22604 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.72211 |
| scoring_system |
epss |
| scoring_elements |
0.98757 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.72211 |
| scoring_system |
epss |
| scoring_elements |
0.9875 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.72211 |
| scoring_system |
epss |
| scoring_elements |
0.98753 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.72211 |
| scoring_system |
epss |
| scoring_elements |
0.98754 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.72211 |
| scoring_system |
epss |
| scoring_elements |
0.98742 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.72211 |
| scoring_system |
epss |
| scoring_elements |
0.98746 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.72211 |
| scoring_system |
epss |
| scoring_elements |
0.98749 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-22604 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-22604
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4twv-1yys-eban |
|
| 5 |
| url |
VCID-5ykb-6nvx-k3e4 |
| vulnerability_id |
VCID-5ykb-6nvx-k3e4 |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39362 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.87228 |
| scoring_system |
epss |
| scoring_elements |
0.99443 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.87228 |
| scoring_system |
epss |
| scoring_elements |
0.99445 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.87228 |
| scoring_system |
epss |
| scoring_elements |
0.99446 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.87228 |
| scoring_system |
epss |
| scoring_elements |
0.99447 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.87228 |
| scoring_system |
epss |
| scoring_elements |
0.99448 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.87228 |
| scoring_system |
epss |
| scoring_elements |
0.99449 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.87228 |
| scoring_system |
epss |
| scoring_elements |
0.99452 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39362 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2023-39362
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5ykb-6nvx-k3e4 |
|
| 6 |
| url |
VCID-6t6n-ws5n-wkay |
| vulnerability_id |
VCID-6t6n-ws5n-wkay |
| summary |
Cacti provides an operational monitoring and fault management framework. Prior to 1.2.27, some of the data stored in `form_save()` function in `data_queries.php` is not thoroughly checked and is used to concatenate the HTML statement in `grow_right_pane_tree()` function from `lib/html.php` , finally resulting in cross-site scripting. Version 1.2.27 contains a patch for the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31443 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65757 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65719 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65731 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65752 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65737 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65708 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65743 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65672 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65702 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65667 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31443 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-31443
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6t6n-ws5n-wkay |
|
| 7 |
| url |
VCID-6ze5-dqdn-ykg3 |
| vulnerability_id |
VCID-6ze5-dqdn-ykg3 |
| summary |
Cacti is an open source performance and fault management framework. Prior to 1.2.29, an administrator can change the `Poller Standard Error Log Path` parameter in either Installation Step 5 or in Configuration->Settings->Paths tab to a local file inside the server. Then simply going to Logs tab and selecting the name of the local file will show its content on the web UI. This vulnerability is fixed in 1.2.29. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-45598 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19758 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1981 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19532 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19611 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19664 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19668 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.24993 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.24939 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.24951 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.24944 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-45598 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-45598
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6ze5-dqdn-ykg3 |
|
| 8 |
| url |
VCID-7m68-seeq-tuae |
| vulnerability_id |
VCID-7m68-seeq-tuae |
| summary |
Cacti is an open source performance and fault management framework. Some of the data stored in automation_tree_rules.php is not thoroughly checked and is used to concatenate the SQL statement in build_rule_item_filter() function from lib/api_automation.php, resulting in SQL injection. This vulnerability is fixed in 1.2.29. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-24368 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.2139 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00069 |
| scoring_system |
epss |
| scoring_elements |
0.21335 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29579 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29678 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.2968 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29636 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29586 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29605 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.2964 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34947 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-24368 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-24368
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7m68-seeq-tuae |
|
| 9 |
| url |
VCID-85gc-u991-z3dw |
| vulnerability_id |
VCID-85gc-u991-z3dw |
| summary |
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable through the "Package Import" feature, allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web server. The vulnerability is located within the `import_package()` function defined into the `/lib/import.php` script. The function blindly trusts the filename and file content provided within the XML data, and writes such files into the Cacti base path (or even outside, since path traversal sequences are not filtered). This can be exploited to write or overwrite arbitrary files on the web server, leading to execution of arbitrary PHP code or other security impacts. Version 1.2.27 contains a patch for this issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-25641 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.88383 |
| scoring_system |
epss |
| scoring_elements |
0.99502 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.88383 |
| scoring_system |
epss |
| scoring_elements |
0.99491 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.88383 |
| scoring_system |
epss |
| scoring_elements |
0.99493 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.88383 |
| scoring_system |
epss |
| scoring_elements |
0.99495 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.88383 |
| scoring_system |
epss |
| scoring_elements |
0.99496 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.88383 |
| scoring_system |
epss |
| scoring_elements |
0.99497 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.88383 |
| scoring_system |
epss |
| scoring_elements |
0.99498 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.88383 |
| scoring_system |
epss |
| scoring_elements |
0.99501 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-25641 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-25641
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-85gc-u991-z3dw |
|
| 10 |
| url |
VCID-8nbc-ethb-6kcn |
| vulnerability_id |
VCID-8nbc-ethb-6kcn |
| summary |
Multiple vulnerabilities have been found in Cacti, the worst of
which could lead to the remote execution of arbitrary code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17358 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02298 |
| scoring_system |
epss |
| scoring_elements |
0.84657 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02298 |
| scoring_system |
epss |
| scoring_elements |
0.84671 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02298 |
| scoring_system |
epss |
| scoring_elements |
0.84692 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02298 |
| scoring_system |
epss |
| scoring_elements |
0.84694 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02298 |
| scoring_system |
epss |
| scoring_elements |
0.84716 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02298 |
| scoring_system |
epss |
| scoring_elements |
0.84723 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02298 |
| scoring_system |
epss |
| scoring_elements |
0.84741 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02298 |
| scoring_system |
epss |
| scoring_elements |
0.84736 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02298 |
| scoring_system |
epss |
| scoring_elements |
0.8473 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02298 |
| scoring_system |
epss |
| scoring_elements |
0.84751 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02298 |
| scoring_system |
epss |
| scoring_elements |
0.84753 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17358 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2019-17358
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8nbc-ethb-6kcn |
|
| 11 |
| url |
VCID-9swv-zvke-ubet |
| vulnerability_id |
VCID-9swv-zvke-ubet |
| summary |
Multiple vulnerabilities have been found in Cacti, the worst of
which could result in the arbitrary execution of code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8813 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.93926 |
| scoring_system |
epss |
| scoring_elements |
0.99879 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.93926 |
| scoring_system |
epss |
| scoring_elements |
0.9988 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.93926 |
| scoring_system |
epss |
| scoring_elements |
0.99881 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.94091 |
| scoring_system |
epss |
| scoring_elements |
0.99904 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.94091 |
| scoring_system |
epss |
| scoring_elements |
0.99905 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8813 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2020-8813
|
| risk_score |
1.6 |
| exploitability |
2.0 |
| weighted_severity |
0.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9swv-zvke-ubet |
|
| 12 |
| url |
VCID-a8j1-24bw-gudu |
| vulnerability_id |
VCID-a8j1-24bw-gudu |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39364 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.3773 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37755 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37633 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37684 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37697 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37711 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37676 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37648 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37695 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37678 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39364 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2023-39364
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a8j1-24bw-gudu |
|
| 13 |
| url |
VCID-akj7-kh8f-97ct |
| vulnerability_id |
VCID-akj7-kh8f-97ct |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49088 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.77167 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.77196 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.77177 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.7721 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.77218 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.77246 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.77225 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.77221 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.77261 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.77262 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49088 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2023-49088
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-akj7-kh8f-97ct |
|
| 14 |
| url |
VCID-ay5a-nkmf-5yar |
| vulnerability_id |
VCID-ay5a-nkmf-5yar |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49086 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76305 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76335 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76314 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76347 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76361 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76387 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76365 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.7636 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76401 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76407 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49086 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2023-49086
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ay5a-nkmf-5yar |
|
| 15 |
| url |
VCID-be57-gxmc-vqd4 |
| vulnerability_id |
VCID-be57-gxmc-vqd4 |
| summary |
Cacti is an open source performance and fault management framework. The `fileurl` parameter is not properly sanitized when saving external links in `links.php` . Morever, the said fileurl is placed in some html code which is passed to the `print` function in `link.php` and `index.php`, finally leading to stored XSS. Users with the privilege to create external links can manipulate the `fileurl` parameter in the http post request while creating external links to perform stored XSS attacks. The vulnerability known as XSS (Cross-Site Scripting) occurs when an application allows untrusted user input to be displayed on a web page without proper validation or escaping. This issue has been addressed in release version 1.2.28. All users are advised to upgrade. There are no known workarounds for this issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-43362 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05453 |
| scoring_system |
epss |
| scoring_elements |
0.90204 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.05453 |
| scoring_system |
epss |
| scoring_elements |
0.90191 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.05453 |
| scoring_system |
epss |
| scoring_elements |
0.90185 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.05453 |
| scoring_system |
epss |
| scoring_elements |
0.90203 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.05453 |
| scoring_system |
epss |
| scoring_elements |
0.90156 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.05453 |
| scoring_system |
epss |
| scoring_elements |
0.90162 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.05453 |
| scoring_system |
epss |
| scoring_elements |
0.90177 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.05453 |
| scoring_system |
epss |
| scoring_elements |
0.90183 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.05453 |
| scoring_system |
epss |
| scoring_elements |
0.90192 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.07763 |
| scoring_system |
epss |
| scoring_elements |
0.91918 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-43362 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-43362
|
| risk_score |
3.3 |
| exploitability |
0.5 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-be57-gxmc-vqd4 |
|
| 16 |
| url |
VCID-c2b8-ss11-9yhq |
| vulnerability_id |
VCID-c2b8-ss11-9yhq |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39360 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.70215 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.70232 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.70209 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.70255 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.7027 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.70294 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.70279 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.70267 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.70308 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.70317 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39360 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2023-39360
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c2b8-ss11-9yhq |
|
| 17 |
| url |
VCID-cre7-1uhc-bka2 |
| vulnerability_id |
VCID-cre7-1uhc-bka2 |
| summary |
Multiple vulnerabilities have been found in Cacti, the worst of
which could lead to the remote execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16723 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50319 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50318 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50221 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50261 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.5029 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50238 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50284 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50312 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50286 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00268 |
| scoring_system |
epss |
| scoring_elements |
0.50274 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16723 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2019-16723
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cre7-1uhc-bka2 |
|
| 18 |
| url |
VCID-cxs3-zh36-m7en |
| vulnerability_id |
VCID-cxs3-zh36-m7en |
| summary |
Multiple vulnerabilities have been found in Cacti, the worst of
which could lead to the remote execution of arbitrary code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7106 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04094 |
| scoring_system |
epss |
| scoring_elements |
0.88531 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.04094 |
| scoring_system |
epss |
| scoring_elements |
0.88539 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.04094 |
| scoring_system |
epss |
| scoring_elements |
0.88556 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.04094 |
| scoring_system |
epss |
| scoring_elements |
0.88559 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.04094 |
| scoring_system |
epss |
| scoring_elements |
0.88577 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.04094 |
| scoring_system |
epss |
| scoring_elements |
0.88582 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.04094 |
| scoring_system |
epss |
| scoring_elements |
0.88594 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.04094 |
| scoring_system |
epss |
| scoring_elements |
0.88586 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.04094 |
| scoring_system |
epss |
| scoring_elements |
0.886 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.04094 |
| scoring_system |
epss |
| scoring_elements |
0.88597 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7106 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2020-7106
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cxs3-zh36-m7en |
|
| 19 |
| url |
VCID-d7db-n89n-qyd8 |
| vulnerability_id |
VCID-d7db-n89n-qyd8 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49084 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.88341 |
| scoring_system |
epss |
| scoring_elements |
0.99488 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.88341 |
| scoring_system |
epss |
| scoring_elements |
0.9949 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.88341 |
| scoring_system |
epss |
| scoring_elements |
0.99492 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.88341 |
| scoring_system |
epss |
| scoring_elements |
0.99493 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.88341 |
| scoring_system |
epss |
| scoring_elements |
0.99494 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.88341 |
| scoring_system |
epss |
| scoring_elements |
0.99495 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.88341 |
| scoring_system |
epss |
| scoring_elements |
0.99498 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.88341 |
| scoring_system |
epss |
| scoring_elements |
0.99499 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49084 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2023-49084
|
| risk_score |
1.6 |
| exploitability |
2.0 |
| weighted_severity |
0.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d7db-n89n-qyd8 |
|
| 20 |
| url |
VCID-e48s-dv1e-4fgn |
| vulnerability_id |
VCID-e48s-dv1e-4fgn |
| summary |
In Cacti before 1.2.11, auth_profile.php?action=edit allows CSRF for an admin email change. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13231 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00453 |
| scoring_system |
epss |
| scoring_elements |
0.63694 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00453 |
| scoring_system |
epss |
| scoring_elements |
0.63754 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00453 |
| scoring_system |
epss |
| scoring_elements |
0.6378 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00453 |
| scoring_system |
epss |
| scoring_elements |
0.63739 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00453 |
| scoring_system |
epss |
| scoring_elements |
0.63791 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00453 |
| scoring_system |
epss |
| scoring_elements |
0.63808 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00453 |
| scoring_system |
epss |
| scoring_elements |
0.63821 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00453 |
| scoring_system |
epss |
| scoring_elements |
0.63807 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00453 |
| scoring_system |
epss |
| scoring_elements |
0.63773 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00453 |
| scoring_system |
epss |
| scoring_elements |
0.63809 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00453 |
| scoring_system |
epss |
| scoring_elements |
0.63818 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13231 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2020-13231
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e48s-dv1e-4fgn |
|
| 21 |
| url |
VCID-fhtp-y9a5-vqgj |
| vulnerability_id |
VCID-fhtp-y9a5-vqgj |
| summary |
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, a SQL injection vulnerability in `automation_get_new_graphs_sql` function of `api_automation.php` allows authenticated users to exploit these SQL injection vulnerabilities to perform privilege escalation and remote code execution. In `api_automation.php` line 856, the `get_request_var('filter')` is being concatenated into the SQL statement without any sanitization. In `api_automation.php` line 717, The filter of `'filter'` is `FILTER_DEFAULT`, which means there is no filter for it. Version 1.2.27 contains a patch for the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31445 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.39471 |
| scoring_system |
epss |
| scoring_elements |
0.97297 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.39471 |
| scoring_system |
epss |
| scoring_elements |
0.97308 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.39471 |
| scoring_system |
epss |
| scoring_elements |
0.97298 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.39471 |
| scoring_system |
epss |
| scoring_elements |
0.9728 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.39471 |
| scoring_system |
epss |
| scoring_elements |
0.97285 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.39471 |
| scoring_system |
epss |
| scoring_elements |
0.97286 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.39471 |
| scoring_system |
epss |
| scoring_elements |
0.97293 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.39471 |
| scoring_system |
epss |
| scoring_elements |
0.97296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.39471 |
| scoring_system |
epss |
| scoring_elements |
0.97306 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31445 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-31445
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
7.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fhtp-y9a5-vqgj |
|
| 22 |
| url |
VCID-fwp2-z586-ebbq |
| vulnerability_id |
VCID-fwp2-z586-ebbq |
| summary |
Multiple vulnerabilities have been found in Cacti, the worst of
which could lead to the remote execution of arbitrary code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17357 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.16157 |
| scoring_system |
epss |
| scoring_elements |
0.94764 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.16157 |
| scoring_system |
epss |
| scoring_elements |
0.94774 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.16157 |
| scoring_system |
epss |
| scoring_elements |
0.94778 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.16157 |
| scoring_system |
epss |
| scoring_elements |
0.94779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.16157 |
| scoring_system |
epss |
| scoring_elements |
0.94788 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.16157 |
| scoring_system |
epss |
| scoring_elements |
0.94792 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.16157 |
| scoring_system |
epss |
| scoring_elements |
0.94797 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.16157 |
| scoring_system |
epss |
| scoring_elements |
0.948 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.16157 |
| scoring_system |
epss |
| scoring_elements |
0.94801 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.16157 |
| scoring_system |
epss |
| scoring_elements |
0.94808 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.16157 |
| scoring_system |
epss |
| scoring_elements |
0.94812 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-17357 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2019-17357
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fwp2-z586-ebbq |
|
| 23 |
| url |
VCID-h3qa-svy4-1fcr |
| vulnerability_id |
VCID-h3qa-svy4-1fcr |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49085 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.91404 |
| scoring_system |
epss |
| scoring_elements |
0.99656 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.91404 |
| scoring_system |
epss |
| scoring_elements |
0.99658 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.91404 |
| scoring_system |
epss |
| scoring_elements |
0.99659 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.91404 |
| scoring_system |
epss |
| scoring_elements |
0.9966 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.91404 |
| scoring_system |
epss |
| scoring_elements |
0.99661 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.91404 |
| scoring_system |
epss |
| scoring_elements |
0.99662 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.91404 |
| scoring_system |
epss |
| scoring_elements |
0.99663 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.91404 |
| scoring_system |
epss |
| scoring_elements |
0.99664 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49085 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2023-49085
|
| risk_score |
1.6 |
| exploitability |
2.0 |
| weighted_severity |
0.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h3qa-svy4-1fcr |
|
| 24 |
| url |
VCID-hj89-pnag-3fer |
| vulnerability_id |
VCID-hj89-pnag-3fer |
| summary |
Cacti is an open source performance and fault management framework. An admin user can create a device with a malicious hostname containing php code and repeat the installation process (completing only step 5 of the installation process is enough, no need to complete the steps before or after it) to use a php file as the cacti log file. After having the malicious hostname end up in the logs (log poisoning), one can simply go to the log file url to execute commands to achieve RCE. This issue has been addressed in version 1.2.28 and all users are advised to upgrade. There are no known workarounds for this vulnerability. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-43363 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.75133 |
| scoring_system |
epss |
| scoring_elements |
0.98879 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.75133 |
| scoring_system |
epss |
| scoring_elements |
0.98876 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.75133 |
| scoring_system |
epss |
| scoring_elements |
0.98878 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.75133 |
| scoring_system |
epss |
| scoring_elements |
0.98868 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.75133 |
| scoring_system |
epss |
| scoring_elements |
0.98869 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.75133 |
| scoring_system |
epss |
| scoring_elements |
0.98872 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.75133 |
| scoring_system |
epss |
| scoring_elements |
0.98873 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.75133 |
| scoring_system |
epss |
| scoring_elements |
0.98875 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-43363 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-43363
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hj89-pnag-3fer |
|
| 25 |
| url |
VCID-huf2-qwju-6bf2 |
| vulnerability_id |
VCID-huf2-qwju-6bf2 |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39365 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38327 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38352 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38217 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38267 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38275 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38294 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38258 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38234 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38281 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.3826 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39365 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2023-39365
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-huf2-qwju-6bf2 |
|
| 26 |
| url |
VCID-jkca-shmj-mbbu |
| vulnerability_id |
VCID-jkca-shmj-mbbu |
| summary |
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, there is a file inclusion issue in the `lib/plugin.php` file. Combined with SQL injection vulnerabilities, remote code execution can be implemented. There is a file inclusion issue with the `api_plugin_hook()` function in the `lib/plugin.php` file, which reads the plugin_hooks and plugin_config tables in database. The read data is directly used to concatenate the file path which is used for file inclusion. Version 1.2.27 contains a patch for the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31459 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01844 |
| scoring_system |
epss |
| scoring_elements |
0.83006 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01844 |
| scoring_system |
epss |
| scoring_elements |
0.82933 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.01844 |
| scoring_system |
epss |
| scoring_elements |
0.8293 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.01844 |
| scoring_system |
epss |
| scoring_elements |
0.82955 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.01844 |
| scoring_system |
epss |
| scoring_elements |
0.82962 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01844 |
| scoring_system |
epss |
| scoring_elements |
0.82977 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01844 |
| scoring_system |
epss |
| scoring_elements |
0.82972 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01844 |
| scoring_system |
epss |
| scoring_elements |
0.82968 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01844 |
| scoring_system |
epss |
| scoring_elements |
0.83007 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.01844 |
| scoring_system |
epss |
| scoring_elements |
0.82921 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31459 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-31459
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jkca-shmj-mbbu |
|
| 27 |
| url |
VCID-k6z6-4pb4-tbeu |
| vulnerability_id |
VCID-k6z6-4pb4-tbeu |
| summary |
Multiple Cross Site Scripting (XSS) vulneratiblities exist in Cacti 1.2.12 in (1) reports_admin.php, (2) data_queries.php, (3) data_input.php, (4) graph_templates.php, (5) graphs.php, (6) reports_admin.php, and (7) data_input.php. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-23226 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01252 |
| scoring_system |
epss |
| scoring_elements |
0.79296 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01252 |
| scoring_system |
epss |
| scoring_elements |
0.79303 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01252 |
| scoring_system |
epss |
| scoring_elements |
0.79327 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01252 |
| scoring_system |
epss |
| scoring_elements |
0.79313 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01252 |
| scoring_system |
epss |
| scoring_elements |
0.79338 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01252 |
| scoring_system |
epss |
| scoring_elements |
0.79348 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01252 |
| scoring_system |
epss |
| scoring_elements |
0.79371 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01252 |
| scoring_system |
epss |
| scoring_elements |
0.79356 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01252 |
| scoring_system |
epss |
| scoring_elements |
0.79345 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01252 |
| scoring_system |
epss |
| scoring_elements |
0.79373 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01252 |
| scoring_system |
epss |
| scoring_elements |
0.79368 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-23226 |
|
| 1 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2020-23226
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k6z6-4pb4-tbeu |
|
| 28 |
| url |
VCID-k7kv-za2s-dud5 |
| vulnerability_id |
VCID-k7kv-za2s-dud5 |
| summary |
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in `automation_tree_rules.php` is not thoroughly checked and is used to concatenate the SQL statement in `create_all_header_nodes()` function from `lib/api_automation.php` , finally resulting in SQL injection. Using SQL based secondary injection technology, attackers can modify the contents of the Cacti database, and based on the modified content, it may be possible to achieve further impact, such as arbitrary file reading, and even remote code execution through arbitrary file writing. Version 1.2.27 contains a patch for the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31460 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01692 |
| scoring_system |
epss |
| scoring_elements |
0.82284 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01692 |
| scoring_system |
epss |
| scoring_elements |
0.82207 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.01692 |
| scoring_system |
epss |
| scoring_elements |
0.82234 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.01692 |
| scoring_system |
epss |
| scoring_elements |
0.82241 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.01692 |
| scoring_system |
epss |
| scoring_elements |
0.8226 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.01692 |
| scoring_system |
epss |
| scoring_elements |
0.82253 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.01692 |
| scoring_system |
epss |
| scoring_elements |
0.82247 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.01692 |
| scoring_system |
epss |
| scoring_elements |
0.82191 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.01692 |
| scoring_system |
epss |
| scoring_elements |
0.82211 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31460 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-31460
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k7kv-za2s-dud5 |
|
| 29 |
| url |
VCID-khhn-9sja-sfgr |
| vulnerability_id |
VCID-khhn-9sja-sfgr |
| summary |
Cacti is an open source performance and fault management framework. An authenticated Cacti user can abuse graph creation and graph template functionality to create arbitrary PHP scripts in the web root of the application, leading to remote code execution on the server. This vulnerability is fixed in 1.2.29. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-24367 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.90486 |
| scoring_system |
epss |
| scoring_elements |
0.99606 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.90486 |
| scoring_system |
epss |
| scoring_elements |
0.99608 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.90486 |
| scoring_system |
epss |
| scoring_elements |
0.99609 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.90486 |
| scoring_system |
epss |
| scoring_elements |
0.9961 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-24367 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-24367
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
7.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-khhn-9sja-sfgr |
|
| 30 |
| url |
VCID-mebp-4rfu-vqcq |
| vulnerability_id |
VCID-mebp-4rfu-vqcq |
| summary |
DOMpurify has a nesting-based mXSS
DOMpurify was vulnerable to nesting-based mXSS
fixed by [0ef5e537](https://github.com/cure53/DOMPurify/tree/0ef5e537a514f904b6aa1d7ad9e749e365d7185f) (2.x) and
[merge 943](https://github.com/cure53/DOMPurify/pull/943)
Backporter should be aware of GHSA-mmhx-hmjr-r674 (CVE-2024-45801) when cherry-picking
POC is avaible under [test](https://github.com/cure53/DOMPurify/blob/0ef5e537a514f904b6aa1d7ad9e749e365d7185f/test/test-suite.js#L2098) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47875 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.72026 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.72019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.71978 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.71993 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.7201 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.71939 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.71935 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.71959 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.71986 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.71974 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47875 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/cure53/DOMPurify |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
10.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H |
|
| 1 |
| value |
7.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:H/SA:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/cure53/DOMPurify |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-47875, GHSA-gx9m-whjm-85jf
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mebp-4rfu-vqcq |
|
| 31 |
| url |
VCID-pau5-hfbv-nucp |
| vulnerability_id |
VCID-pau5-hfbv-nucp |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39513 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52839 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52865 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52832 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52884 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52878 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52928 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52912 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52895 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52933 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.5294 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39513 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2023-39513
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pau5-hfbv-nucp |
|
| 32 |
| url |
VCID-qnz1-w7bb-97ee |
| vulnerability_id |
VCID-qnz1-w7bb-97ee |
| summary |
Cross Site Scripting (XSS) vulnerability in Cacti 1.2.21 via crafted POST request to graphs_new.php. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-41444 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51919 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51812 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51799 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51854 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51851 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51903 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51885 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.5187 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00285 |
| scoring_system |
epss |
| scoring_elements |
0.51912 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-41444 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-41444
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qnz1-w7bb-97ee |
|
| 33 |
| url |
VCID-qvkt-vk55-4bbx |
| vulnerability_id |
VCID-qvkt-vk55-4bbx |
| summary |
A vulnerability in Cacti could lead to remote code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35701 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82987 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82885 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82901 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82914 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.8291 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82936 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82943 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82958 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82953 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82949 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82988 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35701 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2020-35701
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qvkt-vk55-4bbx |
|
| 34 |
| url |
VCID-rftg-byj2-jkh9 |
| vulnerability_id |
VCID-rftg-byj2-jkh9 |
| summary |
Cacti before 1.2.6 allows IDOR (Insecure Direct Object Reference) for accessing any graph via a modified local_graph_id parameter to graph_xport.php. This is a different vulnerability than CVE-2019-16723. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-37543 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69996 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69986 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69893 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69907 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69884 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69932 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69949 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69972 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69957 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00617 |
| scoring_system |
epss |
| scoring_elements |
0.69943 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-37543 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2023-37543
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rftg-byj2-jkh9 |
|
| 35 |
| url |
VCID-s8du-gzj2-gkc1 |
| vulnerability_id |
VCID-s8du-gzj2-gkc1 |
| summary |
Cacti is an open source performance and fault management framework. The `title` parameter is not properly sanitized when saving external links in links.php . Morever, the said title parameter is stored in the database and reflected back to user in index.php, finally leading to stored XSS. Users with the privilege to create external links can manipulate the `title` parameter in the http post request while creating external links to perform stored XSS attacks. The vulnerability known as XSS (Cross-Site Scripting) occurs when an application allows untrusted user input to be displayed on a web page without proper validation or escaping. This issue has been addressed in release version 1.2.28. All users are advised to upgrade. There are no known workarounds for this vulnerability. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-43364 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.90033 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.90022 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.90016 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.90032 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.89988 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.89993 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.90009 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.90014 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.90024 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.07542 |
| scoring_system |
epss |
| scoring_elements |
0.91788 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-43364 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-43364
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s8du-gzj2-gkc1 |
|
| 36 |
| url |
VCID-sb43-hapb-1uf2 |
| vulnerability_id |
VCID-sb43-hapb-1uf2 |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39357 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.87071 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.8709 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.87083 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.87103 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.87111 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.87124 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.87119 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.87114 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.8713 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.87134 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39357 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2023-39357
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sb43-hapb-1uf2 |
|
| 37 |
| url |
VCID-ses2-y1j2-vbbx |
| vulnerability_id |
VCID-ses2-y1j2-vbbx |
| summary |
Multiple vulnerabilities have been found in Cacti, the worst of
which could result in the arbitrary execution of code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14295 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.81199 |
| scoring_system |
epss |
| scoring_elements |
0.99156 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.81199 |
| scoring_system |
epss |
| scoring_elements |
0.99157 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.81199 |
| scoring_system |
epss |
| scoring_elements |
0.99159 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.81199 |
| scoring_system |
epss |
| scoring_elements |
0.99162 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.81199 |
| scoring_system |
epss |
| scoring_elements |
0.99164 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.81199 |
| scoring_system |
epss |
| scoring_elements |
0.99165 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.81199 |
| scoring_system |
epss |
| scoring_elements |
0.99167 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14295 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2020-14295
|
| risk_score |
1.4 |
| exploitability |
2.0 |
| weighted_severity |
0.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ses2-y1j2-vbbx |
|
| 38 |
| url |
VCID-sx2t-uzae-2fh9 |
| vulnerability_id |
VCID-sx2t-uzae-2fh9 |
| summary |
Cacti is an open source performance and fault management framework. Cacti has a SQL injection vulnerability in the get_discovery_results function of automation_devices.php using the network parameter. This vulnerability is fixed in 1.2.29. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-54145 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24603 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24415 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2464 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0018 |
| scoring_system |
epss |
| scoring_elements |
0.39609 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.0018 |
| scoring_system |
epss |
| scoring_elements |
0.3964 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.0018 |
| scoring_system |
epss |
| scoring_elements |
0.39604 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.0018 |
| scoring_system |
epss |
| scoring_elements |
0.39587 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.0018 |
| scoring_system |
epss |
| scoring_elements |
0.39638 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.0018 |
| scoring_system |
epss |
| scoring_elements |
0.39616 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.0018 |
| scoring_system |
epss |
| scoring_elements |
0.39631 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-54145 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-54145
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sx2t-uzae-2fh9 |
|
| 39 |
| url |
VCID-uj1s-uuyx-mya5 |
| vulnerability_id |
VCID-uj1s-uuyx-mya5 |
| summary |
Multiple vulnerabilities have been found in Cacti, the worst of
which could lead to the remote execution of arbitrary code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7237 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.46813 |
| scoring_system |
epss |
| scoring_elements |
0.97647 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.46813 |
| scoring_system |
epss |
| scoring_elements |
0.97653 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.46813 |
| scoring_system |
epss |
| scoring_elements |
0.97655 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.46813 |
| scoring_system |
epss |
| scoring_elements |
0.97656 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.46813 |
| scoring_system |
epss |
| scoring_elements |
0.9766 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.46813 |
| scoring_system |
epss |
| scoring_elements |
0.97662 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.46813 |
| scoring_system |
epss |
| scoring_elements |
0.97664 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.46813 |
| scoring_system |
epss |
| scoring_elements |
0.97667 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.46813 |
| scoring_system |
epss |
| scoring_elements |
0.97674 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.46813 |
| scoring_system |
epss |
| scoring_elements |
0.97677 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7237 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2020-7237
|
| risk_score |
0.2 |
| exploitability |
0.5 |
| weighted_severity |
0.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uj1s-uuyx-mya5 |
|
| 40 |
| url |
VCID-vbs9-gben-9kgc |
| vulnerability_id |
VCID-vbs9-gben-9kgc |
| summary |
DOMPurify vulnerable to tampering by prototype polution
dompurify was vulnerable to prototype pollution
Fixed by https://github.com/cure53/DOMPurify/commit/d1dd0374caef2b4c56c3bd09fe1988c3479166dc |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-48910 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02592 |
| scoring_system |
epss |
| scoring_elements |
0.85619 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.02592 |
| scoring_system |
epss |
| scoring_elements |
0.85547 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.02592 |
| scoring_system |
epss |
| scoring_elements |
0.85553 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.02592 |
| scoring_system |
epss |
| scoring_elements |
0.85573 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.02592 |
| scoring_system |
epss |
| scoring_elements |
0.85583 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.02592 |
| scoring_system |
epss |
| scoring_elements |
0.85597 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.02592 |
| scoring_system |
epss |
| scoring_elements |
0.85594 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.02592 |
| scoring_system |
epss |
| scoring_elements |
0.8559 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.02592 |
| scoring_system |
epss |
| scoring_elements |
0.85613 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.02808 |
| scoring_system |
epss |
| scoring_elements |
0.86074 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-48910 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/cure53/DOMPurify |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
|
| 1 |
| value |
9.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/cure53/DOMPurify |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-48910, GHSA-p3vf-v8qc-cwcr
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vbs9-gben-9kgc |
|
| 41 |
| url |
VCID-vsjt-qjyw-hbfs |
| vulnerability_id |
VCID-vsjt-qjyw-hbfs |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39359 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.89353 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.89365 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.89368 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.89385 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.89388 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.89397 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.89394 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.8939 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.89405 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.89406 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39359 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2023-39359
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
7.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vsjt-qjyw-hbfs |
|
| 42 |
| url |
VCID-wrxa-2us4-vkf9 |
| vulnerability_id |
VCID-wrxa-2us4-vkf9 |
| summary |
In Cacti before 1.2.11, disabling a user account does not immediately invalidate any permissions granted to that account (e.g., permission to view logs). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13230 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00799 |
| scoring_system |
epss |
| scoring_elements |
0.73977 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00799 |
| scoring_system |
epss |
| scoring_elements |
0.73984 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00799 |
| scoring_system |
epss |
| scoring_elements |
0.7401 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00799 |
| scoring_system |
epss |
| scoring_elements |
0.73981 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00799 |
| scoring_system |
epss |
| scoring_elements |
0.74015 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00799 |
| scoring_system |
epss |
| scoring_elements |
0.74028 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00799 |
| scoring_system |
epss |
| scoring_elements |
0.74051 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00799 |
| scoring_system |
epss |
| scoring_elements |
0.74032 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00799 |
| scoring_system |
epss |
| scoring_elements |
0.74025 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00799 |
| scoring_system |
epss |
| scoring_elements |
0.74064 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00799 |
| scoring_system |
epss |
| scoring_elements |
0.74073 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13230 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2020-13230
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wrxa-2us4-vkf9 |
|
| 43 |
| url |
VCID-ws4h-295a-9qgx |
| vulnerability_id |
VCID-ws4h-295a-9qgx |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39516 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51728 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51754 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51714 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51768 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51765 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51815 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51794 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51778 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51819 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51826 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39516 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2023-39516
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ws4h-295a-9qgx |
|
| 44 |
| url |
VCID-xbb2-av4z-m3dp |
| vulnerability_id |
VCID-xbb2-av4z-m3dp |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2022-46169
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xbb2-av4z-m3dp |
|
| 45 |
| url |
VCID-xdbp-7rtr-fyb7 |
| vulnerability_id |
VCID-xdbp-7rtr-fyb7 |
| summary |
Cacti is an open source performance and fault management framework. The`consolenewsection` parameter is not properly sanitized when saving external links in links.php . Morever, the said consolenewsection parameter is stored in the database and reflected back to user in `index.php`, finally leading to stored XSS. Users with the privilege to create external links can manipulate the “consolenewsection” parameter in the http post request while creating external links to perform stored XSS attacks. The vulnerability known as XSS (Cross-Site Scripting) occurs when an application allows untrusted user input to be displayed on a web page without proper validation or escaping. This issue has been addressed in release version 1.2.28. All users are advised to upgrade. There are no known workarounds for this vulnerability. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-43365 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.90033 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.90016 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.90032 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.89975 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.89988 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.89993 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.90009 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.90014 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.90024 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.05293 |
| scoring_system |
epss |
| scoring_elements |
0.90022 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-43365 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-43365
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xdbp-7rtr-fyb7 |
|
| 46 |
| url |
VCID-xpvn-y3b8-skgb |
| vulnerability_id |
VCID-xpvn-y3b8-skgb |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0730 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53573 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53595 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53624 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53593 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53644 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53642 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53691 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53674 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53657 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53695 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.537 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0730 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2022-0730
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xpvn-y3b8-skgb |
|
| 47 |
| url |
VCID-y683-kz6e-afhv |
| vulnerability_id |
VCID-y683-kz6e-afhv |
| summary |
Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, some of the data stored in `automation_tree_rules_form_save()` function in `automation_tree_rules.php` is not thoroughly checked and is used to concatenate the HTML statement in `form_confirm()` function from `lib/html.php` , finally resulting in cross-site scripting. Version 1.2.27 contains a patch for the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31444 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.09401 |
| scoring_system |
epss |
| scoring_elements |
0.92798 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.09401 |
| scoring_system |
epss |
| scoring_elements |
0.92778 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.09401 |
| scoring_system |
epss |
| scoring_elements |
0.92783 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.09401 |
| scoring_system |
epss |
| scoring_elements |
0.92788 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.09401 |
| scoring_system |
epss |
| scoring_elements |
0.92787 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.09401 |
| scoring_system |
epss |
| scoring_elements |
0.92767 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.09401 |
| scoring_system |
epss |
| scoring_elements |
0.92772 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.09401 |
| scoring_system |
epss |
| scoring_elements |
0.92769 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-31444 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-31444
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y683-kz6e-afhv |
|
| 48 |
| url |
VCID-ypan-57sx-vyam |
| vulnerability_id |
VCID-ypan-57sx-vyam |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39361 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.92278 |
| scoring_system |
epss |
| scoring_elements |
0.99717 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.92278 |
| scoring_system |
epss |
| scoring_elements |
0.99718 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.92278 |
| scoring_system |
epss |
| scoring_elements |
0.99719 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.92278 |
| scoring_system |
epss |
| scoring_elements |
0.9972 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39361 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| purl |
pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3y7d-ujep-4ydm |
|
| 1 |
| vulnerability |
VCID-44fx-4w2y-y3dy |
|
| 2 |
| vulnerability |
VCID-4e5y-1s19-r7g7 |
|
| 3 |
| vulnerability |
VCID-4twv-1yys-eban |
|
| 4 |
| vulnerability |
VCID-6t6n-ws5n-wkay |
|
| 5 |
| vulnerability |
VCID-6ze5-dqdn-ykg3 |
|
| 6 |
| vulnerability |
VCID-7m68-seeq-tuae |
|
| 7 |
| vulnerability |
VCID-85gc-u991-z3dw |
|
| 8 |
| vulnerability |
VCID-be57-gxmc-vqd4 |
|
| 9 |
| vulnerability |
VCID-cqr3-wwhj-tyck |
|
| 10 |
| vulnerability |
VCID-fhtp-y9a5-vqgj |
|
| 11 |
| vulnerability |
VCID-hj89-pnag-3fer |
|
| 12 |
| vulnerability |
VCID-jkca-shmj-mbbu |
|
| 13 |
| vulnerability |
VCID-k7kv-za2s-dud5 |
|
| 14 |
| vulnerability |
VCID-khhn-9sja-sfgr |
|
| 15 |
| vulnerability |
VCID-mebp-4rfu-vqcq |
|
| 16 |
| vulnerability |
VCID-pxqa-nkv3-jqfs |
|
| 17 |
| vulnerability |
VCID-qnz1-w7bb-97ee |
|
| 18 |
| vulnerability |
VCID-s8du-gzj2-gkc1 |
|
| 19 |
| vulnerability |
VCID-sx2t-uzae-2fh9 |
|
| 20 |
| vulnerability |
VCID-vbs9-gben-9kgc |
|
| 21 |
| vulnerability |
VCID-xdbp-7rtr-fyb7 |
|
| 22 |
| vulnerability |
VCID-xkkm-ss3p-1udc |
|
| 23 |
| vulnerability |
VCID-y683-kz6e-afhv |
|
| 24 |
| vulnerability |
VCID-zxu5-equ9-1kam |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3 |
|
|
| aliases |
CVE-2023-39361
|
| risk_score |
1.6 |
| exploitability |
2.0 |
| weighted_severity |
0.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ypan-57sx-vyam |
|