Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/cacti@0.8.7i-1?distro=trixie
Typedeb
Namespacedebian
Namecacti
Version0.8.7i-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version0.8.8b+dfsg-1
Latest_non_vulnerable_version1.2.30+ds1-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4ytj-s8hh-6bd5
vulnerability_id VCID-4ytj-s8hh-6bd5
summary SQL injection vulnerability in auth_login.php in Cacti before 0.8.7h allows remote attackers to execute arbitrary SQL commands via the login_username parameter.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4824
reference_id
reference_type
scores
0
value 0.03247
scoring_system epss
scoring_elements 0.87061
published_at 2026-04-01T12:55:00Z
1
value 0.03247
scoring_system epss
scoring_elements 0.87072
published_at 2026-04-02T12:55:00Z
2
value 0.03247
scoring_system epss
scoring_elements 0.87091
published_at 2026-04-04T12:55:00Z
3
value 0.03247
scoring_system epss
scoring_elements 0.87084
published_at 2026-04-07T12:55:00Z
4
value 0.03247
scoring_system epss
scoring_elements 0.87104
published_at 2026-04-08T12:55:00Z
5
value 0.03247
scoring_system epss
scoring_elements 0.87112
published_at 2026-04-09T12:55:00Z
6
value 0.03247
scoring_system epss
scoring_elements 0.87125
published_at 2026-04-11T12:55:00Z
7
value 0.03247
scoring_system epss
scoring_elements 0.87119
published_at 2026-04-12T12:55:00Z
8
value 0.03247
scoring_system epss
scoring_elements 0.87115
published_at 2026-04-13T12:55:00Z
9
value 0.03247
scoring_system epss
scoring_elements 0.87131
published_at 2026-04-16T12:55:00Z
10
value 0.03247
scoring_system epss
scoring_elements 0.87135
published_at 2026-04-18T12:55:00Z
11
value 0.03247
scoring_system epss
scoring_elements 0.87132
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4824
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4824
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652371
reference_id 652371
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652371
fixed_packages
0
url pkg:deb/debian/cacti@0.8.7i-1?distro=trixie
purl pkg:deb/debian/cacti@0.8.7i-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.7i-1%3Fdistro=trixie
1
url pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4e5y-1s19-r7g7
1
vulnerability VCID-cqr3-wwhj-tyck
2
vulnerability VCID-pxqa-nkv3-jqfs
3
vulnerability VCID-xkkm-ss3p-1udc
4
vulnerability VCID-zxu5-equ9-1kam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4e5y-1s19-r7g7
1
vulnerability VCID-pxqa-nkv3-jqfs
2
vulnerability VCID-xkkm-ss3p-1udc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.24%252Bds1-1%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie
purl pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-1%3Fdistro=trixie
4
url pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie
purl pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-2%3Fdistro=trixie
aliases CVE-2011-4824
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ytj-s8hh-6bd5
1
url VCID-ddq2-myvr-wfgz
vulnerability_id VCID-ddq2-myvr-wfgz
summary Cross-site request forgery (CSRF) vulnerability in logout.php in Cacti before 0.8.7i allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
references
0
reference_url http://bugs.cacti.net/view.php?id=2062
reference_id
reference_type
scores
url http://bugs.cacti.net/view.php?id=2062
1
reference_url http://forums.cacti.net/viewtopic.php?f=21&t=44116
reference_id
reference_type
scores
url http://forums.cacti.net/viewtopic.php?f=21&t=44116
2
reference_url http://forums.cacti.net/viewtopic.php?f=4&t=45871
reference_id
reference_type
scores
url http://forums.cacti.net/viewtopic.php?f=4&t=45871
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-5223
reference_id
reference_type
scores
0
value 0.00453
scoring_system epss
scoring_elements 0.63795
published_at 2026-04-18T12:55:00Z
1
value 0.00453
scoring_system epss
scoring_elements 0.6367
published_at 2026-04-01T12:55:00Z
2
value 0.00453
scoring_system epss
scoring_elements 0.6373
published_at 2026-04-02T12:55:00Z
3
value 0.00453
scoring_system epss
scoring_elements 0.63755
published_at 2026-04-04T12:55:00Z
4
value 0.00453
scoring_system epss
scoring_elements 0.63715
published_at 2026-04-07T12:55:00Z
5
value 0.00453
scoring_system epss
scoring_elements 0.63767
published_at 2026-04-08T12:55:00Z
6
value 0.00453
scoring_system epss
scoring_elements 0.63784
published_at 2026-04-16T12:55:00Z
7
value 0.00453
scoring_system epss
scoring_elements 0.63797
published_at 2026-04-11T12:55:00Z
8
value 0.00453
scoring_system epss
scoring_elements 0.63782
published_at 2026-04-21T12:55:00Z
9
value 0.00453
scoring_system epss
scoring_elements 0.63749
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-5223
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5223
5
reference_url http://secunia.com/advisories/47195
reference_id
reference_type
scores
url http://secunia.com/advisories/47195
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/71792
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/71792
7
reference_url http://www.securityfocus.com/bid/51048
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/51048
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.5:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.5:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.6:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.7:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.8a:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.3a:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.5:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.5a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.5a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.5a:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6a:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6b:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6c:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6d:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6f:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6g:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6h:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6i:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6j:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6j:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6j:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6k:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6k:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6k:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.7f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7f:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.7g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7g:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-5223
reference_id CVE-2011-5223
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-5223
fixed_packages
0
url pkg:deb/debian/cacti@0.8.7i-1?distro=trixie
purl pkg:deb/debian/cacti@0.8.7i-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.7i-1%3Fdistro=trixie
1
url pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4e5y-1s19-r7g7
1
vulnerability VCID-cqr3-wwhj-tyck
2
vulnerability VCID-pxqa-nkv3-jqfs
3
vulnerability VCID-xkkm-ss3p-1udc
4
vulnerability VCID-zxu5-equ9-1kam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4e5y-1s19-r7g7
1
vulnerability VCID-pxqa-nkv3-jqfs
2
vulnerability VCID-xkkm-ss3p-1udc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.24%252Bds1-1%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie
purl pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-1%3Fdistro=trixie
4
url pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie
purl pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-2%3Fdistro=trixie
aliases CVE-2011-5223
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ddq2-myvr-wfgz
2
url VCID-jmv3-vh81-zfdq
vulnerability_id VCID-jmv3-vh81-zfdq
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48547
reference_id
reference_type
scores
0
value 0.00467
scoring_system epss
scoring_elements 0.64472
published_at 2026-04-21T12:55:00Z
1
value 0.00467
scoring_system epss
scoring_elements 0.64409
published_at 2026-04-02T12:55:00Z
2
value 0.00467
scoring_system epss
scoring_elements 0.64438
published_at 2026-04-04T12:55:00Z
3
value 0.00467
scoring_system epss
scoring_elements 0.64398
published_at 2026-04-07T12:55:00Z
4
value 0.00467
scoring_system epss
scoring_elements 0.64446
published_at 2026-04-08T12:55:00Z
5
value 0.00467
scoring_system epss
scoring_elements 0.64462
published_at 2026-04-12T12:55:00Z
6
value 0.00467
scoring_system epss
scoring_elements 0.64474
published_at 2026-04-11T12:55:00Z
7
value 0.00467
scoring_system epss
scoring_elements 0.64434
published_at 2026-04-13T12:55:00Z
8
value 0.00467
scoring_system epss
scoring_elements 0.64468
published_at 2026-04-16T12:55:00Z
9
value 0.00467
scoring_system epss
scoring_elements 0.6448
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48547
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48547
2
reference_url https://github.com/Cacti/cacti/issues/1882
reference_id 1882
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:09:10Z/
url https://github.com/Cacti/cacti/issues/1882
3
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
fixed_packages
0
url pkg:deb/debian/cacti@0.8.7i-1?distro=trixie
purl pkg:deb/debian/cacti@0.8.7i-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.7i-1%3Fdistro=trixie
1
url pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4e5y-1s19-r7g7
1
vulnerability VCID-cqr3-wwhj-tyck
2
vulnerability VCID-pxqa-nkv3-jqfs
3
vulnerability VCID-xkkm-ss3p-1udc
4
vulnerability VCID-zxu5-equ9-1kam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4e5y-1s19-r7g7
1
vulnerability VCID-pxqa-nkv3-jqfs
2
vulnerability VCID-xkkm-ss3p-1udc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.24%252Bds1-1%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie
purl pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-1%3Fdistro=trixie
4
url pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie
purl pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-2%3Fdistro=trixie
aliases CVE-2022-48547
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jmv3-vh81-zfdq
3
url VCID-p2u2-5yuu-jydy
vulnerability_id VCID-p2u2-5yuu-jydy
summary As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" to successfully execute the JavaScript payload present in the "ref" URL parameter.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-26247
reference_id
reference_type
scores
0
value 0.21043
scoring_system epss
scoring_elements 0.95609
published_at 2026-04-01T12:55:00Z
1
value 0.21043
scoring_system epss
scoring_elements 0.95617
published_at 2026-04-02T12:55:00Z
2
value 0.21043
scoring_system epss
scoring_elements 0.95623
published_at 2026-04-04T12:55:00Z
3
value 0.21043
scoring_system epss
scoring_elements 0.95625
published_at 2026-04-07T12:55:00Z
4
value 0.21043
scoring_system epss
scoring_elements 0.95634
published_at 2026-04-08T12:55:00Z
5
value 0.21043
scoring_system epss
scoring_elements 0.95637
published_at 2026-04-09T12:55:00Z
6
value 0.21043
scoring_system epss
scoring_elements 0.95642
published_at 2026-04-12T12:55:00Z
7
value 0.21043
scoring_system epss
scoring_elements 0.95644
published_at 2026-04-13T12:55:00Z
8
value 0.21043
scoring_system epss
scoring_elements 0.95653
published_at 2026-04-16T12:55:00Z
9
value 0.21043
scoring_system epss
scoring_elements 0.95657
published_at 2026-04-18T12:55:00Z
10
value 0.21043
scoring_system epss
scoring_elements 0.95658
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-26247
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26247
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26247
fixed_packages
0
url pkg:deb/debian/cacti@0.8.7i-1?distro=trixie
purl pkg:deb/debian/cacti@0.8.7i-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.7i-1%3Fdistro=trixie
1
url pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4e5y-1s19-r7g7
1
vulnerability VCID-cqr3-wwhj-tyck
2
vulnerability VCID-pxqa-nkv3-jqfs
3
vulnerability VCID-xkkm-ss3p-1udc
4
vulnerability VCID-zxu5-equ9-1kam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4e5y-1s19-r7g7
1
vulnerability VCID-pxqa-nkv3-jqfs
2
vulnerability VCID-xkkm-ss3p-1udc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.24%252Bds1-1%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie
purl pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-1%3Fdistro=trixie
4
url pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie
purl pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-2%3Fdistro=trixie
aliases CVE-2021-26247
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p2u2-5yuu-jydy
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.7i-1%3Fdistro=trixie