Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-5dm9-jpwc-gkeu
Summary
Multiple vulnerabilities have been found in Cacti, allowing
    attackers to execute arbitrary code or perform XSS attacks.
Aliases
0
alias CVE-2010-1645
Fixed_packages
0
url pkg:deb/debian/cacti@0.8.7g-1?distro=trixie
purl pkg:deb/debian/cacti@0.8.7g-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.7g-1%3Fdistro=trixie
1
url pkg:deb/debian/cacti@0.8.7g-1%2Bsqueeze3
purl pkg:deb/debian/cacti@0.8.7g-1%2Bsqueeze3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ff1-vhuj-hkdc
1
vulnerability VCID-1v2t-kcm2-efad
2
vulnerability VCID-29q9-twke-2bdx
3
vulnerability VCID-2wj2-hvma-mqcz
4
vulnerability VCID-2z9e-eg1f-bqg5
5
vulnerability VCID-34z4-1zqk-afcm
6
vulnerability VCID-3rsg-kswx-73bj
7
vulnerability VCID-3tqy-g42y-9fef
8
vulnerability VCID-3x9k-en7a-nkht
9
vulnerability VCID-3y7d-ujep-4ydm
10
vulnerability VCID-44fx-4w2y-y3dy
11
vulnerability VCID-4twv-1yys-eban
12
vulnerability VCID-4ytj-s8hh-6bd5
13
vulnerability VCID-5ykb-6nvx-k3e4
14
vulnerability VCID-6n31-d4xy-d3fj
15
vulnerability VCID-6t6n-ws5n-wkay
16
vulnerability VCID-6ze5-dqdn-ykg3
17
vulnerability VCID-77tn-swar-87ec
18
vulnerability VCID-7dp4-9zks-mbgd
19
vulnerability VCID-7fvn-b8hn-dqeh
20
vulnerability VCID-7m68-seeq-tuae
21
vulnerability VCID-7mht-4urq-13ek
22
vulnerability VCID-85gc-u991-z3dw
23
vulnerability VCID-86gq-jsgy-8uep
24
vulnerability VCID-89pf-69jk-syfk
25
vulnerability VCID-8j9j-nau8-a7cd
26
vulnerability VCID-8nbc-ethb-6kcn
27
vulnerability VCID-8pnc-kuf5-jqda
28
vulnerability VCID-9fdf-h49c-5qcj
29
vulnerability VCID-9snd-k1cz-gyb5
30
vulnerability VCID-9swv-zvke-ubet
31
vulnerability VCID-9vce-mkth-v3gn
32
vulnerability VCID-a8j1-24bw-gudu
33
vulnerability VCID-aajr-s1n1-4ybu
34
vulnerability VCID-afss-mcgj-7bce
35
vulnerability VCID-akj7-kh8f-97ct
36
vulnerability VCID-ante-y18a-yyg7
37
vulnerability VCID-atbu-eegm-3ufy
38
vulnerability VCID-ay5a-nkmf-5yar
39
vulnerability VCID-b8nc-qman-zkcd
40
vulnerability VCID-be57-gxmc-vqd4
41
vulnerability VCID-bj2d-v5dw-ykc7
42
vulnerability VCID-bwzz-1txv-3kam
43
vulnerability VCID-c2b8-ss11-9yhq
44
vulnerability VCID-c4w5-q88d-z3hg
45
vulnerability VCID-cre7-1uhc-bka2
46
vulnerability VCID-cv9v-rynk-m7eb
47
vulnerability VCID-cxs3-zh36-m7en
48
vulnerability VCID-d7db-n89n-qyd8
49
vulnerability VCID-dbsu-au7h-xbcv
50
vulnerability VCID-dcnt-ev6f-tydd
51
vulnerability VCID-ddq2-myvr-wfgz
52
vulnerability VCID-djgb-xu1j-53fb
53
vulnerability VCID-e48s-dv1e-4fgn
54
vulnerability VCID-fhtp-y9a5-vqgj
55
vulnerability VCID-fq36-1r9h-aff2
56
vulnerability VCID-fwp2-z586-ebbq
57
vulnerability VCID-gdfw-gryt-8qhg
58
vulnerability VCID-h3qa-svy4-1fcr
59
vulnerability VCID-hb4z-bmkm-akee
60
vulnerability VCID-hj89-pnag-3fer
61
vulnerability VCID-huf2-qwju-6bf2
62
vulnerability VCID-hwep-pw4e-efh5
63
vulnerability VCID-jkca-shmj-mbbu
64
vulnerability VCID-jmv3-vh81-zfdq
65
vulnerability VCID-k6z6-4pb4-tbeu
66
vulnerability VCID-k7kv-za2s-dud5
67
vulnerability VCID-khhn-9sja-sfgr
68
vulnerability VCID-kkn3-ars7-gkbk
69
vulnerability VCID-mebp-4rfu-vqcq
70
vulnerability VCID-nbfc-ex1y-37he
71
vulnerability VCID-p2u2-5yuu-jydy
72
vulnerability VCID-pau5-hfbv-nucp
73
vulnerability VCID-pwrm-brmn-j7cc
74
vulnerability VCID-q88b-smmh-77ga
75
vulnerability VCID-qbvv-frc2-rqbk
76
vulnerability VCID-qncj-2u1d-7bgu
77
vulnerability VCID-qnz1-w7bb-97ee
78
vulnerability VCID-qvkt-vk55-4bbx
79
vulnerability VCID-rftg-byj2-jkh9
80
vulnerability VCID-rrpb-xhca-dkcf
81
vulnerability VCID-s8du-gzj2-gkc1
82
vulnerability VCID-sb43-hapb-1uf2
83
vulnerability VCID-ses2-y1j2-vbbx
84
vulnerability VCID-sx2t-uzae-2fh9
85
vulnerability VCID-tsfy-6cbv-r7hf
86
vulnerability VCID-tu9w-kh79-9kc8
87
vulnerability VCID-u478-39pb-tkay
88
vulnerability VCID-uj1s-uuyx-mya5
89
vulnerability VCID-vbs9-gben-9kgc
90
vulnerability VCID-vsjt-qjyw-hbfs
91
vulnerability VCID-w1vc-ugdq-aygx
92
vulnerability VCID-w7pb-rt12-y3gs
93
vulnerability VCID-wrxa-2us4-vkf9
94
vulnerability VCID-ws4h-295a-9qgx
95
vulnerability VCID-x1fg-6mq4-d7ds
96
vulnerability VCID-xbb2-av4z-m3dp
97
vulnerability VCID-xdbp-7rtr-fyb7
98
vulnerability VCID-xpvn-y3b8-skgb
99
vulnerability VCID-y683-kz6e-afhv
100
vulnerability VCID-ya95-dsw9-pfhw
101
vulnerability VCID-ybx7-gpq4-33ha
102
vulnerability VCID-yjny-ubdp-7few
103
vulnerability VCID-ypan-57sx-vyam
104
vulnerability VCID-zwne-uyfj-5bf8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.7g-1%252Bsqueeze3
2
url pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4e5y-1s19-r7g7
1
vulnerability VCID-cqr3-wwhj-tyck
2
vulnerability VCID-pxqa-nkv3-jqfs
3
vulnerability VCID-xkkm-ss3p-1udc
4
vulnerability VCID-zxu5-equ9-1kam
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3%3Fdistro=trixie
3
url pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4e5y-1s19-r7g7
1
vulnerability VCID-pxqa-nkv3-jqfs
2
vulnerability VCID-xkkm-ss3p-1udc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.24%252Bds1-1%252Bdeb12u5%3Fdistro=trixie
4
url pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie
purl pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-1%3Fdistro=trixie
5
url pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie
purl pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-2%3Fdistro=trixie
6
url pkg:ebuild/net-analyzer/cacti@0.8.8b
purl pkg:ebuild/net-analyzer/cacti@0.8.8b
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@0.8.8b
Affected_packages
0
url pkg:deb/debian/cacti@0.6.7-2.2
purl pkg:deb/debian/cacti@0.6.7-2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17s1-2cfu-nfbg
1
vulnerability VCID-1ff1-vhuj-hkdc
2
vulnerability VCID-1v2t-kcm2-efad
3
vulnerability VCID-29q9-twke-2bdx
4
vulnerability VCID-2wj2-hvma-mqcz
5
vulnerability VCID-2z9e-eg1f-bqg5
6
vulnerability VCID-34z4-1zqk-afcm
7
vulnerability VCID-3rsg-kswx-73bj
8
vulnerability VCID-3tqy-g42y-9fef
9
vulnerability VCID-3x9k-en7a-nkht
10
vulnerability VCID-3y7d-ujep-4ydm
11
vulnerability VCID-44fx-4w2y-y3dy
12
vulnerability VCID-45r8-13j6-yqf9
13
vulnerability VCID-4twv-1yys-eban
14
vulnerability VCID-4ytj-s8hh-6bd5
15
vulnerability VCID-5ccj-b3a9-67g2
16
vulnerability VCID-5dm9-jpwc-gkeu
17
vulnerability VCID-5ykb-6nvx-k3e4
18
vulnerability VCID-64zc-tzat-fuhu
19
vulnerability VCID-6dxh-qpg7-q7g8
20
vulnerability VCID-6n31-d4xy-d3fj
21
vulnerability VCID-6t6n-ws5n-wkay
22
vulnerability VCID-6ze5-dqdn-ykg3
23
vulnerability VCID-77tn-swar-87ec
24
vulnerability VCID-7dp4-9zks-mbgd
25
vulnerability VCID-7fvn-b8hn-dqeh
26
vulnerability VCID-7m68-seeq-tuae
27
vulnerability VCID-7mht-4urq-13ek
28
vulnerability VCID-7p95-t48a-hkdb
29
vulnerability VCID-85gc-u991-z3dw
30
vulnerability VCID-86gq-jsgy-8uep
31
vulnerability VCID-88mp-1anp-m3g5
32
vulnerability VCID-89pf-69jk-syfk
33
vulnerability VCID-8j9j-nau8-a7cd
34
vulnerability VCID-8nbc-ethb-6kcn
35
vulnerability VCID-8pnc-kuf5-jqda
36
vulnerability VCID-9fdf-h49c-5qcj
37
vulnerability VCID-9hqq-k4ax-77d8
38
vulnerability VCID-9snd-k1cz-gyb5
39
vulnerability VCID-9swv-zvke-ubet
40
vulnerability VCID-9vce-mkth-v3gn
41
vulnerability VCID-9x72-e9wx-mqf4
42
vulnerability VCID-a8j1-24bw-gudu
43
vulnerability VCID-aajr-s1n1-4ybu
44
vulnerability VCID-afss-mcgj-7bce
45
vulnerability VCID-akj7-kh8f-97ct
46
vulnerability VCID-ante-y18a-yyg7
47
vulnerability VCID-atbu-eegm-3ufy
48
vulnerability VCID-ay5a-nkmf-5yar
49
vulnerability VCID-b8nc-qman-zkcd
50
vulnerability VCID-be57-gxmc-vqd4
51
vulnerability VCID-bj2d-v5dw-ykc7
52
vulnerability VCID-bwzz-1txv-3kam
53
vulnerability VCID-c2b8-ss11-9yhq
54
vulnerability VCID-c4w5-q88d-z3hg
55
vulnerability VCID-cpkb-6zw3-rffv
56
vulnerability VCID-cre7-1uhc-bka2
57
vulnerability VCID-cv9v-rynk-m7eb
58
vulnerability VCID-cww1-muhf-z7aj
59
vulnerability VCID-cxs3-zh36-m7en
60
vulnerability VCID-d7db-n89n-qyd8
61
vulnerability VCID-dbsu-au7h-xbcv
62
vulnerability VCID-dcnt-ev6f-tydd
63
vulnerability VCID-ddq2-myvr-wfgz
64
vulnerability VCID-djgb-xu1j-53fb
65
vulnerability VCID-dycc-rydh-kycy
66
vulnerability VCID-e48s-dv1e-4fgn
67
vulnerability VCID-eer6-7vj2-3ycx
68
vulnerability VCID-fhtp-y9a5-vqgj
69
vulnerability VCID-fq36-1r9h-aff2
70
vulnerability VCID-fwp2-z586-ebbq
71
vulnerability VCID-gdfw-gryt-8qhg
72
vulnerability VCID-gds4-k19q-ryf6
73
vulnerability VCID-h3qa-svy4-1fcr
74
vulnerability VCID-hb4z-bmkm-akee
75
vulnerability VCID-he8q-5n8u-27dv
76
vulnerability VCID-hj89-pnag-3fer
77
vulnerability VCID-huf2-qwju-6bf2
78
vulnerability VCID-hwep-pw4e-efh5
79
vulnerability VCID-jg8r-f76d-rke1
80
vulnerability VCID-jkca-shmj-mbbu
81
vulnerability VCID-jmv3-vh81-zfdq
82
vulnerability VCID-k6z6-4pb4-tbeu
83
vulnerability VCID-k7kv-za2s-dud5
84
vulnerability VCID-khhn-9sja-sfgr
85
vulnerability VCID-kjcg-xe2b-akap
86
vulnerability VCID-kkn3-ars7-gkbk
87
vulnerability VCID-m6nf-2ppj-4fhg
88
vulnerability VCID-mebp-4rfu-vqcq
89
vulnerability VCID-nbfc-ex1y-37he
90
vulnerability VCID-p2u2-5yuu-jydy
91
vulnerability VCID-p74d-rbz3-sbb3
92
vulnerability VCID-pau5-hfbv-nucp
93
vulnerability VCID-pf3g-22dc-5yc5
94
vulnerability VCID-pwrm-brmn-j7cc
95
vulnerability VCID-q88b-smmh-77ga
96
vulnerability VCID-qbvv-frc2-rqbk
97
vulnerability VCID-qfjt-2g9r-nucs
98
vulnerability VCID-qncj-2u1d-7bgu
99
vulnerability VCID-qnz1-w7bb-97ee
100
vulnerability VCID-qvkt-vk55-4bbx
101
vulnerability VCID-rftg-byj2-jkh9
102
vulnerability VCID-rrpb-xhca-dkcf
103
vulnerability VCID-s8du-gzj2-gkc1
104
vulnerability VCID-sb43-hapb-1uf2
105
vulnerability VCID-scas-pk48-tyc4
106
vulnerability VCID-sdme-n5ez-67fw
107
vulnerability VCID-ses2-y1j2-vbbx
108
vulnerability VCID-sx2t-uzae-2fh9
109
vulnerability VCID-t9my-r77a-w7ga
110
vulnerability VCID-tsfy-6cbv-r7hf
111
vulnerability VCID-tu9w-kh79-9kc8
112
vulnerability VCID-tucb-znqr-k7fy
113
vulnerability VCID-u478-39pb-tkay
114
vulnerability VCID-uj1s-uuyx-mya5
115
vulnerability VCID-vbs9-gben-9kgc
116
vulnerability VCID-vsjt-qjyw-hbfs
117
vulnerability VCID-vvsg-5pu2-wkcx
118
vulnerability VCID-w1vc-ugdq-aygx
119
vulnerability VCID-w7pb-rt12-y3gs
120
vulnerability VCID-wrxa-2us4-vkf9
121
vulnerability VCID-ws4h-295a-9qgx
122
vulnerability VCID-x1fg-6mq4-d7ds
123
vulnerability VCID-xbb2-av4z-m3dp
124
vulnerability VCID-xdbp-7rtr-fyb7
125
vulnerability VCID-xpvn-y3b8-skgb
126
vulnerability VCID-xxvt-pw21-v7dk
127
vulnerability VCID-y683-kz6e-afhv
128
vulnerability VCID-y6jw-jm1g-ubgx
129
vulnerability VCID-ya95-dsw9-pfhw
130
vulnerability VCID-ybx7-gpq4-33ha
131
vulnerability VCID-yjny-ubdp-7few
132
vulnerability VCID-ypan-57sx-vyam
133
vulnerability VCID-yqvt-gasb-t3bq
134
vulnerability VCID-z2hd-9r1a-x7gr
135
vulnerability VCID-zjgu-8ns1-rbhr
136
vulnerability VCID-zwne-uyfj-5bf8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.6.7-2.2
1
url pkg:deb/debian/cacti@0.8.6c-7sarge5
purl pkg:deb/debian/cacti@0.8.6c-7sarge5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17s1-2cfu-nfbg
1
vulnerability VCID-1ff1-vhuj-hkdc
2
vulnerability VCID-1v2t-kcm2-efad
3
vulnerability VCID-29q9-twke-2bdx
4
vulnerability VCID-2wj2-hvma-mqcz
5
vulnerability VCID-2z9e-eg1f-bqg5
6
vulnerability VCID-34z4-1zqk-afcm
7
vulnerability VCID-3rsg-kswx-73bj
8
vulnerability VCID-3tqy-g42y-9fef
9
vulnerability VCID-3x9k-en7a-nkht
10
vulnerability VCID-3y7d-ujep-4ydm
11
vulnerability VCID-44fx-4w2y-y3dy
12
vulnerability VCID-45r8-13j6-yqf9
13
vulnerability VCID-4twv-1yys-eban
14
vulnerability VCID-4ytj-s8hh-6bd5
15
vulnerability VCID-5ccj-b3a9-67g2
16
vulnerability VCID-5dm9-jpwc-gkeu
17
vulnerability VCID-5ykb-6nvx-k3e4
18
vulnerability VCID-6dxh-qpg7-q7g8
19
vulnerability VCID-6n31-d4xy-d3fj
20
vulnerability VCID-6t6n-ws5n-wkay
21
vulnerability VCID-6ze5-dqdn-ykg3
22
vulnerability VCID-77tn-swar-87ec
23
vulnerability VCID-7dp4-9zks-mbgd
24
vulnerability VCID-7fvn-b8hn-dqeh
25
vulnerability VCID-7m68-seeq-tuae
26
vulnerability VCID-7mht-4urq-13ek
27
vulnerability VCID-7p95-t48a-hkdb
28
vulnerability VCID-85gc-u991-z3dw
29
vulnerability VCID-86gq-jsgy-8uep
30
vulnerability VCID-88mp-1anp-m3g5
31
vulnerability VCID-89pf-69jk-syfk
32
vulnerability VCID-8j9j-nau8-a7cd
33
vulnerability VCID-8nbc-ethb-6kcn
34
vulnerability VCID-8pnc-kuf5-jqda
35
vulnerability VCID-9fdf-h49c-5qcj
36
vulnerability VCID-9snd-k1cz-gyb5
37
vulnerability VCID-9swv-zvke-ubet
38
vulnerability VCID-9vce-mkth-v3gn
39
vulnerability VCID-9x72-e9wx-mqf4
40
vulnerability VCID-a8j1-24bw-gudu
41
vulnerability VCID-aajr-s1n1-4ybu
42
vulnerability VCID-afss-mcgj-7bce
43
vulnerability VCID-akj7-kh8f-97ct
44
vulnerability VCID-ante-y18a-yyg7
45
vulnerability VCID-atbu-eegm-3ufy
46
vulnerability VCID-ay5a-nkmf-5yar
47
vulnerability VCID-b8nc-qman-zkcd
48
vulnerability VCID-be57-gxmc-vqd4
49
vulnerability VCID-bj2d-v5dw-ykc7
50
vulnerability VCID-bwzz-1txv-3kam
51
vulnerability VCID-c2b8-ss11-9yhq
52
vulnerability VCID-c4w5-q88d-z3hg
53
vulnerability VCID-cre7-1uhc-bka2
54
vulnerability VCID-cv9v-rynk-m7eb
55
vulnerability VCID-cww1-muhf-z7aj
56
vulnerability VCID-cxs3-zh36-m7en
57
vulnerability VCID-d7db-n89n-qyd8
58
vulnerability VCID-dbsu-au7h-xbcv
59
vulnerability VCID-dcnt-ev6f-tydd
60
vulnerability VCID-ddq2-myvr-wfgz
61
vulnerability VCID-djgb-xu1j-53fb
62
vulnerability VCID-dycc-rydh-kycy
63
vulnerability VCID-e48s-dv1e-4fgn
64
vulnerability VCID-eer6-7vj2-3ycx
65
vulnerability VCID-fhtp-y9a5-vqgj
66
vulnerability VCID-fq36-1r9h-aff2
67
vulnerability VCID-fwp2-z586-ebbq
68
vulnerability VCID-gdfw-gryt-8qhg
69
vulnerability VCID-gds4-k19q-ryf6
70
vulnerability VCID-h3qa-svy4-1fcr
71
vulnerability VCID-hb4z-bmkm-akee
72
vulnerability VCID-he8q-5n8u-27dv
73
vulnerability VCID-hj89-pnag-3fer
74
vulnerability VCID-huf2-qwju-6bf2
75
vulnerability VCID-hwep-pw4e-efh5
76
vulnerability VCID-jg8r-f76d-rke1
77
vulnerability VCID-jkca-shmj-mbbu
78
vulnerability VCID-jmv3-vh81-zfdq
79
vulnerability VCID-k6z6-4pb4-tbeu
80
vulnerability VCID-k7kv-za2s-dud5
81
vulnerability VCID-khhn-9sja-sfgr
82
vulnerability VCID-kjcg-xe2b-akap
83
vulnerability VCID-kkn3-ars7-gkbk
84
vulnerability VCID-m6nf-2ppj-4fhg
85
vulnerability VCID-mebp-4rfu-vqcq
86
vulnerability VCID-nbfc-ex1y-37he
87
vulnerability VCID-p2u2-5yuu-jydy
88
vulnerability VCID-p74d-rbz3-sbb3
89
vulnerability VCID-pau5-hfbv-nucp
90
vulnerability VCID-pwrm-brmn-j7cc
91
vulnerability VCID-q88b-smmh-77ga
92
vulnerability VCID-qbvv-frc2-rqbk
93
vulnerability VCID-qfjt-2g9r-nucs
94
vulnerability VCID-qncj-2u1d-7bgu
95
vulnerability VCID-qnz1-w7bb-97ee
96
vulnerability VCID-qvkt-vk55-4bbx
97
vulnerability VCID-rftg-byj2-jkh9
98
vulnerability VCID-rrpb-xhca-dkcf
99
vulnerability VCID-s8du-gzj2-gkc1
100
vulnerability VCID-sb43-hapb-1uf2
101
vulnerability VCID-scas-pk48-tyc4
102
vulnerability VCID-sdme-n5ez-67fw
103
vulnerability VCID-ses2-y1j2-vbbx
104
vulnerability VCID-sx2t-uzae-2fh9
105
vulnerability VCID-t9my-r77a-w7ga
106
vulnerability VCID-tsfy-6cbv-r7hf
107
vulnerability VCID-tu9w-kh79-9kc8
108
vulnerability VCID-tucb-znqr-k7fy
109
vulnerability VCID-u478-39pb-tkay
110
vulnerability VCID-uj1s-uuyx-mya5
111
vulnerability VCID-vbs9-gben-9kgc
112
vulnerability VCID-vsjt-qjyw-hbfs
113
vulnerability VCID-w1vc-ugdq-aygx
114
vulnerability VCID-w7pb-rt12-y3gs
115
vulnerability VCID-wrxa-2us4-vkf9
116
vulnerability VCID-ws4h-295a-9qgx
117
vulnerability VCID-x1fg-6mq4-d7ds
118
vulnerability VCID-xbb2-av4z-m3dp
119
vulnerability VCID-xdbp-7rtr-fyb7
120
vulnerability VCID-xpvn-y3b8-skgb
121
vulnerability VCID-xxvt-pw21-v7dk
122
vulnerability VCID-y683-kz6e-afhv
123
vulnerability VCID-y6jw-jm1g-ubgx
124
vulnerability VCID-ya95-dsw9-pfhw
125
vulnerability VCID-ybx7-gpq4-33ha
126
vulnerability VCID-yjny-ubdp-7few
127
vulnerability VCID-ypan-57sx-vyam
128
vulnerability VCID-yqvt-gasb-t3bq
129
vulnerability VCID-z2hd-9r1a-x7gr
130
vulnerability VCID-zjgu-8ns1-rbhr
131
vulnerability VCID-zwne-uyfj-5bf8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.6c-7sarge5
2
url pkg:deb/debian/cacti@0.8.6i-3
purl pkg:deb/debian/cacti@0.8.6i-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17s1-2cfu-nfbg
1
vulnerability VCID-1ff1-vhuj-hkdc
2
vulnerability VCID-1v2t-kcm2-efad
3
vulnerability VCID-29q9-twke-2bdx
4
vulnerability VCID-2wj2-hvma-mqcz
5
vulnerability VCID-2z9e-eg1f-bqg5
6
vulnerability VCID-34z4-1zqk-afcm
7
vulnerability VCID-3rsg-kswx-73bj
8
vulnerability VCID-3tqy-g42y-9fef
9
vulnerability VCID-3x9k-en7a-nkht
10
vulnerability VCID-3y7d-ujep-4ydm
11
vulnerability VCID-44fx-4w2y-y3dy
12
vulnerability VCID-4twv-1yys-eban
13
vulnerability VCID-4ytj-s8hh-6bd5
14
vulnerability VCID-5dm9-jpwc-gkeu
15
vulnerability VCID-5ykb-6nvx-k3e4
16
vulnerability VCID-6dxh-qpg7-q7g8
17
vulnerability VCID-6n31-d4xy-d3fj
18
vulnerability VCID-6t6n-ws5n-wkay
19
vulnerability VCID-6ze5-dqdn-ykg3
20
vulnerability VCID-77tn-swar-87ec
21
vulnerability VCID-7dp4-9zks-mbgd
22
vulnerability VCID-7fvn-b8hn-dqeh
23
vulnerability VCID-7m68-seeq-tuae
24
vulnerability VCID-7mht-4urq-13ek
25
vulnerability VCID-7p95-t48a-hkdb
26
vulnerability VCID-85gc-u991-z3dw
27
vulnerability VCID-86gq-jsgy-8uep
28
vulnerability VCID-88mp-1anp-m3g5
29
vulnerability VCID-89pf-69jk-syfk
30
vulnerability VCID-8j9j-nau8-a7cd
31
vulnerability VCID-8nbc-ethb-6kcn
32
vulnerability VCID-8pnc-kuf5-jqda
33
vulnerability VCID-9fdf-h49c-5qcj
34
vulnerability VCID-9snd-k1cz-gyb5
35
vulnerability VCID-9swv-zvke-ubet
36
vulnerability VCID-9vce-mkth-v3gn
37
vulnerability VCID-a8j1-24bw-gudu
38
vulnerability VCID-aajr-s1n1-4ybu
39
vulnerability VCID-afss-mcgj-7bce
40
vulnerability VCID-akj7-kh8f-97ct
41
vulnerability VCID-ante-y18a-yyg7
42
vulnerability VCID-atbu-eegm-3ufy
43
vulnerability VCID-ay5a-nkmf-5yar
44
vulnerability VCID-b8nc-qman-zkcd
45
vulnerability VCID-be57-gxmc-vqd4
46
vulnerability VCID-bj2d-v5dw-ykc7
47
vulnerability VCID-bwzz-1txv-3kam
48
vulnerability VCID-c2b8-ss11-9yhq
49
vulnerability VCID-c4w5-q88d-z3hg
50
vulnerability VCID-cre7-1uhc-bka2
51
vulnerability VCID-cv9v-rynk-m7eb
52
vulnerability VCID-cxs3-zh36-m7en
53
vulnerability VCID-d7db-n89n-qyd8
54
vulnerability VCID-dbsu-au7h-xbcv
55
vulnerability VCID-dcnt-ev6f-tydd
56
vulnerability VCID-ddq2-myvr-wfgz
57
vulnerability VCID-djgb-xu1j-53fb
58
vulnerability VCID-dycc-rydh-kycy
59
vulnerability VCID-e48s-dv1e-4fgn
60
vulnerability VCID-fhtp-y9a5-vqgj
61
vulnerability VCID-fq36-1r9h-aff2
62
vulnerability VCID-fwp2-z586-ebbq
63
vulnerability VCID-gdfw-gryt-8qhg
64
vulnerability VCID-gds4-k19q-ryf6
65
vulnerability VCID-h3qa-svy4-1fcr
66
vulnerability VCID-hb4z-bmkm-akee
67
vulnerability VCID-hj89-pnag-3fer
68
vulnerability VCID-huf2-qwju-6bf2
69
vulnerability VCID-hwep-pw4e-efh5
70
vulnerability VCID-jg8r-f76d-rke1
71
vulnerability VCID-jkca-shmj-mbbu
72
vulnerability VCID-jmv3-vh81-zfdq
73
vulnerability VCID-k6z6-4pb4-tbeu
74
vulnerability VCID-k7kv-za2s-dud5
75
vulnerability VCID-khhn-9sja-sfgr
76
vulnerability VCID-kkn3-ars7-gkbk
77
vulnerability VCID-m6nf-2ppj-4fhg
78
vulnerability VCID-mebp-4rfu-vqcq
79
vulnerability VCID-nbfc-ex1y-37he
80
vulnerability VCID-p2u2-5yuu-jydy
81
vulnerability VCID-p74d-rbz3-sbb3
82
vulnerability VCID-pau5-hfbv-nucp
83
vulnerability VCID-pwrm-brmn-j7cc
84
vulnerability VCID-q88b-smmh-77ga
85
vulnerability VCID-qbvv-frc2-rqbk
86
vulnerability VCID-qncj-2u1d-7bgu
87
vulnerability VCID-qnz1-w7bb-97ee
88
vulnerability VCID-qvkt-vk55-4bbx
89
vulnerability VCID-rftg-byj2-jkh9
90
vulnerability VCID-rrpb-xhca-dkcf
91
vulnerability VCID-s8du-gzj2-gkc1
92
vulnerability VCID-sb43-hapb-1uf2
93
vulnerability VCID-scas-pk48-tyc4
94
vulnerability VCID-sdme-n5ez-67fw
95
vulnerability VCID-ses2-y1j2-vbbx
96
vulnerability VCID-sx2t-uzae-2fh9
97
vulnerability VCID-t9my-r77a-w7ga
98
vulnerability VCID-tsfy-6cbv-r7hf
99
vulnerability VCID-tu9w-kh79-9kc8
100
vulnerability VCID-u478-39pb-tkay
101
vulnerability VCID-uj1s-uuyx-mya5
102
vulnerability VCID-vbs9-gben-9kgc
103
vulnerability VCID-vsjt-qjyw-hbfs
104
vulnerability VCID-w1vc-ugdq-aygx
105
vulnerability VCID-w7pb-rt12-y3gs
106
vulnerability VCID-wrxa-2us4-vkf9
107
vulnerability VCID-ws4h-295a-9qgx
108
vulnerability VCID-x1fg-6mq4-d7ds
109
vulnerability VCID-xbb2-av4z-m3dp
110
vulnerability VCID-xdbp-7rtr-fyb7
111
vulnerability VCID-xpvn-y3b8-skgb
112
vulnerability VCID-y683-kz6e-afhv
113
vulnerability VCID-y6jw-jm1g-ubgx
114
vulnerability VCID-ya95-dsw9-pfhw
115
vulnerability VCID-ybx7-gpq4-33ha
116
vulnerability VCID-yjny-ubdp-7few
117
vulnerability VCID-ypan-57sx-vyam
118
vulnerability VCID-z2hd-9r1a-x7gr
119
vulnerability VCID-zwne-uyfj-5bf8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.6i-3
3
url pkg:deb/debian/cacti@0.8.6i-3.6
purl pkg:deb/debian/cacti@0.8.6i-3.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17s1-2cfu-nfbg
1
vulnerability VCID-1ff1-vhuj-hkdc
2
vulnerability VCID-1v2t-kcm2-efad
3
vulnerability VCID-29q9-twke-2bdx
4
vulnerability VCID-2wj2-hvma-mqcz
5
vulnerability VCID-2z9e-eg1f-bqg5
6
vulnerability VCID-34z4-1zqk-afcm
7
vulnerability VCID-3rsg-kswx-73bj
8
vulnerability VCID-3tqy-g42y-9fef
9
vulnerability VCID-3x9k-en7a-nkht
10
vulnerability VCID-3y7d-ujep-4ydm
11
vulnerability VCID-44fx-4w2y-y3dy
12
vulnerability VCID-4twv-1yys-eban
13
vulnerability VCID-4ytj-s8hh-6bd5
14
vulnerability VCID-5dm9-jpwc-gkeu
15
vulnerability VCID-5ykb-6nvx-k3e4
16
vulnerability VCID-6dxh-qpg7-q7g8
17
vulnerability VCID-6n31-d4xy-d3fj
18
vulnerability VCID-6t6n-ws5n-wkay
19
vulnerability VCID-6ze5-dqdn-ykg3
20
vulnerability VCID-77tn-swar-87ec
21
vulnerability VCID-7dp4-9zks-mbgd
22
vulnerability VCID-7fvn-b8hn-dqeh
23
vulnerability VCID-7m68-seeq-tuae
24
vulnerability VCID-7mht-4urq-13ek
25
vulnerability VCID-7p95-t48a-hkdb
26
vulnerability VCID-85gc-u991-z3dw
27
vulnerability VCID-86gq-jsgy-8uep
28
vulnerability VCID-88mp-1anp-m3g5
29
vulnerability VCID-89pf-69jk-syfk
30
vulnerability VCID-8j9j-nau8-a7cd
31
vulnerability VCID-8nbc-ethb-6kcn
32
vulnerability VCID-8pnc-kuf5-jqda
33
vulnerability VCID-9fdf-h49c-5qcj
34
vulnerability VCID-9snd-k1cz-gyb5
35
vulnerability VCID-9swv-zvke-ubet
36
vulnerability VCID-9vce-mkth-v3gn
37
vulnerability VCID-a8j1-24bw-gudu
38
vulnerability VCID-aajr-s1n1-4ybu
39
vulnerability VCID-afss-mcgj-7bce
40
vulnerability VCID-akj7-kh8f-97ct
41
vulnerability VCID-ante-y18a-yyg7
42
vulnerability VCID-atbu-eegm-3ufy
43
vulnerability VCID-ay5a-nkmf-5yar
44
vulnerability VCID-b8nc-qman-zkcd
45
vulnerability VCID-be57-gxmc-vqd4
46
vulnerability VCID-bj2d-v5dw-ykc7
47
vulnerability VCID-bwzz-1txv-3kam
48
vulnerability VCID-c2b8-ss11-9yhq
49
vulnerability VCID-c4w5-q88d-z3hg
50
vulnerability VCID-cre7-1uhc-bka2
51
vulnerability VCID-cv9v-rynk-m7eb
52
vulnerability VCID-cxs3-zh36-m7en
53
vulnerability VCID-d7db-n89n-qyd8
54
vulnerability VCID-dbsu-au7h-xbcv
55
vulnerability VCID-dcnt-ev6f-tydd
56
vulnerability VCID-ddq2-myvr-wfgz
57
vulnerability VCID-djgb-xu1j-53fb
58
vulnerability VCID-dycc-rydh-kycy
59
vulnerability VCID-e48s-dv1e-4fgn
60
vulnerability VCID-fhtp-y9a5-vqgj
61
vulnerability VCID-fq36-1r9h-aff2
62
vulnerability VCID-fwp2-z586-ebbq
63
vulnerability VCID-gdfw-gryt-8qhg
64
vulnerability VCID-gds4-k19q-ryf6
65
vulnerability VCID-h3qa-svy4-1fcr
66
vulnerability VCID-hb4z-bmkm-akee
67
vulnerability VCID-hj89-pnag-3fer
68
vulnerability VCID-huf2-qwju-6bf2
69
vulnerability VCID-hwep-pw4e-efh5
70
vulnerability VCID-jg8r-f76d-rke1
71
vulnerability VCID-jkca-shmj-mbbu
72
vulnerability VCID-jmv3-vh81-zfdq
73
vulnerability VCID-k6z6-4pb4-tbeu
74
vulnerability VCID-k7kv-za2s-dud5
75
vulnerability VCID-khhn-9sja-sfgr
76
vulnerability VCID-kkn3-ars7-gkbk
77
vulnerability VCID-m6nf-2ppj-4fhg
78
vulnerability VCID-mebp-4rfu-vqcq
79
vulnerability VCID-nbfc-ex1y-37he
80
vulnerability VCID-p2u2-5yuu-jydy
81
vulnerability VCID-p74d-rbz3-sbb3
82
vulnerability VCID-pau5-hfbv-nucp
83
vulnerability VCID-pwrm-brmn-j7cc
84
vulnerability VCID-q88b-smmh-77ga
85
vulnerability VCID-qbvv-frc2-rqbk
86
vulnerability VCID-qncj-2u1d-7bgu
87
vulnerability VCID-qnz1-w7bb-97ee
88
vulnerability VCID-qvkt-vk55-4bbx
89
vulnerability VCID-rftg-byj2-jkh9
90
vulnerability VCID-rrpb-xhca-dkcf
91
vulnerability VCID-s8du-gzj2-gkc1
92
vulnerability VCID-sb43-hapb-1uf2
93
vulnerability VCID-scas-pk48-tyc4
94
vulnerability VCID-sdme-n5ez-67fw
95
vulnerability VCID-ses2-y1j2-vbbx
96
vulnerability VCID-sx2t-uzae-2fh9
97
vulnerability VCID-t9my-r77a-w7ga
98
vulnerability VCID-tsfy-6cbv-r7hf
99
vulnerability VCID-tu9w-kh79-9kc8
100
vulnerability VCID-u478-39pb-tkay
101
vulnerability VCID-uj1s-uuyx-mya5
102
vulnerability VCID-vbs9-gben-9kgc
103
vulnerability VCID-vsjt-qjyw-hbfs
104
vulnerability VCID-w1vc-ugdq-aygx
105
vulnerability VCID-w7pb-rt12-y3gs
106
vulnerability VCID-wrxa-2us4-vkf9
107
vulnerability VCID-ws4h-295a-9qgx
108
vulnerability VCID-x1fg-6mq4-d7ds
109
vulnerability VCID-xbb2-av4z-m3dp
110
vulnerability VCID-xdbp-7rtr-fyb7
111
vulnerability VCID-xpvn-y3b8-skgb
112
vulnerability VCID-y683-kz6e-afhv
113
vulnerability VCID-y6jw-jm1g-ubgx
114
vulnerability VCID-ya95-dsw9-pfhw
115
vulnerability VCID-ybx7-gpq4-33ha
116
vulnerability VCID-yjny-ubdp-7few
117
vulnerability VCID-ypan-57sx-vyam
118
vulnerability VCID-z2hd-9r1a-x7gr
119
vulnerability VCID-zwne-uyfj-5bf8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.6i-3.6
4
url pkg:deb/debian/cacti@0.8.7b-2.1%2Blenny5
purl pkg:deb/debian/cacti@0.8.7b-2.1%2Blenny5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ff1-vhuj-hkdc
1
vulnerability VCID-1v2t-kcm2-efad
2
vulnerability VCID-29q9-twke-2bdx
3
vulnerability VCID-2wj2-hvma-mqcz
4
vulnerability VCID-2z9e-eg1f-bqg5
5
vulnerability VCID-34z4-1zqk-afcm
6
vulnerability VCID-3rsg-kswx-73bj
7
vulnerability VCID-3tqy-g42y-9fef
8
vulnerability VCID-3x9k-en7a-nkht
9
vulnerability VCID-3y7d-ujep-4ydm
10
vulnerability VCID-44fx-4w2y-y3dy
11
vulnerability VCID-4twv-1yys-eban
12
vulnerability VCID-4ytj-s8hh-6bd5
13
vulnerability VCID-5dm9-jpwc-gkeu
14
vulnerability VCID-5ykb-6nvx-k3e4
15
vulnerability VCID-6dxh-qpg7-q7g8
16
vulnerability VCID-6n31-d4xy-d3fj
17
vulnerability VCID-6t6n-ws5n-wkay
18
vulnerability VCID-6ze5-dqdn-ykg3
19
vulnerability VCID-77tn-swar-87ec
20
vulnerability VCID-7dp4-9zks-mbgd
21
vulnerability VCID-7fvn-b8hn-dqeh
22
vulnerability VCID-7m68-seeq-tuae
23
vulnerability VCID-7mht-4urq-13ek
24
vulnerability VCID-85gc-u991-z3dw
25
vulnerability VCID-86gq-jsgy-8uep
26
vulnerability VCID-88mp-1anp-m3g5
27
vulnerability VCID-89pf-69jk-syfk
28
vulnerability VCID-8j9j-nau8-a7cd
29
vulnerability VCID-8nbc-ethb-6kcn
30
vulnerability VCID-8pnc-kuf5-jqda
31
vulnerability VCID-9fdf-h49c-5qcj
32
vulnerability VCID-9snd-k1cz-gyb5
33
vulnerability VCID-9swv-zvke-ubet
34
vulnerability VCID-9vce-mkth-v3gn
35
vulnerability VCID-a8j1-24bw-gudu
36
vulnerability VCID-aajr-s1n1-4ybu
37
vulnerability VCID-afss-mcgj-7bce
38
vulnerability VCID-akj7-kh8f-97ct
39
vulnerability VCID-ante-y18a-yyg7
40
vulnerability VCID-atbu-eegm-3ufy
41
vulnerability VCID-ay5a-nkmf-5yar
42
vulnerability VCID-b8nc-qman-zkcd
43
vulnerability VCID-be57-gxmc-vqd4
44
vulnerability VCID-bj2d-v5dw-ykc7
45
vulnerability VCID-bwzz-1txv-3kam
46
vulnerability VCID-c2b8-ss11-9yhq
47
vulnerability VCID-c4w5-q88d-z3hg
48
vulnerability VCID-cre7-1uhc-bka2
49
vulnerability VCID-cv9v-rynk-m7eb
50
vulnerability VCID-cxs3-zh36-m7en
51
vulnerability VCID-d7db-n89n-qyd8
52
vulnerability VCID-dbsu-au7h-xbcv
53
vulnerability VCID-dcnt-ev6f-tydd
54
vulnerability VCID-ddq2-myvr-wfgz
55
vulnerability VCID-djgb-xu1j-53fb
56
vulnerability VCID-dycc-rydh-kycy
57
vulnerability VCID-e48s-dv1e-4fgn
58
vulnerability VCID-fhtp-y9a5-vqgj
59
vulnerability VCID-fq36-1r9h-aff2
60
vulnerability VCID-fwp2-z586-ebbq
61
vulnerability VCID-gdfw-gryt-8qhg
62
vulnerability VCID-h3qa-svy4-1fcr
63
vulnerability VCID-hb4z-bmkm-akee
64
vulnerability VCID-hj89-pnag-3fer
65
vulnerability VCID-huf2-qwju-6bf2
66
vulnerability VCID-hwep-pw4e-efh5
67
vulnerability VCID-jg8r-f76d-rke1
68
vulnerability VCID-jkca-shmj-mbbu
69
vulnerability VCID-jmv3-vh81-zfdq
70
vulnerability VCID-k6z6-4pb4-tbeu
71
vulnerability VCID-k7kv-za2s-dud5
72
vulnerability VCID-khhn-9sja-sfgr
73
vulnerability VCID-kkn3-ars7-gkbk
74
vulnerability VCID-m6nf-2ppj-4fhg
75
vulnerability VCID-mebp-4rfu-vqcq
76
vulnerability VCID-nbfc-ex1y-37he
77
vulnerability VCID-p2u2-5yuu-jydy
78
vulnerability VCID-pau5-hfbv-nucp
79
vulnerability VCID-pwrm-brmn-j7cc
80
vulnerability VCID-q88b-smmh-77ga
81
vulnerability VCID-qbvv-frc2-rqbk
82
vulnerability VCID-qncj-2u1d-7bgu
83
vulnerability VCID-qnz1-w7bb-97ee
84
vulnerability VCID-qvkt-vk55-4bbx
85
vulnerability VCID-rftg-byj2-jkh9
86
vulnerability VCID-rrpb-xhca-dkcf
87
vulnerability VCID-s8du-gzj2-gkc1
88
vulnerability VCID-sb43-hapb-1uf2
89
vulnerability VCID-sdme-n5ez-67fw
90
vulnerability VCID-ses2-y1j2-vbbx
91
vulnerability VCID-sx2t-uzae-2fh9
92
vulnerability VCID-tsfy-6cbv-r7hf
93
vulnerability VCID-tu9w-kh79-9kc8
94
vulnerability VCID-u478-39pb-tkay
95
vulnerability VCID-uj1s-uuyx-mya5
96
vulnerability VCID-vbs9-gben-9kgc
97
vulnerability VCID-vsjt-qjyw-hbfs
98
vulnerability VCID-w1vc-ugdq-aygx
99
vulnerability VCID-w7pb-rt12-y3gs
100
vulnerability VCID-wrxa-2us4-vkf9
101
vulnerability VCID-ws4h-295a-9qgx
102
vulnerability VCID-x1fg-6mq4-d7ds
103
vulnerability VCID-xbb2-av4z-m3dp
104
vulnerability VCID-xdbp-7rtr-fyb7
105
vulnerability VCID-xpvn-y3b8-skgb
106
vulnerability VCID-y683-kz6e-afhv
107
vulnerability VCID-y6jw-jm1g-ubgx
108
vulnerability VCID-ya95-dsw9-pfhw
109
vulnerability VCID-ybx7-gpq4-33ha
110
vulnerability VCID-yjny-ubdp-7few
111
vulnerability VCID-ypan-57sx-vyam
112
vulnerability VCID-zwne-uyfj-5bf8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.7b-2.1%252Blenny5
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1645.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1645.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1645
reference_id
reference_type
scores
0
value 0.02794
scoring_system epss
scoring_elements 0.86112
published_at 2026-04-16T12:55:00Z
1
value 0.02794
scoring_system epss
scoring_elements 0.8603
published_at 2026-04-01T12:55:00Z
2
value 0.02794
scoring_system epss
scoring_elements 0.86041
published_at 2026-04-02T12:55:00Z
3
value 0.02794
scoring_system epss
scoring_elements 0.86058
published_at 2026-04-04T12:55:00Z
4
value 0.02794
scoring_system epss
scoring_elements 0.86057
published_at 2026-04-07T12:55:00Z
5
value 0.02794
scoring_system epss
scoring_elements 0.86077
published_at 2026-04-08T12:55:00Z
6
value 0.02794
scoring_system epss
scoring_elements 0.86087
published_at 2026-04-09T12:55:00Z
7
value 0.02794
scoring_system epss
scoring_elements 0.86102
published_at 2026-04-11T12:55:00Z
8
value 0.02794
scoring_system epss
scoring_elements 0.86099
published_at 2026-04-12T12:55:00Z
9
value 0.02794
scoring_system epss
scoring_elements 0.86094
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1645
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1645
3
reference_url http://secunia.com/advisories/41041
reference_id
reference_type
scores
url http://secunia.com/advisories/41041
4
reference_url https://rhn.redhat.com/errata/RHSA-2010-0635.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0635.html
5
reference_url http://svn.cacti.net/viewvc?view=rev&revision=5778
reference_id
reference_type
scores
url http://svn.cacti.net/viewvc?view=rev&revision=5778
6
reference_url http://svn.cacti.net/viewvc?view=rev&revision=5782
reference_id
reference_type
scores
url http://svn.cacti.net/viewvc?view=rev&revision=5782
7
reference_url http://svn.cacti.net/viewvc?view=rev&revision=5784
reference_id
reference_type
scores
url http://svn.cacti.net/viewvc?view=rev&revision=5784
8
reference_url http://www.bonsai-sec.com/en/research/vulnerabilities/cacti-os-command-injection-0105.php
reference_id
reference_type
scores
url http://www.bonsai-sec.com/en/research/vulnerabilities/cacti-os-command-injection-0105.php
9
reference_url http://www.cacti.net/release_notes_0_8_7f.php
reference_id
reference_type
scores
url http://www.cacti.net/release_notes_0_8_7f.php
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:160
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:160
11
reference_url http://www.vupen.com/english/advisories/2010/2132
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2132
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=609115
reference_id 609115
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=609115
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.5:-:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.5:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.5:-:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.7:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.8:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.6.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.8a:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.2a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.2a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.2a:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.3a:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.5a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.5a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.5a:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6a:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6b:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6c:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6d:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6f:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6g:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6h:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6i:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6j:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6j:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6j:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6k:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.6k:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6k:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1645
reference_id CVE-2010-1645
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-1645
51
reference_url https://security.gentoo.org/glsa/201401-20
reference_id GLSA-201401-20
reference_type
scores
url https://security.gentoo.org/glsa/201401-20
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score6.5 - 6.5
Exploitability0.5
Weighted_severity5.9
Risk_score3.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-5dm9-jpwc-gkeu