| 0 |
| url |
VCID-34z4-1zqk-afcm |
| vulnerability_id |
VCID-34z4-1zqk-afcm |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39515 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49161 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49131 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.4916 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49155 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49181 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49164 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49167 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49113 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39515 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39515
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-34z4-1zqk-afcm |
|
| 1 |
| url |
VCID-5ykb-6nvx-k3e4 |
| vulnerability_id |
VCID-5ykb-6nvx-k3e4 |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39362 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.87228 |
| scoring_system |
epss |
| scoring_elements |
0.99443 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.87228 |
| scoring_system |
epss |
| scoring_elements |
0.99445 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.87228 |
| scoring_system |
epss |
| scoring_elements |
0.99446 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.87228 |
| scoring_system |
epss |
| scoring_elements |
0.99447 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.87228 |
| scoring_system |
epss |
| scoring_elements |
0.99448 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.87228 |
| scoring_system |
epss |
| scoring_elements |
0.99449 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39362 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39362
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5ykb-6nvx-k3e4 |
|
| 2 |
| url |
VCID-8max-2avj-hkdt |
| vulnerability_id |
VCID-8max-2avj-hkdt |
| summary |
Cacti provides an operational monitoring and fault management framework. Version 1.2.25 has a Blind SQL Injection (SQLi) vulnerability within the SNMP Notification Receivers feature in the file `‘managers.php’`. An authenticated attacker with the “Settings/Utilities” permission can send a crafted HTTP GET request to the endpoint `‘/cacti/managers.php’` with an SQLi payload in the `‘selected_graphs_array’` HTTP GET parameter. As of time of publication, no patched versions exist. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-51448 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.32076 |
| scoring_system |
epss |
| scoring_elements |
0.96804 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.32076 |
| scoring_system |
epss |
| scoring_elements |
0.96806 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.32076 |
| scoring_system |
epss |
| scoring_elements |
0.96809 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.32076 |
| scoring_system |
epss |
| scoring_elements |
0.96817 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.32076 |
| scoring_system |
epss |
| scoring_elements |
0.96818 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.32076 |
| scoring_system |
epss |
| scoring_elements |
0.9682 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.32076 |
| scoring_system |
epss |
| scoring_elements |
0.96821 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.32076 |
| scoring_system |
epss |
| scoring_elements |
0.96822 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-51448 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-51448
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8max-2avj-hkdt |
|
| 3 |
| url |
VCID-a8j1-24bw-gudu |
| vulnerability_id |
VCID-a8j1-24bw-gudu |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39364 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.3773 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37755 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37633 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37684 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37697 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37711 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37676 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37648 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39364 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39364
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a8j1-24bw-gudu |
|
| 4 |
| url |
VCID-akj7-kh8f-97ct |
| vulnerability_id |
VCID-akj7-kh8f-97ct |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49088 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.77167 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.77196 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.77177 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.7721 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.77218 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.77246 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.77225 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0102 |
| scoring_system |
epss |
| scoring_elements |
0.77221 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49088 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-49088
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-akj7-kh8f-97ct |
|
| 5 |
| url |
VCID-ay5a-nkmf-5yar |
| vulnerability_id |
VCID-ay5a-nkmf-5yar |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49086 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76305 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76335 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76314 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76347 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76361 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76387 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76365 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.7636 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49086 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-49086
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ay5a-nkmf-5yar |
|
| 6 |
| url |
VCID-c2b8-ss11-9yhq |
| vulnerability_id |
VCID-c2b8-ss11-9yhq |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39360 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.70215 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.70232 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.70209 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.70255 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.7027 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.70294 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.70279 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00629 |
| scoring_system |
epss |
| scoring_elements |
0.70267 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39360 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39360
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c2b8-ss11-9yhq |
|
| 7 |
| url |
VCID-d7db-n89n-qyd8 |
| vulnerability_id |
VCID-d7db-n89n-qyd8 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49084 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.88341 |
| scoring_system |
epss |
| scoring_elements |
0.99488 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.88341 |
| scoring_system |
epss |
| scoring_elements |
0.9949 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.88341 |
| scoring_system |
epss |
| scoring_elements |
0.99492 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.88341 |
| scoring_system |
epss |
| scoring_elements |
0.99493 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.88341 |
| scoring_system |
epss |
| scoring_elements |
0.99494 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.88341 |
| scoring_system |
epss |
| scoring_elements |
0.99495 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49084 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-49084
|
| risk_score |
1.6 |
| exploitability |
2.0 |
| weighted_severity |
0.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d7db-n89n-qyd8 |
|
| 8 |
| url |
VCID-d7t8-6cty-sqde |
| vulnerability_id |
VCID-d7t8-6cty-sqde |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39358 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03993 |
| scoring_system |
epss |
| scoring_elements |
0.88376 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.03993 |
| scoring_system |
epss |
| scoring_elements |
0.88385 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.03993 |
| scoring_system |
epss |
| scoring_elements |
0.88389 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.03993 |
| scoring_system |
epss |
| scoring_elements |
0.88408 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.03993 |
| scoring_system |
epss |
| scoring_elements |
0.88415 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.03993 |
| scoring_system |
epss |
| scoring_elements |
0.88425 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.03993 |
| scoring_system |
epss |
| scoring_elements |
0.88418 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.03993 |
| scoring_system |
epss |
| scoring_elements |
0.88417 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39358 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39358
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d7t8-6cty-sqde |
|
| 9 |
| url |
VCID-du4b-tbxt-mqfr |
| vulnerability_id |
VCID-du4b-tbxt-mqfr |
| summary |
Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's browser at view-time. The `data_sources.php` script displays the data source management information (e.g. data source path, polling configuration etc.) for different data visualizations of the _cacti_ app.
CENSUS found that an adversary that is able to configure a malicious Device name, can deploy a stored XSS attack against any user of the same (or broader) privileges. A user that possesses the _General Administration>Sites/Devices/Data_ permissions can configure the device names in _cacti_. This configuration occurs through `http://<HOST>/cacti/host.php`, while the rendered malicious payload is exhibited at `http://<HOST>/cacti/data_sources.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39366 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.58345 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.58365 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.58339 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.58392 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.58398 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.58415 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.58394 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.58375 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39366 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39366
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-du4b-tbxt-mqfr |
|
| 10 |
| url |
VCID-h3qa-svy4-1fcr |
| vulnerability_id |
VCID-h3qa-svy4-1fcr |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49085 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.91404 |
| scoring_system |
epss |
| scoring_elements |
0.99656 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.91404 |
| scoring_system |
epss |
| scoring_elements |
0.99658 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.91404 |
| scoring_system |
epss |
| scoring_elements |
0.99659 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.91404 |
| scoring_system |
epss |
| scoring_elements |
0.9966 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.91404 |
| scoring_system |
epss |
| scoring_elements |
0.99661 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.91404 |
| scoring_system |
epss |
| scoring_elements |
0.99662 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49085 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-49085
|
| risk_score |
1.6 |
| exploitability |
2.0 |
| weighted_severity |
0.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h3qa-svy4-1fcr |
|
| 11 |
| url |
VCID-h6vp-37u4-b7f3 |
| vulnerability_id |
VCID-h6vp-37u4-b7f3 |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39510 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65677 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65707 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65672 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65723 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65735 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65757 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65742 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65713 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39510 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39510
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h6vp-37u4-b7f3 |
|
| 12 |
| url |
VCID-huf2-qwju-6bf2 |
| vulnerability_id |
VCID-huf2-qwju-6bf2 |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39365 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38327 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38352 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38217 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38267 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38275 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38294 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38258 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0017 |
| scoring_system |
epss |
| scoring_elements |
0.38234 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39365 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39365
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-huf2-qwju-6bf2 |
|
| 13 |
| url |
VCID-mwbm-aphc-akgu |
| vulnerability_id |
VCID-mwbm-aphc-akgu |
| summary |
Cacti is an open source operational monitoring and fault management framework. A reflection cross-site scripting vulnerability was discovered in version 1.2.25. Attackers can exploit this vulnerability to perform actions on behalf of other users. The vulnerability is found in `templates_import.php.` When uploading an xml template file, if the XML file does not pass the check, the server will give a JavaScript pop-up prompt, which contains unfiltered xml template file name, resulting in XSS. An attacker exploiting this vulnerability could execute actions on behalf of other users. This ability to impersonate users could lead to unauthorized changes to settings. As of time of publication, no patched versions are available. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-50250 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02686 |
| scoring_system |
epss |
| scoring_elements |
0.85793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.02686 |
| scoring_system |
epss |
| scoring_elements |
0.85811 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.03596 |
| scoring_system |
epss |
| scoring_elements |
0.87735 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.03596 |
| scoring_system |
epss |
| scoring_elements |
0.87756 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.03596 |
| scoring_system |
epss |
| scoring_elements |
0.87762 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.03596 |
| scoring_system |
epss |
| scoring_elements |
0.87773 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.03596 |
| scoring_system |
epss |
| scoring_elements |
0.87768 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.03596 |
| scoring_system |
epss |
| scoring_elements |
0.87766 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-50250 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-50250
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mwbm-aphc-akgu |
|
| 14 |
| url |
VCID-pau5-hfbv-nucp |
| vulnerability_id |
VCID-pau5-hfbv-nucp |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39513 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52839 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52865 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52832 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52884 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52878 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52928 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52912 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52895 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39513 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39513
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pau5-hfbv-nucp |
|
| 15 |
| url |
VCID-pxqa-nkv3-jqfs |
| vulnerability_id |
VCID-pxqa-nkv3-jqfs |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-30534 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.48534 |
| scoring_system |
epss |
| scoring_elements |
0.97733 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.48534 |
| scoring_system |
epss |
| scoring_elements |
0.97735 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.48534 |
| scoring_system |
epss |
| scoring_elements |
0.9774 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.48534 |
| scoring_system |
epss |
| scoring_elements |
0.97744 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.48534 |
| scoring_system |
epss |
| scoring_elements |
0.97746 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.48534 |
| scoring_system |
epss |
| scoring_elements |
0.97749 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.48534 |
| scoring_system |
epss |
| scoring_elements |
0.9775 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-30534 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-30534
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pxqa-nkv3-jqfs |
|
| 16 |
| url |
VCID-sb43-hapb-1uf2 |
| vulnerability_id |
VCID-sb43-hapb-1uf2 |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39357 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.87071 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.8709 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.87083 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.87103 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.87111 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.87124 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.87119 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.03246 |
| scoring_system |
epss |
| scoring_elements |
0.87114 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39357 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39357
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sb43-hapb-1uf2 |
|
| 17 |
| url |
VCID-vsjt-qjyw-hbfs |
| vulnerability_id |
VCID-vsjt-qjyw-hbfs |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39359 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.89353 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.89365 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.89368 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.89385 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.89388 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.89397 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.89394 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.04724 |
| scoring_system |
epss |
| scoring_elements |
0.8939 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39359 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39359
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
7.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vsjt-qjyw-hbfs |
|
| 18 |
| url |
VCID-w11p-1pr3-7ybp |
| vulnerability_id |
VCID-w11p-1pr3-7ybp |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39511 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68243 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68262 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68238 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68288 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68304 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.6833 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68318 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68285 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39511 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39511
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w11p-1pr3-7ybp |
|
| 19 |
| url |
VCID-ws4h-295a-9qgx |
| vulnerability_id |
VCID-ws4h-295a-9qgx |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39516 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51728 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51754 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51714 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51768 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51765 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51815 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51794 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00284 |
| scoring_system |
epss |
| scoring_elements |
0.51778 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39516 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39516
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ws4h-295a-9qgx |
|
| 20 |
| url |
VCID-xkkm-ss3p-1udc |
| vulnerability_id |
VCID-xkkm-ss3p-1udc |
| summary |
SQL Injection vulnerability in Cacti v1.2.25 allows a remote attacker to obtain sensitive information via the form_actions() function in the managers.php function. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46490 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43075 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43124 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43071 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43098 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43037 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.4309 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43102 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46490 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-46490
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xkkm-ss3p-1udc |
|
| 21 |
|
| 22 |
| url |
VCID-zf92-pzgz-dfg7 |
| vulnerability_id |
VCID-zf92-pzgz-dfg7 |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39512 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65677 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65707 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65672 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65723 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65735 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65757 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65742 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65713 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39512 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39512
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zf92-pzgz-dfg7 |
|
| 23 |
| url |
VCID-zkmp-kgyq-tfeh |
| vulnerability_id |
VCID-zkmp-kgyq-tfeh |
| summary |
Rejected reason: DO NOT USE THIS CVE RECORD. Consult IDs: CVE-2023-50250. Reason: This record is a reservation duplicate of CVE-2023-50250. Notes: All CVE users should reference CVE-2023-50250 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage. |
| references |
|
| fixed_packages |
|
| aliases |
CVE-2023-50569
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zkmp-kgyq-tfeh |
|
| 24 |
| url |
VCID-znew-xktt-p7hy |
| vulnerability_id |
VCID-znew-xktt-p7hy |
| summary |
Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39514 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55076 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55101 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55077 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55127 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55126 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55138 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55118 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39514 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39514
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-znew-xktt-p7hy |
|