{"url":"http://public2.vulnerablecode.io/api/packages/582261?format=json","purl":"pkg:deb/debian/cacti@0.8.7i-1?distro=trixie","type":"deb","namespace":"debian","name":"cacti","version":"0.8.7i-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"0.8.8b+dfsg-1","latest_non_vulnerable_version":"1.2.30+ds1-3","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92240?format=json","vulnerability_id":"VCID-4ytj-s8hh-6bd5","summary":"SQL injection vulnerability in auth_login.php in Cacti before 0.8.7h allows remote attackers to execute arbitrary SQL commands via the login_username parameter.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4824","reference_id":"","reference_type":"","scores":[{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87061","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87072","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87091","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87084","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87104","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87112","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87125","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87119","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87115","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87131","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87135","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87132","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87151","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87157","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87158","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87178","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87194","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87212","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87207","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87222","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03247","scoring_system":"epss","scoring_elements":"0.87258","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4824"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652371","reference_id":"652371","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652371"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582261?format=json","purl":"pkg:deb/debian/cacti@0.8.7i-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.7i-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582138?format=json","purl":"pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-cqr3-wwhj-tyck"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"},{"vulnerability":"VCID-zxu5-equ9-1kam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582140?format=json","purl":"pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.24%252Bds1-1%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582142?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582143?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077411?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-3%3Fdistro=trixie"}],"aliases":["CVE-2011-4824"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ytj-s8hh-6bd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92261?format=json","vulnerability_id":"VCID-ddq2-myvr-wfgz","summary":"Cross-site request forgery (CSRF) vulnerability in logout.php in Cacti before 0.8.7i allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.","references":[{"reference_url":"http://bugs.cacti.net/view.php?id=2062","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.cacti.net/view.php?id=2062"},{"reference_url":"http://forums.cacti.net/viewtopic.php?f=21&t=44116","reference_id":"","reference_type":"","scores":[],"url":"http://forums.cacti.net/viewtopic.php?f=21&t=44116"},{"reference_url":"http://forums.cacti.net/viewtopic.php?f=4&t=45871","reference_id":"","reference_type":"","scores":[],"url":"http://forums.cacti.net/viewtopic.php?f=4&t=45871"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-5223","reference_id":"","reference_type":"","scores":[{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.63919","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.6367","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.6373","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.63755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.63715","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.63767","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.63784","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.63797","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.63782","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.63749","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.63795","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.63799","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.63811","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.63808","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.63781","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.63825","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.63873","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.6384","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00453","scoring_system":"epss","scoring_elements":"0.63867","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-5223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5223"},{"reference_url":"http://secunia.com/advisories/47195","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/47195"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/71792","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/71792"},{"reference_url":"http://www.securityfocus.com/bid/51048","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/51048"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.8a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.6.8a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.6.8a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.3a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.3a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.3a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.5a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.5a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.5a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.6a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.6b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.6c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.6d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.6f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6g:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.6g:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6g:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6h:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.6h:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6h:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6i:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.6i:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6i:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6j:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.6j:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6j:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6k:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.6k:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6k:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7g:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7g:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7g:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-5223","reference_id":"CVE-2011-5223","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-5223"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582261?format=json","purl":"pkg:deb/debian/cacti@0.8.7i-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.7i-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582138?format=json","purl":"pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-cqr3-wwhj-tyck"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"},{"vulnerability":"VCID-zxu5-equ9-1kam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582140?format=json","purl":"pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.24%252Bds1-1%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582142?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582143?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077411?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-3%3Fdistro=trixie"}],"aliases":["CVE-2011-5223"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ddq2-myvr-wfgz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51601?format=json","vulnerability_id":"VCID-jmv3-vh81-zfdq","summary":"Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48547","reference_id":"","reference_type":"","scores":[{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.6462","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64409","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64438","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64398","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64446","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64462","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64474","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64434","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64468","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.6448","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64493","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64506","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64527","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64572","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64543","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64566","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48547"},{"reference_url":"https://github.com/Cacti/cacti/issues/1882","reference_id":"1882","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:09:10Z/"}],"url":"https://github.com/Cacti/cacti/issues/1882"},{"reference_url":"https://security.gentoo.org/glsa/202412-02","reference_id":"GLSA-202412-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582261?format=json","purl":"pkg:deb/debian/cacti@0.8.7i-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.7i-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582138?format=json","purl":"pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-cqr3-wwhj-tyck"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"},{"vulnerability":"VCID-zxu5-equ9-1kam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582140?format=json","purl":"pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.24%252Bds1-1%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582142?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582143?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077411?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-3%3Fdistro=trixie"}],"aliases":["CVE-2022-48547"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jmv3-vh81-zfdq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94676?format=json","vulnerability_id":"VCID-p2u2-5yuu-jydy","summary":"As an unauthenticated remote user, visit \"http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>\" to successfully execute the JavaScript payload present in the \"ref\" URL parameter.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-26247","reference_id":"","reference_type":"","scores":[{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95609","published_at":"2026-04-01T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95617","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95625","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95634","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95637","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95642","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95644","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95653","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95657","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95658","published_at":"2026-04-21T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.9566","published_at":"2026-04-24T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95661","published_at":"2026-04-26T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95659","published_at":"2026-04-29T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95675","published_at":"2026-05-05T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95679","published_at":"2026-05-07T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95685","published_at":"2026-05-09T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95691","published_at":"2026-05-11T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95696","published_at":"2026-05-12T12:55:00Z"},{"value":"0.21043","scoring_system":"epss","scoring_elements":"0.95708","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-26247"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26247","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26247"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582261?format=json","purl":"pkg:deb/debian/cacti@0.8.7i-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.7i-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582138?format=json","purl":"pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-cqr3-wwhj-tyck"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"},{"vulnerability":"VCID-zxu5-equ9-1kam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582140?format=json","purl":"pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.24%252Bds1-1%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582142?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582143?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077411?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-3%3Fdistro=trixie"}],"aliases":["CVE-2021-26247"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p2u2-5yuu-jydy"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.7i-1%3Fdistro=trixie"}