{"url":"http://public2.vulnerablecode.io/api/packages/582855?format=json","purl":"pkg:deb/debian/cacti@0.8.6d-1?distro=trixie","type":"deb","namespace":"debian","name":"cacti","version":"0.8.6d-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"0.8.6e-1","latest_non_vulnerable_version":"1.2.30+ds1-3","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35934?format=json","vulnerability_id":"VCID-5ccj-b3a9-67g2","summary":"Multiple vulnerabilities have been discovered in the ADOdb layer included\n    in Cacti, potentially resulting in the execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0806","reference_id":"","reference_type":"","scores":[{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.93932","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.9394","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.9395","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.93953","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.93961","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.93965","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.93968","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.93983","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.93988","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.9399","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.93992","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.93991","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.93999","published_at":"2026-05-05T12:55:00Z"},{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.94011","published_at":"2026-05-07T12:55:00Z"},{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.94021","published_at":"2026-05-09T12:55:00Z"},{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.94025","published_at":"2026-05-11T12:55:00Z"},{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.94029","published_at":"2026-05-12T12:55:00Z"},{"value":"0.12629","scoring_system":"epss","scoring_elements":"0.94042","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=358872","reference_id":"358872","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=358872"},{"reference_url":"https://security.gentoo.org/glsa/200604-07","reference_id":"GLSA-200604-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200604-07"},{"reference_url":"http://gulftech.org/advisories/ADOdb%20Cross%20Site%20Scripting/93","reference_id":"GTSA-00093;CVE-2006-0806","reference_type":"exploit","scores":[],"url":"http://gulftech.org/advisories/ADOdb%20Cross%20Site%20Scripting/93"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/43832.txt","reference_id":"GTSA-00093;CVE-2006-0806","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/43832.txt"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582855?format=json","purl":"pkg:deb/debian/cacti@0.8.6d-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.6d-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582138?format=json","purl":"pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-cqr3-wwhj-tyck"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"},{"vulnerability":"VCID-zxu5-equ9-1kam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582140?format=json","purl":"pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.24%252Bds1-1%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582142?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582143?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077411?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-3%3Fdistro=trixie"}],"aliases":["CVE-2006-0806"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5ccj-b3a9-67g2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35931?format=json","vulnerability_id":"VCID-9x72-e9wx-mqf4","summary":"Multiple vulnerabilities have been discovered in the ADOdb layer included\n    in Cacti, potentially resulting in the execution of arbitrary code.","references":[{"reference_url":"http://retrogod.altervista.org/phpopenchat_30x_sql_xpl.html","reference_id":"","reference_type":"","scores":[],"url":"http://retrogod.altervista.org/phpopenchat_30x_sql_xpl.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0146","reference_id":"","reference_type":"","scores":[{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92911","published_at":"2026-05-14T12:55:00Z"},{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92795","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92802","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92807","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92805","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92818","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92822","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92833","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92837","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92844","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92846","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92841","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92851","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92864","published_at":"2026-05-07T12:55:00Z"},{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92875","published_at":"2026-05-09T12:55:00Z"},{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92879","published_at":"2026-05-11T12:55:00Z"},{"value":"0.09474","scoring_system":"epss","scoring_elements":"0.92886","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0146"},{"reference_url":"http://secunia.com/advisories/17418","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17418"},{"reference_url":"http://secunia.com/advisories/18233","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18233"},{"reference_url":"http://secunia.com/advisories/18254","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18254"},{"reference_url":"http://secunia.com/advisories/18260","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18260"},{"reference_url":"http://secunia.com/advisories/18267","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18267"},{"reference_url":"http://secunia.com/advisories/18276","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18276"},{"reference_url":"http://secunia.com/advisories/18720","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18720"},{"reference_url":"http://secunia.com/advisories/19555","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19555"},{"reference_url":"http://secunia.com/advisories/19563","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19563"},{"reference_url":"http://secunia.com/advisories/19590","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19590"},{"reference_url":"http://secunia.com/advisories/19591","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19591"},{"reference_url":"http://secunia.com/advisories/19600","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19600"},{"reference_url":"http://secunia.com/advisories/19691","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19691"},{"reference_url":"http://secunia.com/advisories/19699","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19699"},{"reference_url":"http://secunia.com/advisories/24954","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24954"},{"reference_url":"http://secunia.com/secunia_research/2005-64/advisory/","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/secunia_research/2005-64/advisory/"},{"reference_url":"http://securityreason.com/securityalert/713","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/713"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24051","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24051"},{"reference_url":"http://www.debian.org/security/2006/dsa-1029","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-1029"},{"reference_url":"http://www.debian.org/security/2006/dsa-1030","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-1030"},{"reference_url":"http://www.debian.org/security/2006/dsa-1031","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-1031"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200604-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200604-07.xml"},{"reference_url":"http://www.maxdev.com/Article550.phtml","reference_id":"","reference_type":"","scores":[],"url":"http://www.maxdev.com/Article550.phtml"},{"reference_url":"http://www.osvdb.org/22290","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/22290"},{"reference_url":"http://www.securityfocus.com/archive/1/423784/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/423784/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/430448/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/430448/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/466171/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/466171/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/16187","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/16187"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0101","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0101"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0102","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0102"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0103","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0103"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0104","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0104"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0105","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0105"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0370","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0370"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0447","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0447"},{"reference_url":"http://www.vupen.com/english/advisories/2006/1304","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/1304"},{"reference_url":"http://www.vupen.com/english/advisories/2006/1305","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/1305"},{"reference_url":"http://www.vupen.com/english/advisories/2006/1419","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/1419"},{"reference_url":"http://www.xaraya.com/index.php/news/569","reference_id":"","reference_type":"","scores":[],"url":"http://www.xaraya.com/index.php/news/569"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=349985","reference_id":"349985","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=349985"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:john_lim:adodb:4.66:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:john_lim:adodb:4.66:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:john_lim:adodb:4.66:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:john_lim:adodb:4.68:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:john_lim:adodb:4.68:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:john_lim:adodb:4.68:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mantis:mantis:0.19.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mantis:mantis:0.19.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mantis:mantis:0.19.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mantis:mantis:1.0.0_rc4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mantis:mantis:1.0.0_rc4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mantis:mantis:1.0.0_rc4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mediabeez:mediabeez:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mediabeez:mediabeez:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mediabeez:mediabeez:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:moodle:moodle:1.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postnuke_software_foundation:postnuke:0.761:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postnuke_software_foundation:postnuke:0.761:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postnuke_software_foundation:postnuke:0.761:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:the_cacti_group:cacti:0.8.6g:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:the_cacti_group:cacti:0.8.6g:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:the_cacti_group:cacti:0.8.6g:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-0146","reference_id":"CVE-2006-0146","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-0146"},{"reference_url":"https://security.gentoo.org/glsa/200604-07","reference_id":"GLSA-200604-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200604-07"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/1663.php","reference_id":"OSVDB-24878;CVE-2006-2029;OSVDB-24562;CVE-2006-1779;OSVDB-24561;CVE-2006-1778;OSVDB-24560;CVE-2006-1777;CVE-2006-1776;OSVDB-24559;CVE-2006-0147;OSVDB-22291;OSVDB-22290;CVE-2006-0146","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/1663.php"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582855?format=json","purl":"pkg:deb/debian/cacti@0.8.6d-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.6d-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582138?format=json","purl":"pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-cqr3-wwhj-tyck"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"},{"vulnerability":"VCID-zxu5-equ9-1kam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582140?format=json","purl":"pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.24%252Bds1-1%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582142?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582143?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077411?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-3%3Fdistro=trixie"}],"aliases":["CVE-2006-0146"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9x72-e9wx-mqf4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91360?format=json","vulnerability_id":"VCID-he8q-5n8u-27dv","summary":"Cacti versions prior to 0.8.6-d contain a remote command execution vulnerability in the graph_view.php script. An authenticated user can inject arbitrary shell commands via the graph_start GET parameter, which is improperly handled during graph rendering. This flaw allows attackers to execute commands on the underlying operating system with the privileges of the web server process, potentially compromising system integrity.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-10004","reference_id":"","reference_type":"","scores":[{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.98031","published_at":"2026-05-14T12:55:00Z"},{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.97997","published_at":"2026-04-02T12:55:00Z"},{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.98011","published_at":"2026-04-11T12:55:00Z"},{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.98012","published_at":"2026-04-12T12:55:00Z"},{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.98013","published_at":"2026-04-13T12:55:00Z"},{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.98018","published_at":"2026-04-29T12:55:00Z"},{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.98019","published_at":"2026-04-18T12:55:00Z"},{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.98015","published_at":"2026-04-26T12:55:00Z"},{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.98014","published_at":"2026-04-24T12:55:00Z"},{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.98025","published_at":"2026-05-09T12:55:00Z"},{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.98022","published_at":"2026-05-07T12:55:00Z"},{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.98024","published_at":"2026-05-11T12:55:00Z"},{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.98027","published_at":"2026-05-12T12:55:00Z"},{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.97992","published_at":"2026-04-01T12:55:00Z"},{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.97999","published_at":"2026-04-04T12:55:00Z"},{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.98001","published_at":"2026-04-07T12:55:00Z"},{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.98006","published_at":"2026-04-08T12:55:00Z"},{"value":"0.54001","scoring_system":"epss","scoring_elements":"0.98007","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-10004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-10004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-10004"},{"reference_url":"https://www.exploit-db.com/exploits/16881","reference_id":"16881","reference_type":"","scores":[{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-02T20:43:58Z/"}],"url":"https://www.exploit-db.com/exploits/16881"},{"reference_url":"https://www.exploit-db.com/exploits/9911","reference_id":"9911","reference_type":"","scores":[{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-02T20:43:58Z/"}],"url":"https://www.exploit-db.com/exploits/9911"},{"reference_url":"https://web.archive.org/web/20050305034552/http://www.cacti.net/cactid_download.php","reference_id":"cactid_download.php","reference_type":"","scores":[{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-02T20:43:58Z/"}],"url":"https://web.archive.org/web/20050305034552/http://www.cacti.net/cactid_download.php"},{"reference_url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/cacti_graphimage_exec.rb","reference_id":"cacti_graphimage_exec.rb","reference_type":"","scores":[{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-02T20:43:58Z/"}],"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/cacti_graphimage_exec.rb"},{"reference_url":"https://www.vulncheck.com/advisories/cacti-graph-view-rce","reference_id":"cacti-graph-view-rce","reference_type":"","scores":[{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-02T20:43:58Z/"}],"url":"https://www.vulncheck.com/advisories/cacti-graph-view-rce"},{"reference_url":"https://www.cacti.net/info/downloads","reference_id":"downloads","reference_type":"","scores":[{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-02T20:43:58Z/"}],"url":"https://www.cacti.net/info/downloads"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582855?format=json","purl":"pkg:deb/debian/cacti@0.8.6d-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.6d-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582138?format=json","purl":"pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-cqr3-wwhj-tyck"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"},{"vulnerability":"VCID-zxu5-equ9-1kam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582140?format=json","purl":"pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.24%252Bds1-1%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582142?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582143?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077411?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-3%3Fdistro=trixie"}],"aliases":["CVE-2005-10004"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-he8q-5n8u-27dv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35932?format=json","vulnerability_id":"VCID-kjcg-xe2b-akap","summary":"Multiple vulnerabilities have been discovered in the ADOdb layer included\n    in Cacti, potentially resulting in the execution of arbitrary code.","references":[{"reference_url":"http://retrogod.altervista.org/phpopenchat_30x_sql_xpl.html","reference_id":"","reference_type":"","scores":[],"url":"http://retrogod.altervista.org/phpopenchat_30x_sql_xpl.html"},{"reference_url":"http://retrogod.altervista.org/simplog_092_incl_xpl.html","reference_id":"","reference_type":"","scores":[],"url":"http://retrogod.altervista.org/simplog_092_incl_xpl.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0147","reference_id":"","reference_type":"","scores":[{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96674","published_at":"2026-05-14T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96589","published_at":"2026-04-01T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96599","published_at":"2026-04-02T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96614","published_at":"2026-04-08T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96616","published_at":"2026-04-09T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96619","published_at":"2026-04-12T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96621","published_at":"2026-04-13T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96628","published_at":"2026-04-16T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96633","published_at":"2026-04-18T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96637","published_at":"2026-04-26T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96635","published_at":"2026-04-24T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96639","published_at":"2026-04-29T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96648","published_at":"2026-05-05T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96651","published_at":"2026-05-07T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96656","published_at":"2026-05-09T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96661","published_at":"2026-05-11T12:55:00Z"},{"value":"0.29662","scoring_system":"epss","scoring_elements":"0.96665","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0147"},{"reference_url":"http://secunia.com/advisories/17418","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17418"},{"reference_url":"http://secunia.com/advisories/18233","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18233"},{"reference_url":"http://secunia.com/advisories/18254","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18254"},{"reference_url":"http://secunia.com/advisories/18260","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18260"},{"reference_url":"http://secunia.com/advisories/18267","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18267"},{"reference_url":"http://secunia.com/advisories/18276","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18276"},{"reference_url":"http://secunia.com/advisories/19555","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19555"},{"reference_url":"http://secunia.com/advisories/19590","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19590"},{"reference_url":"http://secunia.com/advisories/19591","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19591"},{"reference_url":"http://secunia.com/advisories/19600","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19600"},{"reference_url":"http://secunia.com/advisories/19628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19628"},{"reference_url":"http://secunia.com/advisories/19691","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19691"},{"reference_url":"http://secunia.com/secunia_research/2005-64/advisory/","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/secunia_research/2005-64/advisory/"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24052","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24052"},{"reference_url":"https://www.exploit-db.com/exploits/1663","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/1663"},{"reference_url":"http://www.debian.org/security/2006/dsa-1029","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-1029"},{"reference_url":"http://www.debian.org/security/2006/dsa-1030","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-1030"},{"reference_url":"http://www.debian.org/security/2006/dsa-1031","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-1031"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200604-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200604-07.xml"},{"reference_url":"http://www.osvdb.org/22291","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/22291"},{"reference_url":"http://www.securityfocus.com/archive/1/430448/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/430448/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/430743/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/430743/100/0/threaded"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0101","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0101"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0102","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0102"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0103","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0103"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0104","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0104"},{"reference_url":"http://www.vupen.com/english/advisories/2006/1305","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/1305"},{"reference_url":"http://www.vupen.com/english/advisories/2006/1332","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/1332"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=349985","reference_id":"349985","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=349985"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:john_lim:adodb:4.66:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:john_lim:adodb:4.66:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:john_lim:adodb:4.66:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:john_lim:adodb:4.68:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:john_lim:adodb:4.68:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:john_lim:adodb:4.68:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mantis:mantis:0.19.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mantis:mantis:0.19.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mantis:mantis:0.19.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mantis:mantis:1.0.0_rc4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mantis:mantis:1.0.0_rc4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mantis:mantis:1.0.0_rc4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:moodle:moodle:1.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postnuke_software_foundation:postnuke:0.761:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postnuke_software_foundation:postnuke:0.761:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postnuke_software_foundation:postnuke:0.761:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:the_cacti_group:cacti:0.8.6g:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:the_cacti_group:cacti:0.8.6g:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:the_cacti_group:cacti:0.8.6g:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-0147","reference_id":"CVE-2006-0147","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-0147"},{"reference_url":"https://security.gentoo.org/glsa/200604-07","reference_id":"GLSA-200604-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200604-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582855?format=json","purl":"pkg:deb/debian/cacti@0.8.6d-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.6d-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582138?format=json","purl":"pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-cqr3-wwhj-tyck"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"},{"vulnerability":"VCID-zxu5-equ9-1kam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582140?format=json","purl":"pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.24%252Bds1-1%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582142?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582143?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077411?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-3%3Fdistro=trixie"}],"aliases":["CVE-2006-0147"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kjcg-xe2b-akap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35933?format=json","vulnerability_id":"VCID-yqvt-gasb-t3bq","summary":"Multiple vulnerabilities have been discovered in the ADOdb layer included\n    in Cacti, potentially resulting in the execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0410","reference_id":"","reference_type":"","scores":[{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.7982","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.79827","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.79848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.79836","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.79865","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.79873","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.79893","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.79876","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.79869","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.79898","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.79899","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.79902","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.7993","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.79937","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.79954","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.79968","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.79991","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.80006","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.80002","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.80018","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01319","scoring_system":"epss","scoring_elements":"0.80058","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0410"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=349985","reference_id":"349985","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=349985"},{"reference_url":"https://security.gentoo.org/glsa/200602-02","reference_id":"GLSA-200602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200602-02"},{"reference_url":"https://security.gentoo.org/glsa/200604-07","reference_id":"GLSA-200604-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200604-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582855?format=json","purl":"pkg:deb/debian/cacti@0.8.6d-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.6d-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582138?format=json","purl":"pkg:deb/debian/cacti@1.2.16%2Bds1-2%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-cqr3-wwhj-tyck"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"},{"vulnerability":"VCID-zxu5-equ9-1kam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.16%252Bds1-2%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582140?format=json","purl":"pkg:deb/debian/cacti@1.2.24%2Bds1-1%2Bdeb12u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4e5y-1s19-r7g7"},{"vulnerability":"VCID-pxqa-nkv3-jqfs"},{"vulnerability":"VCID-xkkm-ss3p-1udc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.24%252Bds1-1%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582142?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582143?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077411?format=json","purl":"pkg:deb/debian/cacti@1.2.30%2Bds1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@1.2.30%252Bds1-3%3Fdistro=trixie"}],"aliases":["CVE-2006-0410"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yqvt-gasb-t3bq"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cacti@0.8.6d-1%3Fdistro=trixie"}