{"url":"http://public2.vulnerablecode.io/api/packages/75782?format=json","purl":"pkg:ebuild/net-analyzer/cacti@1.2.9","type":"ebuild","namespace":"net-analyzer","name":"cacti","version":"1.2.9","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.2.11","latest_non_vulnerable_version":"1.2.26","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41772?format=json","vulnerability_id":"VCID-8nbc-ethb-6kcn","summary":"Multiple vulnerabilities have been found in Cacti, the worst of\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17358","reference_id":"","reference_type":"","scores":[{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84657","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84671","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84692","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84694","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84716","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84723","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84741","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84736","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.8473","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84751","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84753","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84754","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84781","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84791","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.8479","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84806","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84832","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84849","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84844","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84861","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84893","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02298","scoring_system":"epss","scoring_elements":"0.84904","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17358"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947375","reference_id":"947375","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947375"},{"reference_url":"https://security.gentoo.org/glsa/202003-40","reference_id":"GLSA-202003-40","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-40"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75782?format=json","purl":"pkg:ebuild/net-analyzer/cacti@1.2.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.9"}],"aliases":["CVE-2019-17358"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8nbc-ethb-6kcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41770?format=json","vulnerability_id":"VCID-cre7-1uhc-bka2","summary":"Multiple vulnerabilities have been found in Cacti, the worst of\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00048.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-16723","reference_id":"","reference_type":"","scores":[{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50301","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50287","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50221","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50261","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.5029","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50238","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50284","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50312","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50286","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50274","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50319","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50293","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50267","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50227","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50146","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50201","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.5023","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50184","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50211","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-16723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16723"},{"reference_url":"https://github.com/Cacti/cacti/issues/2964","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/Cacti/cacti/issues/2964"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZO3ROHHPKLH2JRW7ES5FYSQTWIPNVLQB/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZO3ROHHPKLH2JRW7ES5FYSQTWIPNVLQB/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZSCUUCKSYVZLN3PQE7NU76AFWUGT3E2D/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZSCUUCKSYVZLN3PQE7NU76AFWUGT3E2D/"},{"reference_url":"https://seclists.org/bugtraq/2020/Jan/25","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2020/Jan/25"},{"reference_url":"https://www.debian.org/security/2020/dsa-4604","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2020/dsa-4604"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941036","reference_id":"941036","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941036"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16723","reference_id":"CVE-2019-16723","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16723"},{"reference_url":"https://security.gentoo.org/glsa/202003-40","reference_id":"GLSA-202003-40","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-40"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75782?format=json","purl":"pkg:ebuild/net-analyzer/cacti@1.2.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.9"}],"aliases":["CVE-2019-16723"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cre7-1uhc-bka2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41773?format=json","vulnerability_id":"VCID-cxs3-zh36-m7en","summary":"Multiple vulnerabilities have been found in Cacti, the worst of\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7106","reference_id":"","reference_type":"","scores":[{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88531","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88539","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88556","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88577","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88582","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88594","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88586","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.886","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88597","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.8861","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88616","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88615","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88626","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88641","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88655","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88651","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88664","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88689","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04094","scoring_system":"epss","scoring_elements":"0.88699","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7106"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7106","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7106"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949996","reference_id":"949996","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949996"},{"reference_url":"https://security.gentoo.org/glsa/202003-40","reference_id":"GLSA-202003-40","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-40"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75782?format=json","purl":"pkg:ebuild/net-analyzer/cacti@1.2.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.9"}],"aliases":["CVE-2020-7106"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cxs3-zh36-m7en"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41771?format=json","vulnerability_id":"VCID-fwp2-z586-ebbq","summary":"Multiple vulnerabilities have been found in Cacti, the worst of\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17357","reference_id":"","reference_type":"","scores":[{"value":"0.15491","scoring_system":"epss","scoring_elements":"0.94683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.15491","scoring_system":"epss","scoring_elements":"0.9469","published_at":"2026-05-05T12:55:00Z"},{"value":"0.15491","scoring_system":"epss","scoring_elements":"0.94698","published_at":"2026-05-07T12:55:00Z"},{"value":"0.15491","scoring_system":"epss","scoring_elements":"0.94708","published_at":"2026-05-09T12:55:00Z"},{"value":"0.15491","scoring_system":"epss","scoring_elements":"0.94714","published_at":"2026-05-11T12:55:00Z"},{"value":"0.15491","scoring_system":"epss","scoring_elements":"0.94719","published_at":"2026-05-12T12:55:00Z"},{"value":"0.15491","scoring_system":"epss","scoring_elements":"0.94732","published_at":"2026-05-14T12:55:00Z"},{"value":"0.15491","scoring_system":"epss","scoring_elements":"0.94735","published_at":"2026-05-15T12:55:00Z"},{"value":"0.16157","scoring_system":"epss","scoring_elements":"0.94801","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16157","scoring_system":"epss","scoring_elements":"0.94808","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16157","scoring_system":"epss","scoring_elements":"0.94812","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16157","scoring_system":"epss","scoring_elements":"0.94764","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16157","scoring_system":"epss","scoring_elements":"0.94816","published_at":"2026-04-24T12:55:00Z"},{"value":"0.16157","scoring_system":"epss","scoring_elements":"0.94817","published_at":"2026-04-26T12:55:00Z"},{"value":"0.16157","scoring_system":"epss","scoring_elements":"0.94814","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16157","scoring_system":"epss","scoring_elements":"0.94774","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16157","scoring_system":"epss","scoring_elements":"0.94778","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16157","scoring_system":"epss","scoring_elements":"0.94779","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16157","scoring_system":"epss","scoring_elements":"0.94788","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16157","scoring_system":"epss","scoring_elements":"0.94792","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16157","scoring_system":"epss","scoring_elements":"0.94797","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16157","scoring_system":"epss","scoring_elements":"0.948","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17357"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17357","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17357"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947374","reference_id":"947374","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947374"},{"reference_url":"https://security.gentoo.org/glsa/202003-40","reference_id":"GLSA-202003-40","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-40"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75782?format=json","purl":"pkg:ebuild/net-analyzer/cacti@1.2.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.9"}],"aliases":["CVE-2019-17357"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fwp2-z586-ebbq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41774?format=json","vulnerability_id":"VCID-uj1s-uuyx-mya5","summary":"Multiple vulnerabilities have been found in Cacti, the worst of\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7237","reference_id":"","reference_type":"","scores":[{"value":"0.45689","scoring_system":"epss","scoring_elements":"0.97629","published_at":"2026-04-26T12:55:00Z"},{"value":"0.45689","scoring_system":"epss","scoring_elements":"0.97632","published_at":"2026-04-29T12:55:00Z"},{"value":"0.45689","scoring_system":"epss","scoring_elements":"0.97638","published_at":"2026-05-05T12:55:00Z"},{"value":"0.45689","scoring_system":"epss","scoring_elements":"0.9764","published_at":"2026-05-07T12:55:00Z"},{"value":"0.45689","scoring_system":"epss","scoring_elements":"0.97641","published_at":"2026-05-09T12:55:00Z"},{"value":"0.45689","scoring_system":"epss","scoring_elements":"0.97643","published_at":"2026-05-11T12:55:00Z"},{"value":"0.45689","scoring_system":"epss","scoring_elements":"0.97649","published_at":"2026-05-12T12:55:00Z"},{"value":"0.45689","scoring_system":"epss","scoring_elements":"0.97658","published_at":"2026-05-14T12:55:00Z"},{"value":"0.45689","scoring_system":"epss","scoring_elements":"0.97659","published_at":"2026-05-15T12:55:00Z"},{"value":"0.46813","scoring_system":"epss","scoring_elements":"0.97677","published_at":"2026-04-18T12:55:00Z"},{"value":"0.46813","scoring_system":"epss","scoring_elements":"0.97647","published_at":"2026-04-01T12:55:00Z"},{"value":"0.46813","scoring_system":"epss","scoring_elements":"0.97676","published_at":"2026-04-24T12:55:00Z"},{"value":"0.46813","scoring_system":"epss","scoring_elements":"0.97653","published_at":"2026-04-02T12:55:00Z"},{"value":"0.46813","scoring_system":"epss","scoring_elements":"0.97655","published_at":"2026-04-04T12:55:00Z"},{"value":"0.46813","scoring_system":"epss","scoring_elements":"0.97656","published_at":"2026-04-07T12:55:00Z"},{"value":"0.46813","scoring_system":"epss","scoring_elements":"0.9766","published_at":"2026-04-08T12:55:00Z"},{"value":"0.46813","scoring_system":"epss","scoring_elements":"0.97662","published_at":"2026-04-09T12:55:00Z"},{"value":"0.46813","scoring_system":"epss","scoring_elements":"0.97664","published_at":"2026-04-11T12:55:00Z"},{"value":"0.46813","scoring_system":"epss","scoring_elements":"0.97667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.46813","scoring_system":"epss","scoring_elements":"0.97674","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7237"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7237","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7237"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949997","reference_id":"949997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949997"},{"reference_url":"https://security.gentoo.org/glsa/202003-40","reference_id":"GLSA-202003-40","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-40"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/75782?format=json","purl":"pkg:ebuild/net-analyzer/cacti@1.2.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.9"}],"aliases":["CVE-2020-7237"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uj1s-uuyx-mya5"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.9"}