{"url":"http://public2.vulnerablecode.io/api/packages/78224?format=json","purl":"pkg:ebuild/net-analyzer/cacti@0.8.8h","type":"ebuild","namespace":"net-analyzer","name":"cacti","version":"0.8.8h","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.1.20","latest_non_vulnerable_version":"1.2.26","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50418?format=json","vulnerability_id":"VCID-2wj2-hvma-mqcz","summary":"Multiple vulnerabilities have been found in Cacti, the worst of\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8377","reference_id":"","reference_type":"","scores":[{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.5562","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55546","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55658","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55682","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55659","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55711","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55714","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55723","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55703","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55686","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55725","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55729","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55707","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55632","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.5565","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55626","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55573","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8604"},{"reference_url":"http://seclists.org/fulldisclosure/2015/Dec/57","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2015/Dec/57"},{"reference_url":"http://www.debian.org/security/2016/dsa-3494","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3494"},{"reference_url":"http://www.securitytracker.com/id/1034498","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034498"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8377","reference_id":"CVE-2015-8377","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8377"},{"reference_url":"https://security.gentoo.org/glsa/201607-05","reference_id":"GLSA-201607-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-05"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78224?format=json","purl":"pkg:ebuild/net-analyzer/cacti@0.8.8h","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@0.8.8h"}],"aliases":["CVE-2015-8377"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2wj2-hvma-mqcz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50421?format=json","vulnerability_id":"VCID-3x9k-en7a-nkht","summary":"Multiple vulnerabilities have been found in Cacti, the worst of\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"http://bugs.cacti.net/view.php?id=2673","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.cacti.net/view.php?id=2673"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00074.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00074.html"},{"reference_url":"http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3659","reference_id":"","reference_type":"","scores":[{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69216","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69173","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69032","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69049","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.6907","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69051","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69101","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.6912","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69142","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69127","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69097","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69137","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69146","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69126","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69175","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69184","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00587","scoring_system":"epss","scoring_elements":"0.69192","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3659"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3659"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Apr/4","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Apr/4"},{"reference_url":"http://www.securityfocus.com/bid/85806","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/85806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820521","reference_id":"820521","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820521"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3659","reference_id":"CVE-2016-3659","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3659"},{"reference_url":"https://security.gentoo.org/glsa/201607-05","reference_id":"GLSA-201607-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-05"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78224?format=json","purl":"pkg:ebuild/net-analyzer/cacti@0.8.8h","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@0.8.8h"}],"aliases":["CVE-2016-3659"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3x9k-en7a-nkht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50420?format=json","vulnerability_id":"VCID-7fvn-b8hn-dqeh","summary":"Multiple vulnerabilities have been found in Cacti, the worst of\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"http://bugs.cacti.net/view.php?id=2667","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.cacti.net/view.php?id=2667"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00074.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00074.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3172","reference_id":"","reference_type":"","scores":[{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66266","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66242","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66099","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66141","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66168","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66136","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66185","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66198","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66217","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66204","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66173","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66208","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66222","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66231","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66243","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3172"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3172","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3172"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/03/10/13","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/03/10/13"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/03/15/11","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/03/15/11"},{"reference_url":"http://www.securityfocus.com/bid/84324","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/84324"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818647","reference_id":"818647","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818647"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3172","reference_id":"CVE-2016-3172","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3172"},{"reference_url":"https://security.gentoo.org/glsa/201607-05","reference_id":"GLSA-201607-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-05"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78224?format=json","purl":"pkg:ebuild/net-analyzer/cacti@0.8.8h","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@0.8.8h"}],"aliases":["CVE-2016-3172"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7fvn-b8hn-dqeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50417?format=json","vulnerability_id":"VCID-8pnc-kuf5-jqda","summary":"Multiple vulnerabilities have been found in Cacti, the worst of\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"http://bugs.cacti.net/view.php?id=2646","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.cacti.net/view.php?id=2646"},{"reference_url":"http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8369","reference_id":"","reference_type":"","scores":[{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65852","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65689","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65738","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65768","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65733","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65786","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65817","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65803","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65773","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65807","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65821","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65808","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.6582","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65831","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65805","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8369"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8369","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8369"},{"reference_url":"http://seclists.org/fulldisclosure/2015/Dec/8","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2015/Dec/8"},{"reference_url":"http://www.debian.org/security/2015/dsa-3423","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3423"},{"reference_url":"http://www.securitytracker.com/id/1034497","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034497"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807599","reference_id":"807599","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807599"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8369","reference_id":"CVE-2015-8369","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8369"},{"reference_url":"https://security.gentoo.org/glsa/201607-05","reference_id":"GLSA-201607-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-05"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78224?format=json","purl":"pkg:ebuild/net-analyzer/cacti@0.8.8h","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@0.8.8h"}],"aliases":["CVE-2015-8369"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8pnc-kuf5-jqda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34893?format=json","vulnerability_id":"VCID-9fdf-h49c-5qcj","summary":"Multiple vulnerabilities have been found in Cacti, the worst of\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"http://bugs.cacti.net/view.php?id=2656","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.cacti.net/view.php?id=2656"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00077.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00077.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00078.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00078.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00080.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00080.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2313","reference_id":"","reference_type":"","scores":[{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77914","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77883","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77729","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77736","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77762","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77746","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77774","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77806","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.7779","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77789","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77824","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77819","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.7785","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77858","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01075","scoring_system":"epss","scoring_elements":"0.77873","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2313"},{"reference_url":"http://www.cacti.net/release_notes_0_8_8g.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.cacti.net/release_notes_0_8_8g.php"},{"reference_url":"http://www.securitytracker.com/id/1037745","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1037745"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=814353","reference_id":"814353","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=814353"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2313","reference_id":"CVE-2016-2313","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2313"},{"reference_url":"https://security.gentoo.org/glsa/201607-05","reference_id":"GLSA-201607-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-05"},{"reference_url":"https://security.gentoo.org/glsa/201711-10","reference_id":"GLSA-201711-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-10"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78224?format=json","purl":"pkg:ebuild/net-analyzer/cacti@0.8.8h","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@0.8.8h"},{"url":"http://public2.vulnerablecode.io/api/packages/73947?format=json","purl":"pkg:ebuild/net-analyzer/cacti@1.1.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.1.20"}],"aliases":["CVE-2016-2313"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9fdf-h49c-5qcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50415?format=json","vulnerability_id":"VCID-b8nc-qman-zkcd","summary":"Multiple vulnerabilities have been found in Cacti, the worst of\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5261","reference_id":"","reference_type":"","scores":[{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80108","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79944","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79972","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.7996","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79988","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79997","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80018","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80001","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.79994","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80022","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80023","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80051","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80056","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01337","scoring_system":"epss","scoring_elements":"0.80086","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5261"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1127165","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1127165"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5025","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5025"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5026"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5262","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5262"},{"reference_url":"http://seclists.org/oss-sec/2014/q3/351","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/oss-sec/2014/q3/351"},{"reference_url":"http://seclists.org/oss-sec/2014/q3/386","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/oss-sec/2014/q3/386"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95292","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95292"},{"reference_url":"http://svn.cacti.net/viewvc?view=rev&revision=7454","reference_id":"","reference_type":"","scores":[],"url":"http://svn.cacti.net/viewvc?view=rev&revision=7454"},{"reference_url":"http://www.debian.org/security/2014/dsa-3007","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3007"},{"reference_url":"http://www.securityfocus.com/bid/69213","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69213"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.6e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7g:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7g:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7g:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7i:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7i:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7i:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.8a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.8a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.8a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5261","reference_id":"CVE-2014-5261","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5261"},{"reference_url":"https://security.gentoo.org/glsa/201607-05","reference_id":"GLSA-201607-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-05"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78224?format=json","purl":"pkg:ebuild/net-analyzer/cacti@0.8.8h","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@0.8.8h"}],"aliases":["CVE-2014-5261"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b8nc-qman-zkcd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50419?format=json","vulnerability_id":"VCID-dcnt-ev6f-tydd","summary":"Multiple vulnerabilities have been found in Cacti, the worst of\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"http://bugs.cacti.net/view.php?id=2652","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.cacti.net/view.php?id=2652"},{"reference_url":"http://packetstormsecurity.com/files/135191/Cacti-0.8.8f-graphs_new.php-SQL-Injection.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/135191/Cacti-0.8.8f-graphs_new.php-SQL-Injection.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8604","reference_id":"","reference_type":"","scores":[{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72378","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72348","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72226","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72251","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72227","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72264","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72298","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72282","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72269","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72311","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.7232","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72308","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72351","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.7236","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00712","scoring_system":"epss","scoring_elements":"0.72357","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8377","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8377"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8604"},{"reference_url":"http://seclists.org/fulldisclosure/2016/Jan/16","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2016/Jan/16"},{"reference_url":"http://www.debian.org/security/2016/dsa-3494","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3494"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/04/8","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/04/8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/04/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/04/9"},{"reference_url":"http://www.securitytracker.com/id/1034573","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034573"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8604","reference_id":"CVE-2015-8604","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8604"},{"reference_url":"https://security.gentoo.org/glsa/201607-05","reference_id":"GLSA-201607-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-05"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78224?format=json","purl":"pkg:ebuild/net-analyzer/cacti@0.8.8h","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@0.8.8h"}],"aliases":["CVE-2015-8604"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dcnt-ev6f-tydd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50416?format=json","vulnerability_id":"VCID-w7pb-rt12-y3gs","summary":"Multiple vulnerabilities have been found in Cacti, the worst of\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5262","reference_id":"","reference_type":"","scores":[{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.7347","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73311","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.7332","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73317","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73353","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73367","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.7339","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.7337","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73362","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73412","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73406","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73439","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73451","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73449","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73444","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5262"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1127165","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1127165"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5025","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5025"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5026"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5261","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5261"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5262","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5262"},{"reference_url":"http://seclists.org/oss-sec/2014/q3/351","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/oss-sec/2014/q3/351"},{"reference_url":"http://seclists.org/oss-sec/2014/q3/386","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/oss-sec/2014/q3/386"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95292","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95292"},{"reference_url":"http://svn.cacti.net/viewvc?view=rev&revision=7454","reference_id":"","reference_type":"","scores":[],"url":"http://svn.cacti.net/viewvc?view=rev&revision=7454"},{"reference_url":"http://www.debian.org/security/2014/dsa-3007","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3007"},{"reference_url":"http://www.securityfocus.com/bid/69213","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69213"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.6e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.6e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7g:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7g:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7g:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7i:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.7i:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.7i:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.8a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cacti:cacti:0.8.8a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cacti:cacti:0.8.8a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5262","reference_id":"CVE-2014-5262","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5262"},{"reference_url":"https://security.gentoo.org/glsa/201607-05","reference_id":"GLSA-201607-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-05"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/78224?format=json","purl":"pkg:ebuild/net-analyzer/cacti@0.8.8h","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@0.8.8h"}],"aliases":["CVE-2014-5262"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w7pb-rt12-y3gs"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@0.8.8h"}