Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/net-analyzer/cacti@1.2.26
Typeebuild
Namespacenet-analyzer
Namecacti
Version1.2.26
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-34z4-1zqk-afcm
vulnerability_id VCID-34z4-1zqk-afcm
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39515
reference_id
reference_type
scores
0
value 0.00258
scoring_system epss
scoring_elements 0.4919
published_at 2026-05-14T12:55:00Z
1
value 0.00258
scoring_system epss
scoring_elements 0.49131
published_at 2026-04-02T12:55:00Z
2
value 0.00258
scoring_system epss
scoring_elements 0.49181
published_at 2026-04-11T12:55:00Z
3
value 0.00258
scoring_system epss
scoring_elements 0.49155
published_at 2026-04-12T12:55:00Z
4
value 0.00258
scoring_system epss
scoring_elements 0.4916
published_at 2026-04-13T12:55:00Z
5
value 0.00258
scoring_system epss
scoring_elements 0.49207
published_at 2026-04-16T12:55:00Z
6
value 0.00258
scoring_system epss
scoring_elements 0.49205
published_at 2026-04-18T12:55:00Z
7
value 0.00258
scoring_system epss
scoring_elements 0.49174
published_at 2026-04-21T12:55:00Z
8
value 0.00258
scoring_system epss
scoring_elements 0.49173
published_at 2026-04-26T12:55:00Z
9
value 0.00258
scoring_system epss
scoring_elements 0.4913
published_at 2026-04-29T12:55:00Z
10
value 0.00258
scoring_system epss
scoring_elements 0.49046
published_at 2026-05-05T12:55:00Z
11
value 0.00258
scoring_system epss
scoring_elements 0.4911
published_at 2026-05-07T12:55:00Z
12
value 0.00258
scoring_system epss
scoring_elements 0.49138
published_at 2026-05-09T12:55:00Z
13
value 0.00258
scoring_system epss
scoring_elements 0.49086
published_at 2026-05-11T12:55:00Z
14
value 0.00258
scoring_system epss
scoring_elements 0.49114
published_at 2026-05-12T12:55:00Z
15
value 0.00258
scoring_system epss
scoring_elements 0.49161
published_at 2026-04-04T12:55:00Z
16
value 0.00258
scoring_system epss
scoring_elements 0.49113
published_at 2026-04-07T12:55:00Z
17
value 0.00258
scoring_system epss
scoring_elements 0.49167
published_at 2026-04-08T12:55:00Z
18
value 0.00258
scoring_system epss
scoring_elements 0.49164
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39515
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39357
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39359
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39361
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39362
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39364
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39365
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39515
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39516
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
reference_id CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-25T14:25:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
11
reference_url https://www.debian.org/security/2023/dsa-5550
reference_id dsa-5550
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-25T14:25:41Z/
url https://www.debian.org/security/2023/dsa-5550
12
reference_url https://github.com/Cacti/cacti/security/advisories/GHSA-hrg9-qqqx-wc4h
reference_id GHSA-hrg9-qqqx-wc4h
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-25T14:25:41Z/
url https://github.com/Cacti/cacti/security/advisories/GHSA-hrg9-qqqx-wc4h
13
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
14
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-25T14:25:41Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
reference_id WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-25T14:25:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
reference_id WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-25T14:25:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2023-39515
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-34z4-1zqk-afcm
1
url VCID-5ykb-6nvx-k3e4
vulnerability_id VCID-5ykb-6nvx-k3e4
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39362
reference_id
reference_type
scores
0
value 0.87228
scoring_system epss
scoring_elements 0.99443
published_at 2026-04-02T12:55:00Z
1
value 0.87228
scoring_system epss
scoring_elements 0.99445
published_at 2026-04-04T12:55:00Z
2
value 0.87228
scoring_system epss
scoring_elements 0.99446
published_at 2026-04-07T12:55:00Z
3
value 0.87228
scoring_system epss
scoring_elements 0.99447
published_at 2026-04-09T12:55:00Z
4
value 0.87228
scoring_system epss
scoring_elements 0.99448
published_at 2026-04-11T12:55:00Z
5
value 0.87228
scoring_system epss
scoring_elements 0.99449
published_at 2026-04-13T12:55:00Z
6
value 0.87228
scoring_system epss
scoring_elements 0.99452
published_at 2026-04-18T12:55:00Z
7
value 0.87228
scoring_system epss
scoring_elements 0.99453
published_at 2026-04-21T12:55:00Z
8
value 0.87228
scoring_system epss
scoring_elements 0.99454
published_at 2026-04-29T12:55:00Z
9
value 0.87228
scoring_system epss
scoring_elements 0.99455
published_at 2026-04-26T12:55:00Z
10
value 0.87228
scoring_system epss
scoring_elements 0.99456
published_at 2026-05-07T12:55:00Z
11
value 0.87228
scoring_system epss
scoring_elements 0.99458
published_at 2026-05-11T12:55:00Z
12
value 0.87228
scoring_system epss
scoring_elements 0.99459
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39362
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39357
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39359
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39361
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39362
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39364
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39365
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39515
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39516
9
reference_url http://packetstormsecurity.com/files/175029/Cacti-1.2.24-Command-Injection.html
reference_id Cacti-1.2.24-Command-Injection.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-27T20:32:39Z/
url http://packetstormsecurity.com/files/175029/Cacti-1.2.24-Command-Injection.html
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
reference_id CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-27T20:32:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/51740.txt
reference_id CVE-2023-39362
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/51740.txt
12
reference_url https://www.debian.org/security/2023/dsa-5550
reference_id dsa-5550
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-27T20:32:39Z/
url https://www.debian.org/security/2023/dsa-5550
13
reference_url https://github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp
reference_id GHSA-g6ff-58cj-x3cp
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-27T20:32:39Z/
url https://github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp
14
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
15
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-27T20:32:39Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
reference_id WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-27T20:32:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
reference_id WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-02-27T20:32:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2023-39362
risk_score 10.0
exploitability 2.0
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ykb-6nvx-k3e4
2
url VCID-a4qr-bw5v-t3hx
vulnerability_id VCID-a4qr-bw5v-t3hx
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-31132
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.30441
published_at 2026-05-14T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30574
published_at 2026-04-26T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.3049
published_at 2026-04-29T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30349
published_at 2026-05-05T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.30419
published_at 2026-05-07T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30427
published_at 2026-05-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30351
published_at 2026-05-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30374
published_at 2026-05-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.31006
published_at 2026-04-02T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.31054
published_at 2026-04-04T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30872
published_at 2026-04-07T12:55:00Z
11
value 0.00119
scoring_system epss
scoring_elements 0.3093
published_at 2026-04-08T12:55:00Z
12
value 0.00119
scoring_system epss
scoring_elements 0.3096
published_at 2026-04-09T12:55:00Z
13
value 0.00119
scoring_system epss
scoring_elements 0.30964
published_at 2026-04-11T12:55:00Z
14
value 0.00119
scoring_system epss
scoring_elements 0.30921
published_at 2026-04-12T12:55:00Z
15
value 0.00119
scoring_system epss
scoring_elements 0.30876
published_at 2026-04-13T12:55:00Z
16
value 0.00119
scoring_system epss
scoring_elements 0.30907
published_at 2026-04-16T12:55:00Z
17
value 0.00119
scoring_system epss
scoring_elements 0.30887
published_at 2026-04-18T12:55:00Z
18
value 0.00119
scoring_system epss
scoring_elements 0.30853
published_at 2026-04-21T12:55:00Z
19
value 0.00119
scoring_system epss
scoring_elements 0.3069
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-31132
1
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
reference_id CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:08:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
2
reference_url https://github.com/Cacti/cacti/security/advisories/GHSA-rf5w-pq3f-9876
reference_id GHSA-rf5w-pq3f-9876
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:08:43Z/
url https://github.com/Cacti/cacti/security/advisories/GHSA-rf5w-pq3f-9876
3
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
reference_id WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:08:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
reference_id WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:08:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2023-31132
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a4qr-bw5v-t3hx
3
url VCID-c2b8-ss11-9yhq
vulnerability_id VCID-c2b8-ss11-9yhq
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39360
reference_id
reference_type
scores
0
value 0.00629
scoring_system epss
scoring_elements 0.70215
published_at 2026-04-02T12:55:00Z
1
value 0.00629
scoring_system epss
scoring_elements 0.70232
published_at 2026-04-04T12:55:00Z
2
value 0.00629
scoring_system epss
scoring_elements 0.70209
published_at 2026-04-07T12:55:00Z
3
value 0.00629
scoring_system epss
scoring_elements 0.70255
published_at 2026-04-08T12:55:00Z
4
value 0.00629
scoring_system epss
scoring_elements 0.7027
published_at 2026-04-09T12:55:00Z
5
value 0.00629
scoring_system epss
scoring_elements 0.70294
published_at 2026-04-11T12:55:00Z
6
value 0.00629
scoring_system epss
scoring_elements 0.70279
published_at 2026-04-12T12:55:00Z
7
value 0.00629
scoring_system epss
scoring_elements 0.70267
published_at 2026-04-13T12:55:00Z
8
value 0.00629
scoring_system epss
scoring_elements 0.70308
published_at 2026-04-16T12:55:00Z
9
value 0.00629
scoring_system epss
scoring_elements 0.70317
published_at 2026-04-18T12:55:00Z
10
value 0.00629
scoring_system epss
scoring_elements 0.70298
published_at 2026-04-21T12:55:00Z
11
value 0.00629
scoring_system epss
scoring_elements 0.70351
published_at 2026-04-24T12:55:00Z
12
value 0.00629
scoring_system epss
scoring_elements 0.70359
published_at 2026-04-26T12:55:00Z
13
value 0.00629
scoring_system epss
scoring_elements 0.70357
published_at 2026-04-29T12:55:00Z
14
value 0.00629
scoring_system epss
scoring_elements 0.7033
published_at 2026-05-05T12:55:00Z
15
value 0.00629
scoring_system epss
scoring_elements 0.70372
published_at 2026-05-11T12:55:00Z
16
value 0.00629
scoring_system epss
scoring_elements 0.70403
published_at 2026-05-09T12:55:00Z
17
value 0.00629
scoring_system epss
scoring_elements 0.70398
published_at 2026-05-12T12:55:00Z
18
value 0.00629
scoring_system epss
scoring_elements 0.7045
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39360
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39360
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39513
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49084
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49085
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49086
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49086
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49088
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49088
7
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2023-39360
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c2b8-ss11-9yhq
4
url VCID-d7t8-6cty-sqde
vulnerability_id VCID-d7t8-6cty-sqde
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39358
reference_id
reference_type
scores
0
value 0.03993
scoring_system epss
scoring_elements 0.88528
published_at 2026-05-14T12:55:00Z
1
value 0.03993
scoring_system epss
scoring_elements 0.88443
published_at 2026-04-24T12:55:00Z
2
value 0.03993
scoring_system epss
scoring_elements 0.88447
published_at 2026-04-29T12:55:00Z
3
value 0.03993
scoring_system epss
scoring_elements 0.88459
published_at 2026-05-05T12:55:00Z
4
value 0.03993
scoring_system epss
scoring_elements 0.88476
published_at 2026-05-07T12:55:00Z
5
value 0.03993
scoring_system epss
scoring_elements 0.8849
published_at 2026-05-09T12:55:00Z
6
value 0.03993
scoring_system epss
scoring_elements 0.88488
published_at 2026-05-11T12:55:00Z
7
value 0.03993
scoring_system epss
scoring_elements 0.88501
published_at 2026-05-12T12:55:00Z
8
value 0.03993
scoring_system epss
scoring_elements 0.88376
published_at 2026-04-02T12:55:00Z
9
value 0.03993
scoring_system epss
scoring_elements 0.88385
published_at 2026-04-04T12:55:00Z
10
value 0.03993
scoring_system epss
scoring_elements 0.88389
published_at 2026-04-07T12:55:00Z
11
value 0.03993
scoring_system epss
scoring_elements 0.88408
published_at 2026-04-08T12:55:00Z
12
value 0.03993
scoring_system epss
scoring_elements 0.88415
published_at 2026-04-09T12:55:00Z
13
value 0.03993
scoring_system epss
scoring_elements 0.88425
published_at 2026-04-11T12:55:00Z
14
value 0.03993
scoring_system epss
scoring_elements 0.88418
published_at 2026-04-12T12:55:00Z
15
value 0.03993
scoring_system epss
scoring_elements 0.88417
published_at 2026-04-13T12:55:00Z
16
value 0.03993
scoring_system epss
scoring_elements 0.88432
published_at 2026-04-16T12:55:00Z
17
value 0.03993
scoring_system epss
scoring_elements 0.88428
published_at 2026-04-18T12:55:00Z
18
value 0.03993
scoring_system epss
scoring_elements 0.88426
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39358
1
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
reference_id CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:08:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
2
reference_url https://github.com/Cacti/cacti/security/advisories/GHSA-gj95-7xr8-9p7g
reference_id GHSA-gj95-7xr8-9p7g
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:08:55Z/
url https://github.com/Cacti/cacti/security/advisories/GHSA-gj95-7xr8-9p7g
3
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
reference_id WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:08:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
reference_id WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:08:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2023-39358
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d7t8-6cty-sqde
5
url VCID-h6vp-37u4-b7f3
vulnerability_id VCID-h6vp-37u4-b7f3
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39510
reference_id
reference_type
scores
0
value 0.00493
scoring_system epss
scoring_elements 0.65883
published_at 2026-05-14T12:55:00Z
1
value 0.00493
scoring_system epss
scoring_elements 0.65713
published_at 2026-04-13T12:55:00Z
2
value 0.00493
scoring_system epss
scoring_elements 0.65747
published_at 2026-04-21T12:55:00Z
3
value 0.00493
scoring_system epss
scoring_elements 0.65761
published_at 2026-04-24T12:55:00Z
4
value 0.00493
scoring_system epss
scoring_elements 0.65771
published_at 2026-04-29T12:55:00Z
5
value 0.00493
scoring_system epss
scoring_elements 0.65744
published_at 2026-05-05T12:55:00Z
6
value 0.00493
scoring_system epss
scoring_elements 0.65793
published_at 2026-05-07T12:55:00Z
7
value 0.00493
scoring_system epss
scoring_elements 0.65837
published_at 2026-05-09T12:55:00Z
8
value 0.00493
scoring_system epss
scoring_elements 0.65808
published_at 2026-05-11T12:55:00Z
9
value 0.00493
scoring_system epss
scoring_elements 0.65827
published_at 2026-05-12T12:55:00Z
10
value 0.00493
scoring_system epss
scoring_elements 0.65677
published_at 2026-04-02T12:55:00Z
11
value 0.00493
scoring_system epss
scoring_elements 0.65707
published_at 2026-04-04T12:55:00Z
12
value 0.00493
scoring_system epss
scoring_elements 0.65672
published_at 2026-04-07T12:55:00Z
13
value 0.00493
scoring_system epss
scoring_elements 0.65723
published_at 2026-04-08T12:55:00Z
14
value 0.00493
scoring_system epss
scoring_elements 0.65735
published_at 2026-04-09T12:55:00Z
15
value 0.00493
scoring_system epss
scoring_elements 0.65757
published_at 2026-04-11T12:55:00Z
16
value 0.00493
scoring_system epss
scoring_elements 0.65742
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39510
1
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
reference_id CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:21:00Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
2
reference_url https://www.debian.org/security/2023/dsa-5550
reference_id dsa-5550
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:21:00Z/
url https://www.debian.org/security/2023/dsa-5550
3
reference_url https://github.com/Cacti/cacti/security/advisories/GHSA-24w4-4hp2-3j8h
reference_id GHSA-24w4-4hp2-3j8h
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:21:00Z/
url https://github.com/Cacti/cacti/security/advisories/GHSA-24w4-4hp2-3j8h
4
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
reference_id WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:21:00Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
reference_id WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:21:00Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2023-39510
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h6vp-37u4-b7f3
6
url VCID-hdjk-szxs-5bdu
vulnerability_id VCID-hdjk-szxs-5bdu
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14424
reference_id
reference_type
scores
0
value 0.00388
scoring_system epss
scoring_elements 0.59781
published_at 2026-04-01T12:55:00Z
1
value 0.00388
scoring_system epss
scoring_elements 0.59857
published_at 2026-04-02T12:55:00Z
2
value 0.00388
scoring_system epss
scoring_elements 0.59882
published_at 2026-04-04T12:55:00Z
3
value 0.00388
scoring_system epss
scoring_elements 0.59852
published_at 2026-04-07T12:55:00Z
4
value 0.00388
scoring_system epss
scoring_elements 0.59903
published_at 2026-04-24T12:55:00Z
5
value 0.00388
scoring_system epss
scoring_elements 0.59916
published_at 2026-05-07T12:55:00Z
6
value 0.00388
scoring_system epss
scoring_elements 0.59938
published_at 2026-04-11T12:55:00Z
7
value 0.00388
scoring_system epss
scoring_elements 0.59922
published_at 2026-04-12T12:55:00Z
8
value 0.00388
scoring_system epss
scoring_elements 0.59904
published_at 2026-04-13T12:55:00Z
9
value 0.00388
scoring_system epss
scoring_elements 0.59943
published_at 2026-04-16T12:55:00Z
10
value 0.00388
scoring_system epss
scoring_elements 0.59949
published_at 2026-04-18T12:55:00Z
11
value 0.00388
scoring_system epss
scoring_elements 0.59934
published_at 2026-04-21T12:55:00Z
12
value 0.00388
scoring_system epss
scoring_elements 0.59921
published_at 2026-04-26T12:55:00Z
13
value 0.00388
scoring_system epss
scoring_elements 0.59908
published_at 2026-04-29T12:55:00Z
14
value 0.00388
scoring_system epss
scoring_elements 0.59869
published_at 2026-05-05T12:55:00Z
15
value 0.00388
scoring_system epss
scoring_elements 0.59973
published_at 2026-05-09T12:55:00Z
16
value 0.00388
scoring_system epss
scoring_elements 0.5993
published_at 2026-05-11T12:55:00Z
17
value 0.00388
scoring_system epss
scoring_elements 0.59957
published_at 2026-05-12T12:55:00Z
18
value 0.00388
scoring_system epss
scoring_elements 0.6002
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14424
1
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
2
reference_url https://usn.ubuntu.com/USN-5214-1/
reference_id USN-USN-5214-1
reference_type
scores
url https://usn.ubuntu.com/USN-5214-1/
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2020-14424
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hdjk-szxs-5bdu
7
url VCID-huf2-qwju-6bf2
vulnerability_id VCID-huf2-qwju-6bf2
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39365
reference_id
reference_type
scores
0
value 0.0017
scoring_system epss
scoring_elements 0.3784
published_at 2026-05-14T12:55:00Z
1
value 0.0017
scoring_system epss
scoring_elements 0.38281
published_at 2026-04-16T12:55:00Z
2
value 0.0017
scoring_system epss
scoring_elements 0.3826
published_at 2026-04-18T12:55:00Z
3
value 0.0017
scoring_system epss
scoring_elements 0.38196
published_at 2026-04-21T12:55:00Z
4
value 0.0017
scoring_system epss
scoring_elements 0.38031
published_at 2026-04-24T12:55:00Z
5
value 0.0017
scoring_system epss
scoring_elements 0.38007
published_at 2026-04-26T12:55:00Z
6
value 0.0017
scoring_system epss
scoring_elements 0.37911
published_at 2026-04-29T12:55:00Z
7
value 0.0017
scoring_system epss
scoring_elements 0.37795
published_at 2026-05-05T12:55:00Z
8
value 0.0017
scoring_system epss
scoring_elements 0.37863
published_at 2026-05-07T12:55:00Z
9
value 0.0017
scoring_system epss
scoring_elements 0.37876
published_at 2026-05-09T12:55:00Z
10
value 0.0017
scoring_system epss
scoring_elements 0.37788
published_at 2026-05-11T12:55:00Z
11
value 0.0017
scoring_system epss
scoring_elements 0.37763
published_at 2026-05-12T12:55:00Z
12
value 0.0017
scoring_system epss
scoring_elements 0.38327
published_at 2026-04-02T12:55:00Z
13
value 0.0017
scoring_system epss
scoring_elements 0.38352
published_at 2026-04-04T12:55:00Z
14
value 0.0017
scoring_system epss
scoring_elements 0.38217
published_at 2026-04-07T12:55:00Z
15
value 0.0017
scoring_system epss
scoring_elements 0.38267
published_at 2026-04-08T12:55:00Z
16
value 0.0017
scoring_system epss
scoring_elements 0.38275
published_at 2026-04-09T12:55:00Z
17
value 0.0017
scoring_system epss
scoring_elements 0.38294
published_at 2026-04-11T12:55:00Z
18
value 0.0017
scoring_system epss
scoring_elements 0.38258
published_at 2026-04-12T12:55:00Z
19
value 0.0017
scoring_system epss
scoring_elements 0.38234
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39365
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39357
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39359
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39361
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39362
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39364
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39365
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39515
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39516
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
reference_id CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T17:26:49Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
10
reference_url https://www.debian.org/security/2023/dsa-5550
reference_id dsa-5550
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T17:26:49Z/
url https://www.debian.org/security/2023/dsa-5550
11
reference_url https://github.com/Cacti/cacti/security/advisories/GHSA-v5w7-hww7-2f22
reference_id GHSA-v5w7-hww7-2f22
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T17:26:49Z/
url https://github.com/Cacti/cacti/security/advisories/GHSA-v5w7-hww7-2f22
12
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
13
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T17:26:49Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
reference_id WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T17:26:49Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
reference_id WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T17:26:49Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2023-39365
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-huf2-qwju-6bf2
8
url VCID-jmv3-vh81-zfdq
vulnerability_id VCID-jmv3-vh81-zfdq
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48547
reference_id
reference_type
scores
0
value 0.00467
scoring_system epss
scoring_elements 0.6462
published_at 2026-05-14T12:55:00Z
1
value 0.00467
scoring_system epss
scoring_elements 0.64409
published_at 2026-04-02T12:55:00Z
2
value 0.00467
scoring_system epss
scoring_elements 0.64438
published_at 2026-04-04T12:55:00Z
3
value 0.00467
scoring_system epss
scoring_elements 0.64398
published_at 2026-04-07T12:55:00Z
4
value 0.00467
scoring_system epss
scoring_elements 0.64446
published_at 2026-04-08T12:55:00Z
5
value 0.00467
scoring_system epss
scoring_elements 0.64462
published_at 2026-04-12T12:55:00Z
6
value 0.00467
scoring_system epss
scoring_elements 0.64474
published_at 2026-04-11T12:55:00Z
7
value 0.00467
scoring_system epss
scoring_elements 0.64434
published_at 2026-04-13T12:55:00Z
8
value 0.00467
scoring_system epss
scoring_elements 0.64468
published_at 2026-04-16T12:55:00Z
9
value 0.00467
scoring_system epss
scoring_elements 0.6448
published_at 2026-05-05T12:55:00Z
10
value 0.00467
scoring_system epss
scoring_elements 0.64472
published_at 2026-04-21T12:55:00Z
11
value 0.00467
scoring_system epss
scoring_elements 0.64493
published_at 2026-04-24T12:55:00Z
12
value 0.00467
scoring_system epss
scoring_elements 0.64506
published_at 2026-04-29T12:55:00Z
13
value 0.00467
scoring_system epss
scoring_elements 0.64527
published_at 2026-05-07T12:55:00Z
14
value 0.00467
scoring_system epss
scoring_elements 0.64572
published_at 2026-05-09T12:55:00Z
15
value 0.00467
scoring_system epss
scoring_elements 0.64543
published_at 2026-05-11T12:55:00Z
16
value 0.00467
scoring_system epss
scoring_elements 0.64566
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48547
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48547
2
reference_url https://github.com/Cacti/cacti/issues/1882
reference_id 1882
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T14:09:10Z/
url https://github.com/Cacti/cacti/issues/1882
3
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2022-48547
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jmv3-vh81-zfdq
9
url VCID-pau5-hfbv-nucp
vulnerability_id VCID-pau5-hfbv-nucp
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39513
reference_id
reference_type
scores
0
value 0.00296
scoring_system epss
scoring_elements 0.52839
published_at 2026-04-02T12:55:00Z
1
value 0.00296
scoring_system epss
scoring_elements 0.52865
published_at 2026-04-04T12:55:00Z
2
value 0.00296
scoring_system epss
scoring_elements 0.52832
published_at 2026-04-07T12:55:00Z
3
value 0.00296
scoring_system epss
scoring_elements 0.52884
published_at 2026-04-08T12:55:00Z
4
value 0.00296
scoring_system epss
scoring_elements 0.52878
published_at 2026-04-09T12:55:00Z
5
value 0.00296
scoring_system epss
scoring_elements 0.52928
published_at 2026-04-11T12:55:00Z
6
value 0.00296
scoring_system epss
scoring_elements 0.52912
published_at 2026-04-12T12:55:00Z
7
value 0.00296
scoring_system epss
scoring_elements 0.52895
published_at 2026-04-13T12:55:00Z
8
value 0.00296
scoring_system epss
scoring_elements 0.52933
published_at 2026-04-16T12:55:00Z
9
value 0.00296
scoring_system epss
scoring_elements 0.5294
published_at 2026-04-18T12:55:00Z
10
value 0.00296
scoring_system epss
scoring_elements 0.52923
published_at 2026-04-21T12:55:00Z
11
value 0.00296
scoring_system epss
scoring_elements 0.5289
published_at 2026-04-24T12:55:00Z
12
value 0.00296
scoring_system epss
scoring_elements 0.529
published_at 2026-04-26T12:55:00Z
13
value 0.00296
scoring_system epss
scoring_elements 0.52862
published_at 2026-04-29T12:55:00Z
14
value 0.00296
scoring_system epss
scoring_elements 0.52812
published_at 2026-05-05T12:55:00Z
15
value 0.00296
scoring_system epss
scoring_elements 0.52863
published_at 2026-05-07T12:55:00Z
16
value 0.00296
scoring_system epss
scoring_elements 0.52906
published_at 2026-05-09T12:55:00Z
17
value 0.00296
scoring_system epss
scoring_elements 0.52872
published_at 2026-05-11T12:55:00Z
18
value 0.00296
scoring_system epss
scoring_elements 0.52898
published_at 2026-05-12T12:55:00Z
19
value 0.00296
scoring_system epss
scoring_elements 0.52971
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39513
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39360
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39513
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49084
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49085
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49086
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49086
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49088
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49088
7
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2023-39513
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pau5-hfbv-nucp
10
url VCID-pxqa-nkv3-jqfs
vulnerability_id VCID-pxqa-nkv3-jqfs
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-30534
reference_id
reference_type
scores
0
value 0.48534
scoring_system epss
scoring_elements 0.97733
published_at 2026-04-02T12:55:00Z
1
value 0.48534
scoring_system epss
scoring_elements 0.97735
published_at 2026-04-07T12:55:00Z
2
value 0.48534
scoring_system epss
scoring_elements 0.9774
published_at 2026-04-08T12:55:00Z
3
value 0.48534
scoring_system epss
scoring_elements 0.97744
published_at 2026-04-09T12:55:00Z
4
value 0.48534
scoring_system epss
scoring_elements 0.97746
published_at 2026-04-11T12:55:00Z
5
value 0.48534
scoring_system epss
scoring_elements 0.97749
published_at 2026-04-12T12:55:00Z
6
value 0.48534
scoring_system epss
scoring_elements 0.9775
published_at 2026-04-13T12:55:00Z
7
value 0.48534
scoring_system epss
scoring_elements 0.97756
published_at 2026-04-16T12:55:00Z
8
value 0.48534
scoring_system epss
scoring_elements 0.97759
published_at 2026-04-26T12:55:00Z
9
value 0.48534
scoring_system epss
scoring_elements 0.97758
published_at 2026-04-24T12:55:00Z
10
value 0.5495
scoring_system epss
scoring_elements 0.98065
published_at 2026-05-07T12:55:00Z
11
value 0.5495
scoring_system epss
scoring_elements 0.98066
published_at 2026-05-11T12:55:00Z
12
value 0.5495
scoring_system epss
scoring_elements 0.98069
published_at 2026-05-12T12:55:00Z
13
value 0.5495
scoring_system epss
scoring_elements 0.98074
published_at 2026-05-14T12:55:00Z
14
value 0.5495
scoring_system epss
scoring_elements 0.9806
published_at 2026-04-29T12:55:00Z
15
value 0.5495
scoring_system epss
scoring_elements 0.98068
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-30534
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30534
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
reference_id CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:08:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
3
reference_url https://www.fastly.com/blog/cve-2023-30534-insecure-deserialization-in-cacti-prior-to-1-2-25
reference_id cve-2023-30534-insecure-deserialization-in-cacti-prior-to-1-2-25
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:08:26Z/
url https://www.fastly.com/blog/cve-2023-30534-insecure-deserialization-in-cacti-prior-to-1-2-25
4
reference_url https://github.com/Cacti/cacti/security/advisories/GHSA-77rf-774j-6h3p
reference_id GHSA-77rf-774j-6h3p
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:08:26Z/
url https://github.com/Cacti/cacti/security/advisories/GHSA-77rf-774j-6h3p
5
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
reference_id WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:08:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
reference_id WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:08:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2023-30534
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pxqa-nkv3-jqfs
11
url VCID-sb43-hapb-1uf2
vulnerability_id VCID-sb43-hapb-1uf2
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39357
reference_id
reference_type
scores
0
value 0.03246
scoring_system epss
scoring_elements 0.87071
published_at 2026-04-02T12:55:00Z
1
value 0.03246
scoring_system epss
scoring_elements 0.8709
published_at 2026-04-04T12:55:00Z
2
value 0.03246
scoring_system epss
scoring_elements 0.87083
published_at 2026-04-07T12:55:00Z
3
value 0.03246
scoring_system epss
scoring_elements 0.87103
published_at 2026-04-08T12:55:00Z
4
value 0.03246
scoring_system epss
scoring_elements 0.87111
published_at 2026-04-09T12:55:00Z
5
value 0.03246
scoring_system epss
scoring_elements 0.87124
published_at 2026-04-11T12:55:00Z
6
value 0.03246
scoring_system epss
scoring_elements 0.87119
published_at 2026-04-12T12:55:00Z
7
value 0.03246
scoring_system epss
scoring_elements 0.87114
published_at 2026-04-13T12:55:00Z
8
value 0.03246
scoring_system epss
scoring_elements 0.8713
published_at 2026-04-16T12:55:00Z
9
value 0.03246
scoring_system epss
scoring_elements 0.87134
published_at 2026-04-18T12:55:00Z
10
value 0.03246
scoring_system epss
scoring_elements 0.87131
published_at 2026-04-21T12:55:00Z
11
value 0.03246
scoring_system epss
scoring_elements 0.8715
published_at 2026-04-24T12:55:00Z
12
value 0.03246
scoring_system epss
scoring_elements 0.87156
published_at 2026-04-26T12:55:00Z
13
value 0.03246
scoring_system epss
scoring_elements 0.87157
published_at 2026-04-29T12:55:00Z
14
value 0.03246
scoring_system epss
scoring_elements 0.87177
published_at 2026-05-05T12:55:00Z
15
value 0.03246
scoring_system epss
scoring_elements 0.87193
published_at 2026-05-07T12:55:00Z
16
value 0.03246
scoring_system epss
scoring_elements 0.87211
published_at 2026-05-09T12:55:00Z
17
value 0.03246
scoring_system epss
scoring_elements 0.87206
published_at 2026-05-11T12:55:00Z
18
value 0.03246
scoring_system epss
scoring_elements 0.87222
published_at 2026-05-12T12:55:00Z
19
value 0.03246
scoring_system epss
scoring_elements 0.87257
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39357
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39357
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39359
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39361
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39362
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39364
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39365
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39515
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39516
9
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2023-39357
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sb43-hapb-1uf2
12
url VCID-vsjt-qjyw-hbfs
vulnerability_id VCID-vsjt-qjyw-hbfs
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39359
reference_id
reference_type
scores
0
value 0.04724
scoring_system epss
scoring_elements 0.89498
published_at 2026-05-14T12:55:00Z
1
value 0.04724
scoring_system epss
scoring_elements 0.89405
published_at 2026-04-21T12:55:00Z
2
value 0.04724
scoring_system epss
scoring_elements 0.89406
published_at 2026-04-18T12:55:00Z
3
value 0.04724
scoring_system epss
scoring_elements 0.89422
published_at 2026-04-24T12:55:00Z
4
value 0.04724
scoring_system epss
scoring_elements 0.89427
published_at 2026-04-26T12:55:00Z
5
value 0.04724
scoring_system epss
scoring_elements 0.89428
published_at 2026-04-29T12:55:00Z
6
value 0.04724
scoring_system epss
scoring_elements 0.89436
published_at 2026-05-05T12:55:00Z
7
value 0.04724
scoring_system epss
scoring_elements 0.89455
published_at 2026-05-07T12:55:00Z
8
value 0.04724
scoring_system epss
scoring_elements 0.89468
published_at 2026-05-11T12:55:00Z
9
value 0.04724
scoring_system epss
scoring_elements 0.89478
published_at 2026-05-12T12:55:00Z
10
value 0.04724
scoring_system epss
scoring_elements 0.89353
published_at 2026-04-02T12:55:00Z
11
value 0.04724
scoring_system epss
scoring_elements 0.89365
published_at 2026-04-04T12:55:00Z
12
value 0.04724
scoring_system epss
scoring_elements 0.89368
published_at 2026-04-07T12:55:00Z
13
value 0.04724
scoring_system epss
scoring_elements 0.89385
published_at 2026-04-08T12:55:00Z
14
value 0.04724
scoring_system epss
scoring_elements 0.89388
published_at 2026-04-09T12:55:00Z
15
value 0.04724
scoring_system epss
scoring_elements 0.89397
published_at 2026-04-11T12:55:00Z
16
value 0.04724
scoring_system epss
scoring_elements 0.89394
published_at 2026-04-12T12:55:00Z
17
value 0.04724
scoring_system epss
scoring_elements 0.8939
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39359
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39357
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39359
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39361
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39362
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39364
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39365
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39515
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39516
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
reference_id CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:20:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
10
reference_url https://www.debian.org/security/2023/dsa-5550
reference_id dsa-5550
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:20:26Z/
url https://www.debian.org/security/2023/dsa-5550
11
reference_url https://github.com/Cacti/cacti/security/advisories/GHSA-q4wh-3f9w-836h
reference_id GHSA-q4wh-3f9w-836h
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:20:26Z/
url https://github.com/Cacti/cacti/security/advisories/GHSA-q4wh-3f9w-836h
12
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
reference_id WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:20:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
reference_id WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:20:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2023-39359
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vsjt-qjyw-hbfs
13
url VCID-w11p-1pr3-7ybp
vulnerability_id VCID-w11p-1pr3-7ybp
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39511
reference_id
reference_type
scores
0
value 0.00561
scoring_system epss
scoring_elements 0.68478
published_at 2026-05-14T12:55:00Z
1
value 0.00561
scoring_system epss
scoring_elements 0.68358
published_at 2026-04-24T12:55:00Z
2
value 0.00561
scoring_system epss
scoring_elements 0.68366
published_at 2026-04-26T12:55:00Z
3
value 0.00561
scoring_system epss
scoring_elements 0.68371
published_at 2026-04-29T12:55:00Z
4
value 0.00561
scoring_system epss
scoring_elements 0.68349
published_at 2026-05-05T12:55:00Z
5
value 0.00561
scoring_system epss
scoring_elements 0.68392
published_at 2026-05-11T12:55:00Z
6
value 0.00561
scoring_system epss
scoring_elements 0.68428
published_at 2026-05-09T12:55:00Z
7
value 0.00561
scoring_system epss
scoring_elements 0.68419
published_at 2026-05-12T12:55:00Z
8
value 0.00561
scoring_system epss
scoring_elements 0.68243
published_at 2026-04-02T12:55:00Z
9
value 0.00561
scoring_system epss
scoring_elements 0.68262
published_at 2026-04-04T12:55:00Z
10
value 0.00561
scoring_system epss
scoring_elements 0.68238
published_at 2026-04-07T12:55:00Z
11
value 0.00561
scoring_system epss
scoring_elements 0.68288
published_at 2026-04-08T12:55:00Z
12
value 0.00561
scoring_system epss
scoring_elements 0.68304
published_at 2026-04-09T12:55:00Z
13
value 0.00561
scoring_system epss
scoring_elements 0.6833
published_at 2026-04-11T12:55:00Z
14
value 0.00561
scoring_system epss
scoring_elements 0.68318
published_at 2026-04-12T12:55:00Z
15
value 0.00561
scoring_system epss
scoring_elements 0.68285
published_at 2026-04-13T12:55:00Z
16
value 0.00561
scoring_system epss
scoring_elements 0.68324
published_at 2026-04-16T12:55:00Z
17
value 0.00561
scoring_system epss
scoring_elements 0.68335
published_at 2026-04-18T12:55:00Z
18
value 0.00561
scoring_system epss
scoring_elements 0.68315
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39511
1
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
reference_id CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T20:03:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
2
reference_url https://github.com/Cacti/cacti/security/advisories/GHSA-5hpr-4hhc-8q42
reference_id GHSA-5hpr-4hhc-8q42
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T20:03:12Z/
url https://github.com/Cacti/cacti/security/advisories/GHSA-5hpr-4hhc-8q42
3
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
reference_id WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T20:03:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
reference_id WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T20:03:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2023-39511
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w11p-1pr3-7ybp
14
url VCID-ws4h-295a-9qgx
vulnerability_id VCID-ws4h-295a-9qgx
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39516
reference_id
reference_type
scores
0
value 0.00284
scoring_system epss
scoring_elements 0.51728
published_at 2026-04-02T12:55:00Z
1
value 0.00284
scoring_system epss
scoring_elements 0.51754
published_at 2026-04-04T12:55:00Z
2
value 0.00284
scoring_system epss
scoring_elements 0.51714
published_at 2026-04-07T12:55:00Z
3
value 0.00284
scoring_system epss
scoring_elements 0.51768
published_at 2026-04-08T12:55:00Z
4
value 0.00284
scoring_system epss
scoring_elements 0.51765
published_at 2026-05-09T12:55:00Z
5
value 0.00284
scoring_system epss
scoring_elements 0.51815
published_at 2026-04-11T12:55:00Z
6
value 0.00284
scoring_system epss
scoring_elements 0.51794
published_at 2026-04-12T12:55:00Z
7
value 0.00284
scoring_system epss
scoring_elements 0.51778
published_at 2026-04-13T12:55:00Z
8
value 0.00284
scoring_system epss
scoring_elements 0.51819
published_at 2026-04-16T12:55:00Z
9
value 0.00284
scoring_system epss
scoring_elements 0.51826
published_at 2026-04-18T12:55:00Z
10
value 0.00284
scoring_system epss
scoring_elements 0.51807
published_at 2026-04-21T12:55:00Z
11
value 0.00284
scoring_system epss
scoring_elements 0.51757
published_at 2026-04-24T12:55:00Z
12
value 0.00284
scoring_system epss
scoring_elements 0.51763
published_at 2026-04-26T12:55:00Z
13
value 0.00284
scoring_system epss
scoring_elements 0.51721
published_at 2026-05-07T12:55:00Z
14
value 0.00284
scoring_system epss
scoring_elements 0.5167
published_at 2026-05-05T12:55:00Z
15
value 0.00284
scoring_system epss
scoring_elements 0.51727
published_at 2026-05-11T12:55:00Z
16
value 0.00284
scoring_system epss
scoring_elements 0.51752
published_at 2026-05-12T12:55:00Z
17
value 0.00284
scoring_system epss
scoring_elements 0.51832
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39516
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39357
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39359
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39361
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39362
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39364
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39365
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39515
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39516
9
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2023-39516
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ws4h-295a-9qgx
15
url VCID-xbb2-av4z-m3dp
vulnerability_id VCID-xbb2-av4z-m3dp
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46169
reference_id
reference_type
scores
0
value 0.94468
scoring_system epss
scoring_elements 0.99997
published_at 2026-05-14T12:55:00Z
1
value 0.94469
scoring_system epss
scoring_elements 0.99997
published_at 2026-04-21T12:55:00Z
2
value 0.94469
scoring_system epss
scoring_elements 0.99998
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46169
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0730
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46169
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025648
reference_id 1025648
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025648
5
reference_url https://github.com/Cacti/cacti/commit/7f0e16312dd5ce20f93744ef8b9c3b0f1ece2216
reference_id 7f0e16312dd5ce20f93744ef8b9c3b0f1ece2216
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:39:57Z/
url https://github.com/Cacti/cacti/commit/7f0e16312dd5ce20f93744ef8b9c3b0f1ece2216
6
reference_url https://github.com/Cacti/cacti/commit/a8d59e8fa5f0054aa9c6981b1cbe30ef0e2a0ec9
reference_id a8d59e8fa5f0054aa9c6981b1cbe30ef0e2a0ec9
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:39:57Z/
url https://github.com/Cacti/cacti/commit/a8d59e8fa5f0054aa9c6981b1cbe30ef0e2a0ec9
7
reference_url https://github.com/Cacti/cacti/commit/b43f13ae7f1e6bfe4e8e56a80a7cd867cf2db52b
reference_id b43f13ae7f1e6bfe4e8e56a80a7cd867cf2db52b
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:39:57Z/
url https://github.com/Cacti/cacti/commit/b43f13ae7f1e6bfe4e8e56a80a7cd867cf2db52b
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/51166.py
reference_id CVE-2022-46169
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/51166.py
9
reference_url https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf
reference_id GHSA-6p93-p743-35gf
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:39:57Z/
url https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf
10
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
11
reference_url https://usn.ubuntu.com/7226-1/
reference_id USN-7226-1
reference_type
scores
url https://usn.ubuntu.com/7226-1/
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2022-46169
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xbb2-av4z-m3dp
16
url VCID-xpvn-y3b8-skgb
vulnerability_id VCID-xpvn-y3b8-skgb
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0730
reference_id
reference_type
scores
0
value 0.00304
scoring_system epss
scoring_elements 0.53573
published_at 2026-04-01T12:55:00Z
1
value 0.00304
scoring_system epss
scoring_elements 0.53595
published_at 2026-04-02T12:55:00Z
2
value 0.00304
scoring_system epss
scoring_elements 0.53624
published_at 2026-04-04T12:55:00Z
3
value 0.00304
scoring_system epss
scoring_elements 0.53593
published_at 2026-04-07T12:55:00Z
4
value 0.00304
scoring_system epss
scoring_elements 0.53644
published_at 2026-04-08T12:55:00Z
5
value 0.00304
scoring_system epss
scoring_elements 0.53642
published_at 2026-04-09T12:55:00Z
6
value 0.00304
scoring_system epss
scoring_elements 0.53691
published_at 2026-04-11T12:55:00Z
7
value 0.00304
scoring_system epss
scoring_elements 0.53674
published_at 2026-04-12T12:55:00Z
8
value 0.00304
scoring_system epss
scoring_elements 0.53657
published_at 2026-04-13T12:55:00Z
9
value 0.00304
scoring_system epss
scoring_elements 0.53695
published_at 2026-04-16T12:55:00Z
10
value 0.00304
scoring_system epss
scoring_elements 0.537
published_at 2026-04-18T12:55:00Z
11
value 0.00304
scoring_system epss
scoring_elements 0.53682
published_at 2026-04-21T12:55:00Z
12
value 0.00304
scoring_system epss
scoring_elements 0.53645
published_at 2026-04-24T12:55:00Z
13
value 0.00304
scoring_system epss
scoring_elements 0.53658
published_at 2026-04-26T12:55:00Z
14
value 0.00304
scoring_system epss
scoring_elements 0.53622
published_at 2026-04-29T12:55:00Z
15
value 0.00304
scoring_system epss
scoring_elements 0.53574
published_at 2026-05-05T12:55:00Z
16
value 0.00304
scoring_system epss
scoring_elements 0.53621
published_at 2026-05-07T12:55:00Z
17
value 0.00304
scoring_system epss
scoring_elements 0.53672
published_at 2026-05-09T12:55:00Z
18
value 0.00304
scoring_system epss
scoring_elements 0.53635
published_at 2026-05-11T12:55:00Z
19
value 0.00304
scoring_system epss
scoring_elements 0.53661
published_at 2026-05-12T12:55:00Z
20
value 0.00304
scoring_system epss
scoring_elements 0.53733
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0730
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0730
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46169
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008693
reference_id 1008693
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008693
4
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2022-0730
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xpvn-y3b8-skgb
17
url VCID-ypan-57sx-vyam
vulnerability_id VCID-ypan-57sx-vyam
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39361
reference_id
reference_type
scores
0
value 0.92278
scoring_system epss
scoring_elements 0.99717
published_at 2026-04-02T12:55:00Z
1
value 0.92278
scoring_system epss
scoring_elements 0.99718
published_at 2026-04-04T12:55:00Z
2
value 0.92278
scoring_system epss
scoring_elements 0.99719
published_at 2026-04-13T12:55:00Z
3
value 0.92278
scoring_system epss
scoring_elements 0.9972
published_at 2026-04-18T12:55:00Z
4
value 0.92278
scoring_system epss
scoring_elements 0.99722
published_at 2026-04-21T12:55:00Z
5
value 0.92278
scoring_system epss
scoring_elements 0.99723
published_at 2026-04-24T12:55:00Z
6
value 0.92278
scoring_system epss
scoring_elements 0.99725
published_at 2026-04-29T12:55:00Z
7
value 0.92278
scoring_system epss
scoring_elements 0.99726
published_at 2026-05-05T12:55:00Z
8
value 0.92278
scoring_system epss
scoring_elements 0.99727
published_at 2026-05-09T12:55:00Z
9
value 0.92278
scoring_system epss
scoring_elements 0.99728
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39361
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39357
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39359
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39361
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39362
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39364
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39365
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39515
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39516
9
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
10
reference_url https://usn.ubuntu.com/6720-1/
reference_id USN-6720-1
reference_type
scores
url https://usn.ubuntu.com/6720-1/
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2023-39361
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ypan-57sx-vyam
18
url VCID-zf92-pzgz-dfg7
vulnerability_id VCID-zf92-pzgz-dfg7
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39512
reference_id
reference_type
scores
0
value 0.00493
scoring_system epss
scoring_elements 0.65883
published_at 2026-05-14T12:55:00Z
1
value 0.00493
scoring_system epss
scoring_elements 0.65713
published_at 2026-04-13T12:55:00Z
2
value 0.00493
scoring_system epss
scoring_elements 0.65747
published_at 2026-04-21T12:55:00Z
3
value 0.00493
scoring_system epss
scoring_elements 0.65761
published_at 2026-04-24T12:55:00Z
4
value 0.00493
scoring_system epss
scoring_elements 0.65771
published_at 2026-04-29T12:55:00Z
5
value 0.00493
scoring_system epss
scoring_elements 0.65744
published_at 2026-05-05T12:55:00Z
6
value 0.00493
scoring_system epss
scoring_elements 0.65793
published_at 2026-05-07T12:55:00Z
7
value 0.00493
scoring_system epss
scoring_elements 0.65837
published_at 2026-05-09T12:55:00Z
8
value 0.00493
scoring_system epss
scoring_elements 0.65808
published_at 2026-05-11T12:55:00Z
9
value 0.00493
scoring_system epss
scoring_elements 0.65827
published_at 2026-05-12T12:55:00Z
10
value 0.00493
scoring_system epss
scoring_elements 0.65677
published_at 2026-04-02T12:55:00Z
11
value 0.00493
scoring_system epss
scoring_elements 0.65707
published_at 2026-04-04T12:55:00Z
12
value 0.00493
scoring_system epss
scoring_elements 0.65672
published_at 2026-04-07T12:55:00Z
13
value 0.00493
scoring_system epss
scoring_elements 0.65723
published_at 2026-04-08T12:55:00Z
14
value 0.00493
scoring_system epss
scoring_elements 0.65735
published_at 2026-04-09T12:55:00Z
15
value 0.00493
scoring_system epss
scoring_elements 0.65757
published_at 2026-04-11T12:55:00Z
16
value 0.00493
scoring_system epss
scoring_elements 0.65742
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39512
1
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
reference_id CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:21:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
2
reference_url https://www.debian.org/security/2023/dsa-5550
reference_id dsa-5550
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:21:14Z/
url https://www.debian.org/security/2023/dsa-5550
3
reference_url https://github.com/Cacti/cacti/security/advisories/GHSA-vqcc-5v63-g9q7
reference_id GHSA-vqcc-5v63-g9q7
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:21:14Z/
url https://github.com/Cacti/cacti/security/advisories/GHSA-vqcc-5v63-g9q7
4
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
reference_id WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:21:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
reference_id WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:21:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2023-39512
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zf92-pzgz-dfg7
19
url VCID-znew-xktt-p7hy
vulnerability_id VCID-znew-xktt-p7hy
summary Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39514
reference_id
reference_type
scores
0
value 0.0032
scoring_system epss
scoring_elements 0.55084
published_at 2026-05-12T12:55:00Z
1
value 0.0032
scoring_system epss
scoring_elements 0.55139
published_at 2026-04-16T12:55:00Z
2
value 0.0032
scoring_system epss
scoring_elements 0.55142
published_at 2026-05-14T12:55:00Z
3
value 0.0032
scoring_system epss
scoring_elements 0.55122
published_at 2026-04-21T12:55:00Z
4
value 0.0032
scoring_system epss
scoring_elements 0.55057
published_at 2026-04-24T12:55:00Z
5
value 0.0032
scoring_system epss
scoring_elements 0.55048
published_at 2026-04-29T12:55:00Z
6
value 0.0032
scoring_system epss
scoring_elements 0.54999
published_at 2026-05-05T12:55:00Z
7
value 0.0032
scoring_system epss
scoring_elements 0.55039
published_at 2026-05-07T12:55:00Z
8
value 0.0032
scoring_system epss
scoring_elements 0.55098
published_at 2026-05-09T12:55:00Z
9
value 0.0032
scoring_system epss
scoring_elements 0.55058
published_at 2026-05-11T12:55:00Z
10
value 0.0032
scoring_system epss
scoring_elements 0.55076
published_at 2026-04-26T12:55:00Z
11
value 0.0032
scoring_system epss
scoring_elements 0.55101
published_at 2026-04-13T12:55:00Z
12
value 0.0032
scoring_system epss
scoring_elements 0.55077
published_at 2026-04-07T12:55:00Z
13
value 0.0032
scoring_system epss
scoring_elements 0.55127
published_at 2026-04-08T12:55:00Z
14
value 0.0032
scoring_system epss
scoring_elements 0.55126
published_at 2026-04-09T12:55:00Z
15
value 0.0032
scoring_system epss
scoring_elements 0.55138
published_at 2026-04-11T12:55:00Z
16
value 0.0032
scoring_system epss
scoring_elements 0.55118
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39514
1
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
reference_id CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:21:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/
2
reference_url https://www.debian.org/security/2023/dsa-5550
reference_id dsa-5550
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:21:26Z/
url https://www.debian.org/security/2023/dsa-5550
3
reference_url https://github.com/Cacti/cacti/security/advisories/GHSA-6hrc-2cfc-8hm7
reference_id GHSA-6hrc-2cfc-8hm7
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:21:26Z/
url https://github.com/Cacti/cacti/security/advisories/GHSA-6hrc-2cfc-8hm7
4
reference_url https://security.gentoo.org/glsa/202412-02
reference_id GLSA-202412-02
reference_type
scores
url https://security.gentoo.org/glsa/202412-02
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
reference_id WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:21:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOQFYGLZBAWT4AWNMO7DU73QXWPXTCKH/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
reference_id WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-26T19:21:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/
fixed_packages
0
url pkg:ebuild/net-analyzer/cacti@1.2.26
purl pkg:ebuild/net-analyzer/cacti@1.2.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26
aliases CVE-2023-39514
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-znew-xktt-p7hy
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/cacti@1.2.26