Lookup for vulnerable packages by Package URL.

Purlpkg:generic/postgresql@12.0.0
Typegeneric
Namespace
Namepostgresql
Version12.0.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version12.1.0
Latest_non_vulnerable_version18.2.0
Affected_by_vulnerabilities
0
url VCID-36gv-m96w-47db
vulnerability_id VCID-36gv-m96w-47db
summary Reconnection can downgrade connection security settingsmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25694
reference_id
reference_type
scores
0
value 0.00359
scoring_system epss
scoring_elements 0.58007
published_at 2026-04-01T12:55:00Z
1
value 0.00359
scoring_system epss
scoring_elements 0.58124
published_at 2026-04-21T12:55:00Z
2
value 0.00359
scoring_system epss
scoring_elements 0.58118
published_at 2026-04-13T12:55:00Z
3
value 0.00359
scoring_system epss
scoring_elements 0.58148
published_at 2026-04-16T12:55:00Z
4
value 0.00359
scoring_system epss
scoring_elements 0.58149
published_at 2026-04-18T12:55:00Z
5
value 0.00359
scoring_system epss
scoring_elements 0.58091
published_at 2026-04-24T12:55:00Z
6
value 0.00359
scoring_system epss
scoring_elements 0.58113
published_at 2026-04-04T12:55:00Z
7
value 0.00359
scoring_system epss
scoring_elements 0.58087
published_at 2026-04-07T12:55:00Z
8
value 0.00359
scoring_system epss
scoring_elements 0.58142
published_at 2026-04-08T12:55:00Z
9
value 0.00359
scoring_system epss
scoring_elements 0.58145
published_at 2026-04-09T12:55:00Z
10
value 0.00359
scoring_system epss
scoring_elements 0.5816
published_at 2026-04-11T12:55:00Z
11
value 0.00359
scoring_system epss
scoring_elements 0.58137
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/
5
reference_url https://www.postgresql.org/support/security/CVE-2020-25694/
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2020-25694/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1894423
reference_id 1894423
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1894423
7
reference_url https://security.archlinux.org/ASA-202011-14
reference_id ASA-202011-14
reference_type
scores
url https://security.archlinux.org/ASA-202011-14
8
reference_url https://security.archlinux.org/AVG-1276
reference_id AVG-1276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1276
9
reference_url https://security.gentoo.org/glsa/202012-07
reference_id GLSA-202012-07
reference_type
scores
url https://security.gentoo.org/glsa/202012-07
10
reference_url https://access.redhat.com/errata/RHSA-2020:5316
reference_id RHSA-2020:5316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5316
11
reference_url https://access.redhat.com/errata/RHSA-2020:5317
reference_id RHSA-2020:5317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5317
12
reference_url https://access.redhat.com/errata/RHSA-2020:5401
reference_id RHSA-2020:5401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5401
13
reference_url https://access.redhat.com/errata/RHSA-2020:5567
reference_id RHSA-2020:5567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5567
14
reference_url https://access.redhat.com/errata/RHSA-2020:5619
reference_id RHSA-2020:5619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5619
15
reference_url https://access.redhat.com/errata/RHSA-2020:5620
reference_id RHSA-2020:5620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5620
16
reference_url https://access.redhat.com/errata/RHSA-2020:5638
reference_id RHSA-2020:5638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5638
17
reference_url https://access.redhat.com/errata/RHSA-2020:5661
reference_id RHSA-2020:5661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5661
18
reference_url https://access.redhat.com/errata/RHSA-2020:5664
reference_id RHSA-2020:5664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5664
19
reference_url https://access.redhat.com/errata/RHSA-2021:0057
reference_id RHSA-2021:0057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0057
20
reference_url https://access.redhat.com/errata/RHSA-2021:0161
reference_id RHSA-2021:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0161
21
reference_url https://access.redhat.com/errata/RHSA-2021:0163
reference_id RHSA-2021:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0163
22
reference_url https://access.redhat.com/errata/RHSA-2021:0164
reference_id RHSA-2021:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0164
23
reference_url https://access.redhat.com/errata/RHSA-2021:0165
reference_id RHSA-2021:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0165
24
reference_url https://access.redhat.com/errata/RHSA-2021:0166
reference_id RHSA-2021:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0166
25
reference_url https://access.redhat.com/errata/RHSA-2021:0167
reference_id RHSA-2021:0167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0167
26
reference_url https://access.redhat.com/errata/RHSA-2021:1512
reference_id RHSA-2021:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1512
27
reference_url https://usn.ubuntu.com/4633-1/
reference_id USN-4633-1
reference_type
scores
url https://usn.ubuntu.com/4633-1/
fixed_packages
0
url pkg:generic/postgresql@12.5.0
purl pkg:generic/postgresql@12.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0
1
url pkg:generic/postgresql@13.1.0
purl pkg:generic/postgresql@13.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0
aliases CVE-2020-25694
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-36gv-m96w-47db
1
url VCID-3kph-5gzq-ryhu
vulnerability_id VCID-3kph-5gzq-ryhu
summary Row security policies disregard user ID changes after inliningmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2455.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2455.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2455
reference_id
reference_type
scores
0
value 0.00212
scoring_system epss
scoring_elements 0.4378
published_at 2026-04-04T12:55:00Z
1
value 0.00212
scoring_system epss
scoring_elements 0.43756
published_at 2026-04-02T12:55:00Z
2
value 0.00226
scoring_system epss
scoring_elements 0.45331
published_at 2026-04-24T12:55:00Z
3
value 0.00226
scoring_system epss
scoring_elements 0.45447
published_at 2026-04-11T12:55:00Z
4
value 0.00226
scoring_system epss
scoring_elements 0.45417
published_at 2026-04-12T12:55:00Z
5
value 0.00226
scoring_system epss
scoring_elements 0.45418
published_at 2026-04-13T12:55:00Z
6
value 0.00226
scoring_system epss
scoring_elements 0.45469
published_at 2026-04-16T12:55:00Z
7
value 0.00226
scoring_system epss
scoring_elements 0.45464
published_at 2026-04-18T12:55:00Z
8
value 0.00226
scoring_system epss
scoring_elements 0.45414
published_at 2026-04-21T12:55:00Z
9
value 0.00226
scoring_system epss
scoring_elements 0.45369
published_at 2026-04-07T12:55:00Z
10
value 0.00226
scoring_system epss
scoring_elements 0.45424
published_at 2026-04-08T12:55:00Z
11
value 0.00226
scoring_system epss
scoring_elements 0.45425
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2455
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/
6
reference_url https://www.postgresql.org/support/security/CVE-2023-2455/
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N']
1
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T17:13:19Z/
url https://www.postgresql.org/support/security/CVE-2023-2455/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2207569
reference_id 2207569
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2207569
8
reference_url https://access.redhat.com/security/cve/CVE-2023-2455
reference_id CVE-2023-2455
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T17:13:19Z/
url https://access.redhat.com/security/cve/CVE-2023-2455
9
reference_url https://security.netapp.com/advisory/ntap-20230706-0006/
reference_id ntap-20230706-0006
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T17:13:19Z/
url https://security.netapp.com/advisory/ntap-20230706-0006/
10
reference_url https://access.redhat.com/errata/RHSA-2023:3714
reference_id RHSA-2023:3714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3714
11
reference_url https://access.redhat.com/errata/RHSA-2023:4313
reference_id RHSA-2023:4313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4313
12
reference_url https://access.redhat.com/errata/RHSA-2023:4327
reference_id RHSA-2023:4327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4327
13
reference_url https://access.redhat.com/errata/RHSA-2023:4527
reference_id RHSA-2023:4527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4527
14
reference_url https://access.redhat.com/errata/RHSA-2023:4535
reference_id RHSA-2023:4535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4535
15
reference_url https://access.redhat.com/errata/RHSA-2023:4539
reference_id RHSA-2023:4539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4539
16
reference_url https://access.redhat.com/errata/RHSA-2023:5269
reference_id RHSA-2023:5269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5269
17
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7545
18
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7580
19
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7666
20
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7667
21
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7694
22
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7695
23
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7772
24
reference_url https://usn.ubuntu.com/6104-1/
reference_id USN-6104-1
reference_type
scores
url https://usn.ubuntu.com/6104-1/
fixed_packages
0
url pkg:generic/postgresql@12.15.0
purl pkg:generic/postgresql@12.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.15.0
1
url pkg:generic/postgresql@13.11.0
purl pkg:generic/postgresql@13.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.11.0
2
url pkg:generic/postgresql@14.8.0
purl pkg:generic/postgresql@14.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.8.0
3
url pkg:generic/postgresql@15.3.0
purl pkg:generic/postgresql@15.3.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.3.0
aliases CVE-2023-2455
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3kph-5gzq-ryhu
2
url VCID-4jdp-3xqp-ufap
vulnerability_id VCID-4jdp-3xqp-ufap
summary Buffer overrun from integer overflow in array subscripting calculationsmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32027
reference_id
reference_type
scores
0
value 0.00491
scoring_system epss
scoring_elements 0.65502
published_at 2026-04-01T12:55:00Z
1
value 0.00491
scoring_system epss
scoring_elements 0.65634
published_at 2026-04-24T12:55:00Z
2
value 0.00491
scoring_system epss
scoring_elements 0.65623
published_at 2026-04-16T12:55:00Z
3
value 0.00491
scoring_system epss
scoring_elements 0.65635
published_at 2026-04-18T12:55:00Z
4
value 0.00491
scoring_system epss
scoring_elements 0.65619
published_at 2026-04-21T12:55:00Z
5
value 0.00491
scoring_system epss
scoring_elements 0.6555
published_at 2026-04-02T12:55:00Z
6
value 0.00491
scoring_system epss
scoring_elements 0.6558
published_at 2026-04-04T12:55:00Z
7
value 0.00491
scoring_system epss
scoring_elements 0.65546
published_at 2026-04-07T12:55:00Z
8
value 0.00491
scoring_system epss
scoring_elements 0.65599
published_at 2026-04-08T12:55:00Z
9
value 0.00491
scoring_system epss
scoring_elements 0.65611
published_at 2026-04-09T12:55:00Z
10
value 0.00491
scoring_system epss
scoring_elements 0.6563
published_at 2026-04-11T12:55:00Z
11
value 0.00491
scoring_system epss
scoring_elements 0.65616
published_at 2026-04-12T12:55:00Z
12
value 0.00491
scoring_system epss
scoring_elements 0.65587
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32027
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/
7
reference_url https://www.postgresql.org/support/security/CVE-2021-32027/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N']
url https://www.postgresql.org/support/security/CVE-2021-32027/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1956876
reference_id 1956876
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1956876
9
reference_url https://security.archlinux.org/ASA-202106-15
reference_id ASA-202106-15
reference_type
scores
url https://security.archlinux.org/ASA-202106-15
10
reference_url https://security.archlinux.org/AVG-1956
reference_id AVG-1956
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1956
11
reference_url https://security.gentoo.org/glsa/202211-04
reference_id GLSA-202211-04
reference_type
scores
url https://security.gentoo.org/glsa/202211-04
12
reference_url https://access.redhat.com/errata/RHSA-2021:2360
reference_id RHSA-2021:2360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2360
13
reference_url https://access.redhat.com/errata/RHSA-2021:2361
reference_id RHSA-2021:2361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2361
14
reference_url https://access.redhat.com/errata/RHSA-2021:2372
reference_id RHSA-2021:2372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2372
15
reference_url https://access.redhat.com/errata/RHSA-2021:2375
reference_id RHSA-2021:2375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2375
16
reference_url https://access.redhat.com/errata/RHSA-2021:2389
reference_id RHSA-2021:2389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2389
17
reference_url https://access.redhat.com/errata/RHSA-2021:2390
reference_id RHSA-2021:2390
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2390
18
reference_url https://access.redhat.com/errata/RHSA-2021:2391
reference_id RHSA-2021:2391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2391
19
reference_url https://access.redhat.com/errata/RHSA-2021:2392
reference_id RHSA-2021:2392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2392
20
reference_url https://access.redhat.com/errata/RHSA-2021:2393
reference_id RHSA-2021:2393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2393
21
reference_url https://access.redhat.com/errata/RHSA-2021:2394
reference_id RHSA-2021:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2394
22
reference_url https://access.redhat.com/errata/RHSA-2021:2395
reference_id RHSA-2021:2395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2395
23
reference_url https://access.redhat.com/errata/RHSA-2021:2396
reference_id RHSA-2021:2396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2396
24
reference_url https://access.redhat.com/errata/RHSA-2021:2397
reference_id RHSA-2021:2397
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2397
25
reference_url https://usn.ubuntu.com/4972-1/
reference_id USN-4972-1
reference_type
scores
url https://usn.ubuntu.com/4972-1/
26
reference_url https://usn.ubuntu.com/5645-1/
reference_id USN-5645-1
reference_type
scores
url https://usn.ubuntu.com/5645-1/
fixed_packages
0
url pkg:generic/postgresql@12.7.0
purl pkg:generic/postgresql@12.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0
1
url pkg:generic/postgresql@13.3.0
purl pkg:generic/postgresql@13.3.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0
aliases CVE-2021-32027
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4jdp-3xqp-ufap
3
url VCID-5py6-fe2j-d3f4
vulnerability_id VCID-5py6-fe2j-d3f4
summary CREATE SCHEMA ... schema_element defeats protective search_path changesmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2454.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2454.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2454
reference_id
reference_type
scores
0
value 0.00228
scoring_system epss
scoring_elements 0.45609
published_at 2026-04-04T12:55:00Z
1
value 0.00228
scoring_system epss
scoring_elements 0.45587
published_at 2026-04-02T12:55:00Z
2
value 0.00234
scoring_system epss
scoring_elements 0.46288
published_at 2026-04-24T12:55:00Z
3
value 0.00234
scoring_system epss
scoring_elements 0.46307
published_at 2026-04-21T12:55:00Z
4
value 0.00244
scoring_system epss
scoring_elements 0.47686
published_at 2026-04-18T12:55:00Z
5
value 0.00244
scoring_system epss
scoring_elements 0.47627
published_at 2026-04-12T12:55:00Z
6
value 0.00244
scoring_system epss
scoring_elements 0.47651
published_at 2026-04-11T12:55:00Z
7
value 0.00244
scoring_system epss
scoring_elements 0.47636
published_at 2026-04-13T12:55:00Z
8
value 0.00244
scoring_system epss
scoring_elements 0.47694
published_at 2026-04-16T12:55:00Z
9
value 0.00244
scoring_system epss
scoring_elements 0.47576
published_at 2026-04-07T12:55:00Z
10
value 0.00244
scoring_system epss
scoring_elements 0.47631
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2454
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/
6
reference_url https://www.postgresql.org/support/security/CVE-2023-2454/
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H']
1
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/
url https://www.postgresql.org/support/security/CVE-2023-2454/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2207568
reference_id 2207568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2207568
8
reference_url https://access.redhat.com/security/cve/CVE-2023-2454
reference_id CVE-2023-2454
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/
url https://access.redhat.com/security/cve/CVE-2023-2454
9
reference_url https://security.netapp.com/advisory/ntap-20230706-0006/
reference_id ntap-20230706-0006
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/
url https://security.netapp.com/advisory/ntap-20230706-0006/
10
reference_url https://access.redhat.com/errata/RHSA-2023:3714
reference_id RHSA-2023:3714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3714
11
reference_url https://access.redhat.com/errata/RHSA-2023:4313
reference_id RHSA-2023:4313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4313
12
reference_url https://access.redhat.com/errata/RHSA-2023:4327
reference_id RHSA-2023:4327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4327
13
reference_url https://access.redhat.com/errata/RHSA-2023:4527
reference_id RHSA-2023:4527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4527
14
reference_url https://access.redhat.com/errata/RHSA-2023:4535
reference_id RHSA-2023:4535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4535
15
reference_url https://access.redhat.com/errata/RHSA-2023:4539
reference_id RHSA-2023:4539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4539
16
reference_url https://access.redhat.com/errata/RHSA-2023:5269
reference_id RHSA-2023:5269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5269
17
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7545
18
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7580
19
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7666
20
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7667
21
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7694
22
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7695
23
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7772
24
reference_url https://usn.ubuntu.com/6104-1/
reference_id USN-6104-1
reference_type
scores
url https://usn.ubuntu.com/6104-1/
25
reference_url https://usn.ubuntu.com/6230-1/
reference_id USN-6230-1
reference_type
scores
url https://usn.ubuntu.com/6230-1/
fixed_packages
0
url pkg:generic/postgresql@12.15.0
purl pkg:generic/postgresql@12.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.15.0
1
url pkg:generic/postgresql@13.11.0
purl pkg:generic/postgresql@13.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.11.0
2
url pkg:generic/postgresql@14.8.0
purl pkg:generic/postgresql@14.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.8.0
3
url pkg:generic/postgresql@15.3.0
purl pkg:generic/postgresql@15.3.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.3.0
aliases CVE-2023-2454
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5py6-fe2j-d3f4
4
url VCID-66hr-98m2-a3gc
vulnerability_id VCID-66hr-98m2-a3gc
summary PostgreSQL libpq retains an error message from man-in-the-middlemore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10977.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10977.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10977
reference_id
reference_type
scores
0
value 0.00345
scoring_system epss
scoring_elements 0.57033
published_at 2026-04-24T12:55:00Z
1
value 0.00345
scoring_system epss
scoring_elements 0.5712
published_at 2026-04-12T12:55:00Z
2
value 0.00345
scoring_system epss
scoring_elements 0.57128
published_at 2026-04-16T12:55:00Z
3
value 0.00345
scoring_system epss
scoring_elements 0.57123
published_at 2026-04-18T12:55:00Z
4
value 0.00345
scoring_system epss
scoring_elements 0.57102
published_at 2026-04-21T12:55:00Z
5
value 0.00345
scoring_system epss
scoring_elements 0.57077
published_at 2026-04-07T12:55:00Z
6
value 0.00345
scoring_system epss
scoring_elements 0.571
published_at 2026-04-13T12:55:00Z
7
value 0.00345
scoring_system epss
scoring_elements 0.57127
published_at 2026-04-08T12:55:00Z
8
value 0.00345
scoring_system epss
scoring_elements 0.57129
published_at 2026-04-09T12:55:00Z
9
value 0.00345
scoring_system epss
scoring_elements 0.57141
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10977
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10977
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/
5
reference_url https://www.postgresql.org/support/security/CVE-2024-10977/
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N']
1
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-14T18:53:39Z/
url https://www.postgresql.org/support/security/CVE-2024-10977/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2326258
reference_id 2326258
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2326258
7
reference_url https://security.gentoo.org/glsa/202412-12
reference_id GLSA-202412-12
reference_type
scores
url https://security.gentoo.org/glsa/202412-12
8
reference_url https://usn.ubuntu.com/7132-1/
reference_id USN-7132-1
reference_type
scores
url https://usn.ubuntu.com/7132-1/
9
reference_url https://usn.ubuntu.com/7358-1/
reference_id USN-7358-1
reference_type
scores
url https://usn.ubuntu.com/7358-1/
fixed_packages
0
url pkg:generic/postgresql@12.21.0
purl pkg:generic/postgresql@12.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.21.0
1
url pkg:generic/postgresql@13.17.0
purl pkg:generic/postgresql@13.17.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.17.0
2
url pkg:generic/postgresql@14.14.0
purl pkg:generic/postgresql@14.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.14.0
3
url pkg:generic/postgresql@15.9.0
purl pkg:generic/postgresql@15.9.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.9.0
4
url pkg:generic/postgresql@16.5.0
purl pkg:generic/postgresql@16.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.5.0
5
url pkg:generic/postgresql@17.1.0
purl pkg:generic/postgresql@17.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@17.1.0
aliases CVE-2024-10977
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-66hr-98m2-a3gc
5
url VCID-8da2-zhsq-j7c4
vulnerability_id VCID-8da2-zhsq-j7c4
summary PostgreSQL SET ROLE, SET SESSION AUTHORIZATION reset to wrong user IDmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10978.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10978.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10978
reference_id
reference_type
scores
0
value 0.00613
scoring_system epss
scoring_elements 0.69918
published_at 2026-04-24T12:55:00Z
1
value 0.00613
scoring_system epss
scoring_elements 0.69836
published_at 2026-04-13T12:55:00Z
2
value 0.00613
scoring_system epss
scoring_elements 0.69877
published_at 2026-04-16T12:55:00Z
3
value 0.00613
scoring_system epss
scoring_elements 0.69887
published_at 2026-04-18T12:55:00Z
4
value 0.00613
scoring_system epss
scoring_elements 0.69867
published_at 2026-04-21T12:55:00Z
5
value 0.00613
scoring_system epss
scoring_elements 0.69786
published_at 2026-04-02T12:55:00Z
6
value 0.00613
scoring_system epss
scoring_elements 0.69802
published_at 2026-04-04T12:55:00Z
7
value 0.00613
scoring_system epss
scoring_elements 0.69778
published_at 2026-04-07T12:55:00Z
8
value 0.00613
scoring_system epss
scoring_elements 0.69826
published_at 2026-04-08T12:55:00Z
9
value 0.00613
scoring_system epss
scoring_elements 0.69841
published_at 2026-04-09T12:55:00Z
10
value 0.00613
scoring_system epss
scoring_elements 0.69865
published_at 2026-04-11T12:55:00Z
11
value 0.00613
scoring_system epss
scoring_elements 0.6985
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10978
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10978
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/
5
reference_url https://www.postgresql.org/support/security/CVE-2024-10978/
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N']
1
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-14T18:53:38Z/
url https://www.postgresql.org/support/security/CVE-2024-10978/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2326251
reference_id 2326251
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2326251
7
reference_url https://security.gentoo.org/glsa/202412-12
reference_id GLSA-202412-12
reference_type
scores
url https://security.gentoo.org/glsa/202412-12
8
reference_url https://access.redhat.com/errata/RHSA-2024:10785
reference_id RHSA-2024:10785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10785
9
reference_url https://access.redhat.com/errata/RHSA-2024:10787
reference_id RHSA-2024:10787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10787
10
reference_url https://access.redhat.com/errata/RHSA-2024:10788
reference_id RHSA-2024:10788
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10788
11
reference_url https://access.redhat.com/errata/RHSA-2024:10791
reference_id RHSA-2024:10791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10791
12
reference_url https://access.redhat.com/errata/RHSA-2024:10830
reference_id RHSA-2024:10830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10830
13
reference_url https://access.redhat.com/errata/RHSA-2024:10831
reference_id RHSA-2024:10831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10831
14
reference_url https://access.redhat.com/errata/RHSA-2024:10832
reference_id RHSA-2024:10832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10832
15
reference_url https://usn.ubuntu.com/7132-1/
reference_id USN-7132-1
reference_type
scores
url https://usn.ubuntu.com/7132-1/
16
reference_url https://usn.ubuntu.com/7358-1/
reference_id USN-7358-1
reference_type
scores
url https://usn.ubuntu.com/7358-1/
fixed_packages
0
url pkg:generic/postgresql@12.21.0
purl pkg:generic/postgresql@12.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.21.0
1
url pkg:generic/postgresql@13.17.0
purl pkg:generic/postgresql@13.17.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.17.0
2
url pkg:generic/postgresql@14.14.0
purl pkg:generic/postgresql@14.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.14.0
3
url pkg:generic/postgresql@15.9.0
purl pkg:generic/postgresql@15.9.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.9.0
4
url pkg:generic/postgresql@16.5.0
purl pkg:generic/postgresql@16.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.5.0
5
url pkg:generic/postgresql@17.1.0
purl pkg:generic/postgresql@17.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@17.1.0
aliases CVE-2024-10978
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8da2-zhsq-j7c4
6
url VCID-8p8h-jdyq-vfek
vulnerability_id VCID-8p8h-jdyq-vfek
summary Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATEmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32028
reference_id
reference_type
scores
0
value 0.00467
scoring_system epss
scoring_elements 0.64362
published_at 2026-04-01T12:55:00Z
1
value 0.00467
scoring_system epss
scoring_elements 0.645
published_at 2026-04-24T12:55:00Z
2
value 0.00467
scoring_system epss
scoring_elements 0.64475
published_at 2026-04-16T12:55:00Z
3
value 0.00467
scoring_system epss
scoring_elements 0.64487
published_at 2026-04-18T12:55:00Z
4
value 0.00467
scoring_system epss
scoring_elements 0.64479
published_at 2026-04-21T12:55:00Z
5
value 0.00467
scoring_system epss
scoring_elements 0.64415
published_at 2026-04-02T12:55:00Z
6
value 0.00467
scoring_system epss
scoring_elements 0.64445
published_at 2026-04-04T12:55:00Z
7
value 0.00467
scoring_system epss
scoring_elements 0.64405
published_at 2026-04-07T12:55:00Z
8
value 0.00467
scoring_system epss
scoring_elements 0.64453
published_at 2026-04-08T12:55:00Z
9
value 0.00467
scoring_system epss
scoring_elements 0.64469
published_at 2026-04-12T12:55:00Z
10
value 0.00467
scoring_system epss
scoring_elements 0.64481
published_at 2026-04-11T12:55:00Z
11
value 0.00467
scoring_system epss
scoring_elements 0.64441
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32028
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/
7
reference_url https://www.postgresql.org/support/security/CVE-2021-32028/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2021-32028/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1956877
reference_id 1956877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1956877
9
reference_url https://security.archlinux.org/ASA-202106-15
reference_id ASA-202106-15
reference_type
scores
url https://security.archlinux.org/ASA-202106-15
10
reference_url https://security.archlinux.org/AVG-1956
reference_id AVG-1956
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1956
11
reference_url https://security.gentoo.org/glsa/202211-04
reference_id GLSA-202211-04
reference_type
scores
url https://security.gentoo.org/glsa/202211-04
12
reference_url https://access.redhat.com/errata/RHSA-2021:2360
reference_id RHSA-2021:2360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2360
13
reference_url https://access.redhat.com/errata/RHSA-2021:2361
reference_id RHSA-2021:2361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2361
14
reference_url https://access.redhat.com/errata/RHSA-2021:2372
reference_id RHSA-2021:2372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2372
15
reference_url https://access.redhat.com/errata/RHSA-2021:2375
reference_id RHSA-2021:2375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2375
16
reference_url https://access.redhat.com/errata/RHSA-2021:2389
reference_id RHSA-2021:2389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2389
17
reference_url https://access.redhat.com/errata/RHSA-2021:2390
reference_id RHSA-2021:2390
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2390
18
reference_url https://access.redhat.com/errata/RHSA-2021:2391
reference_id RHSA-2021:2391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2391
19
reference_url https://access.redhat.com/errata/RHSA-2021:2392
reference_id RHSA-2021:2392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2392
20
reference_url https://access.redhat.com/errata/RHSA-2021:2393
reference_id RHSA-2021:2393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2393
21
reference_url https://access.redhat.com/errata/RHSA-2021:2394
reference_id RHSA-2021:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2394
22
reference_url https://access.redhat.com/errata/RHSA-2021:2395
reference_id RHSA-2021:2395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2395
23
reference_url https://access.redhat.com/errata/RHSA-2021:2396
reference_id RHSA-2021:2396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2396
24
reference_url https://usn.ubuntu.com/4972-1/
reference_id USN-4972-1
reference_type
scores
url https://usn.ubuntu.com/4972-1/
fixed_packages
0
url pkg:generic/postgresql@12.7.0
purl pkg:generic/postgresql@12.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0
1
url pkg:generic/postgresql@13.3.0
purl pkg:generic/postgresql@13.3.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0
aliases CVE-2021-32028
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8p8h-jdyq-vfek
7
url VCID-ah54-w11h-eqef
vulnerability_id VCID-ah54-w11h-eqef
summary PostgreSQL relation replacement during pg_dump executes arbitrary SQLmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7348.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7348.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7348
reference_id
reference_type
scores
0
value 0.00743
scoring_system epss
scoring_elements 0.73057
published_at 2026-04-18T12:55:00Z
1
value 0.00743
scoring_system epss
scoring_elements 0.73047
published_at 2026-04-16T12:55:00Z
2
value 0.00743
scoring_system epss
scoring_elements 0.73006
published_at 2026-04-13T12:55:00Z
3
value 0.00743
scoring_system epss
scoring_elements 0.72962
published_at 2026-04-02T12:55:00Z
4
value 0.00743
scoring_system epss
scoring_elements 0.72982
published_at 2026-04-04T12:55:00Z
5
value 0.00743
scoring_system epss
scoring_elements 0.72958
published_at 2026-04-07T12:55:00Z
6
value 0.00743
scoring_system epss
scoring_elements 0.72995
published_at 2026-04-08T12:55:00Z
7
value 0.00743
scoring_system epss
scoring_elements 0.73009
published_at 2026-04-09T12:55:00Z
8
value 0.00743
scoring_system epss
scoring_elements 0.73012
published_at 2026-04-12T12:55:00Z
9
value 0.00743
scoring_system epss
scoring_elements 0.73033
published_at 2026-04-11T12:55:00Z
10
value 0.00764
scoring_system epss
scoring_elements 0.73492
published_at 2026-04-24T12:55:00Z
11
value 0.00764
scoring_system epss
scoring_elements 0.73459
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7348
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7348
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-164-158-1413-1316-1220-and-17-beta-3-released-2910/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-164-158-1413-1316-1220-and-17-beta-3-released-2910/
5
reference_url https://www.postgresql.org/support/security/CVE-2024-7348/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-09T18:15:41Z/
url https://www.postgresql.org/support/security/CVE-2024-7348/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303682
reference_id 2303682
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303682
7
reference_url https://security.gentoo.org/glsa/202409-02
reference_id GLSA-202409-02
reference_type
scores
url https://security.gentoo.org/glsa/202409-02
8
reference_url https://access.redhat.com/errata/RHSA-2024:5927
reference_id RHSA-2024:5927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5927
9
reference_url https://access.redhat.com/errata/RHSA-2024:5929
reference_id RHSA-2024:5929
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5929
10
reference_url https://access.redhat.com/errata/RHSA-2024:5999
reference_id RHSA-2024:5999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5999
11
reference_url https://access.redhat.com/errata/RHSA-2024:6000
reference_id RHSA-2024:6000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6000
12
reference_url https://access.redhat.com/errata/RHSA-2024:6001
reference_id RHSA-2024:6001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6001
13
reference_url https://access.redhat.com/errata/RHSA-2024:6018
reference_id RHSA-2024:6018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6018
14
reference_url https://access.redhat.com/errata/RHSA-2024:6020
reference_id RHSA-2024:6020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6020
15
reference_url https://access.redhat.com/errata/RHSA-2024:6137
reference_id RHSA-2024:6137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6137
16
reference_url https://access.redhat.com/errata/RHSA-2024:6138
reference_id RHSA-2024:6138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6138
17
reference_url https://access.redhat.com/errata/RHSA-2024:6139
reference_id RHSA-2024:6139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6139
18
reference_url https://access.redhat.com/errata/RHSA-2024:6140
reference_id RHSA-2024:6140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6140
19
reference_url https://access.redhat.com/errata/RHSA-2024:6141
reference_id RHSA-2024:6141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6141
20
reference_url https://access.redhat.com/errata/RHSA-2024:6142
reference_id RHSA-2024:6142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6142
21
reference_url https://access.redhat.com/errata/RHSA-2024:6144
reference_id RHSA-2024:6144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6144
22
reference_url https://access.redhat.com/errata/RHSA-2024:6145
reference_id RHSA-2024:6145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6145
23
reference_url https://access.redhat.com/errata/RHSA-2024:6557
reference_id RHSA-2024:6557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6557
24
reference_url https://access.redhat.com/errata/RHSA-2024:6558
reference_id RHSA-2024:6558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6558
25
reference_url https://access.redhat.com/errata/RHSA-2024:6559
reference_id RHSA-2024:6559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6559
26
reference_url https://access.redhat.com/errata/RHSA-2024:8495
reference_id RHSA-2024:8495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8495
27
reference_url https://usn.ubuntu.com/6968-1/
reference_id USN-6968-1
reference_type
scores
url https://usn.ubuntu.com/6968-1/
28
reference_url https://usn.ubuntu.com/6968-2/
reference_id USN-6968-2
reference_type
scores
url https://usn.ubuntu.com/6968-2/
29
reference_url https://usn.ubuntu.com/6968-3/
reference_id USN-6968-3
reference_type
scores
url https://usn.ubuntu.com/6968-3/
fixed_packages
0
url pkg:generic/postgresql@12.20.0
purl pkg:generic/postgresql@12.20.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.20.0
1
url pkg:generic/postgresql@13.16.0
purl pkg:generic/postgresql@13.16.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.16.0
2
url pkg:generic/postgresql@14.13.0
purl pkg:generic/postgresql@14.13.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.13.0
3
url pkg:generic/postgresql@15.8.0
purl pkg:generic/postgresql@15.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.8.0
4
url pkg:generic/postgresql@16.4.0
purl pkg:generic/postgresql@16.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.4.0
aliases CVE-2024-7348
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ah54-w11h-eqef
8
url VCID-bdw5-v87c-zyfj
vulnerability_id VCID-bdw5-v87c-zyfj
summary Multiple features escape "security restricted operation" sandboxmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25695
reference_id
reference_type
scores
0
value 0.22672
scoring_system epss
scoring_elements 0.95843
published_at 2026-04-04T12:55:00Z
1
value 0.22672
scoring_system epss
scoring_elements 0.95826
published_at 2026-04-01T12:55:00Z
2
value 0.22672
scoring_system epss
scoring_elements 0.95854
published_at 2026-04-08T12:55:00Z
3
value 0.22672
scoring_system epss
scoring_elements 0.95845
published_at 2026-04-07T12:55:00Z
4
value 0.22672
scoring_system epss
scoring_elements 0.95835
published_at 2026-04-02T12:55:00Z
5
value 0.23757
scoring_system epss
scoring_elements 0.96022
published_at 2026-04-24T12:55:00Z
6
value 0.23757
scoring_system epss
scoring_elements 0.96005
published_at 2026-04-13T12:55:00Z
7
value 0.23757
scoring_system epss
scoring_elements 0.96015
published_at 2026-04-16T12:55:00Z
8
value 0.23757
scoring_system epss
scoring_elements 0.9602
published_at 2026-04-18T12:55:00Z
9
value 0.23757
scoring_system epss
scoring_elements 0.95999
published_at 2026-04-09T12:55:00Z
10
value 0.23757
scoring_system epss
scoring_elements 0.96003
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25695
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/
5
reference_url https://www.postgresql.org/support/security/CVE-2020-25695/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2020-25695/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1894425
reference_id 1894425
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1894425
7
reference_url https://security.archlinux.org/ASA-202011-14
reference_id ASA-202011-14
reference_type
scores
url https://security.archlinux.org/ASA-202011-14
8
reference_url https://security.archlinux.org/AVG-1276
reference_id AVG-1276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1276
9
reference_url https://security.gentoo.org/glsa/202012-07
reference_id GLSA-202012-07
reference_type
scores
url https://security.gentoo.org/glsa/202012-07
10
reference_url https://access.redhat.com/errata/RHSA-2020:5316
reference_id RHSA-2020:5316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5316
11
reference_url https://access.redhat.com/errata/RHSA-2020:5317
reference_id RHSA-2020:5317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5317
12
reference_url https://access.redhat.com/errata/RHSA-2020:5567
reference_id RHSA-2020:5567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5567
13
reference_url https://access.redhat.com/errata/RHSA-2020:5619
reference_id RHSA-2020:5619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5619
14
reference_url https://access.redhat.com/errata/RHSA-2020:5620
reference_id RHSA-2020:5620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5620
15
reference_url https://access.redhat.com/errata/RHSA-2020:5661
reference_id RHSA-2020:5661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5661
16
reference_url https://access.redhat.com/errata/RHSA-2020:5664
reference_id RHSA-2020:5664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5664
17
reference_url https://access.redhat.com/errata/RHSA-2021:0161
reference_id RHSA-2021:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0161
18
reference_url https://access.redhat.com/errata/RHSA-2021:0163
reference_id RHSA-2021:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0163
19
reference_url https://access.redhat.com/errata/RHSA-2021:0164
reference_id RHSA-2021:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0164
20
reference_url https://access.redhat.com/errata/RHSA-2021:0166
reference_id RHSA-2021:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0166
21
reference_url https://access.redhat.com/errata/RHSA-2021:0167
reference_id RHSA-2021:0167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0167
22
reference_url https://access.redhat.com/errata/RHSA-2021:1512
reference_id RHSA-2021:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1512
23
reference_url https://usn.ubuntu.com/4633-1/
reference_id USN-4633-1
reference_type
scores
url https://usn.ubuntu.com/4633-1/
fixed_packages
0
url pkg:generic/postgresql@12.5.0
purl pkg:generic/postgresql@12.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0
1
url pkg:generic/postgresql@13.1.0
purl pkg:generic/postgresql@13.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0
aliases CVE-2020-25695
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdw5-v87c-zyfj
9
url VCID-brqx-ae92-83ep
vulnerability_id VCID-brqx-ae92-83ep
summary Partition constraint violation errors leak values of denied columnsmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3393.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3393.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3393
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28432
published_at 2026-04-01T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28405
published_at 2026-04-16T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.2839
published_at 2026-04-13T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28526
published_at 2026-04-02T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28568
published_at 2026-04-04T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28371
published_at 2026-04-07T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28436
published_at 2026-04-08T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28479
published_at 2026-04-09T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28439
published_at 2026-04-12T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28482
published_at 2026-04-11T12:55:00Z
10
value 0.00109
scoring_system epss
scoring_elements 0.2906
published_at 2026-04-24T12:55:00Z
11
value 0.00109
scoring_system epss
scoring_elements 0.29224
published_at 2026-04-18T12:55:00Z
12
value 0.00109
scoring_system epss
scoring_elements 0.2918
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3393
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3393
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-132-126-1111-1016-9621-and-9525-released-2165/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-132-126-1111-1016-9621-and-9525-released-2165/
5
reference_url https://www.postgresql.org/support/security/CVE-2021-3393/
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2021-3393/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1924005
reference_id 1924005
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1924005
7
reference_url https://security.archlinux.org/ASA-202102-31
reference_id ASA-202102-31
reference_type
scores
url https://security.archlinux.org/ASA-202102-31
8
reference_url https://security.archlinux.org/AVG-1567
reference_id AVG-1567
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1567
9
reference_url https://security.gentoo.org/glsa/202105-32
reference_id GLSA-202105-32
reference_type
scores
url https://security.gentoo.org/glsa/202105-32
10
reference_url https://access.redhat.com/errata/RHSA-2021:2372
reference_id RHSA-2021:2372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2372
11
reference_url https://access.redhat.com/errata/RHSA-2021:2389
reference_id RHSA-2021:2389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2389
12
reference_url https://access.redhat.com/errata/RHSA-2021:2394
reference_id RHSA-2021:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2394
13
reference_url https://usn.ubuntu.com/4735-1/
reference_id USN-4735-1
reference_type
scores
url https://usn.ubuntu.com/4735-1/
fixed_packages
0
url pkg:generic/postgresql@12.6.0
purl pkg:generic/postgresql@12.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.6.0
1
url pkg:generic/postgresql@13.2.0
purl pkg:generic/postgresql@13.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.2.0
aliases CVE-2021-3393
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-brqx-ae92-83ep
10
url VCID-cegf-gbkv-aqab
vulnerability_id VCID-cegf-gbkv-aqab
summary Uncontrolled search path element in logical replicationmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14349.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14349.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14349
reference_id
reference_type
scores
0
value 0.01548
scoring_system epss
scoring_elements 0.81342
published_at 2026-04-01T12:55:00Z
1
value 0.01548
scoring_system epss
scoring_elements 0.81466
published_at 2026-04-24T12:55:00Z
2
value 0.01548
scoring_system epss
scoring_elements 0.81443
published_at 2026-04-18T12:55:00Z
3
value 0.01548
scoring_system epss
scoring_elements 0.81445
published_at 2026-04-21T12:55:00Z
4
value 0.01548
scoring_system epss
scoring_elements 0.81351
published_at 2026-04-02T12:55:00Z
5
value 0.01548
scoring_system epss
scoring_elements 0.81373
published_at 2026-04-04T12:55:00Z
6
value 0.01548
scoring_system epss
scoring_elements 0.81371
published_at 2026-04-07T12:55:00Z
7
value 0.01548
scoring_system epss
scoring_elements 0.81399
published_at 2026-04-08T12:55:00Z
8
value 0.01548
scoring_system epss
scoring_elements 0.81404
published_at 2026-04-09T12:55:00Z
9
value 0.01548
scoring_system epss
scoring_elements 0.81425
published_at 2026-04-11T12:55:00Z
10
value 0.01548
scoring_system epss
scoring_elements 0.81413
published_at 2026-04-12T12:55:00Z
11
value 0.01548
scoring_system epss
scoring_elements 0.81405
published_at 2026-04-13T12:55:00Z
12
value 0.01548
scoring_system epss
scoring_elements 0.81442
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14349
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/
4
reference_url https://www.postgresql.org/support/security/CVE-2020-14349/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2020-14349/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865744
reference_id 1865744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865744
6
reference_url https://security.gentoo.org/glsa/202008-13
reference_id GLSA-202008-13
reference_type
scores
url https://security.gentoo.org/glsa/202008-13
7
reference_url https://access.redhat.com/errata/RHSA-2020:3669
reference_id RHSA-2020:3669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3669
8
reference_url https://access.redhat.com/errata/RHSA-2020:5110
reference_id RHSA-2020:5110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5110
9
reference_url https://access.redhat.com/errata/RHSA-2020:5112
reference_id RHSA-2020:5112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5112
10
reference_url https://access.redhat.com/errata/RHSA-2020:5620
reference_id RHSA-2020:5620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5620
11
reference_url https://access.redhat.com/errata/RHSA-2020:5664
reference_id RHSA-2020:5664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5664
12
reference_url https://access.redhat.com/errata/RHSA-2021:0163
reference_id RHSA-2021:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0163
13
reference_url https://access.redhat.com/errata/RHSA-2021:0166
reference_id RHSA-2021:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0166
14
reference_url https://access.redhat.com/errata/RHSA-2021:0988
reference_id RHSA-2021:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0988
15
reference_url https://usn.ubuntu.com/4472-1/
reference_id USN-4472-1
reference_type
scores
url https://usn.ubuntu.com/4472-1/
fixed_packages
0
url pkg:generic/postgresql@12.4.0
purl pkg:generic/postgresql@12.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.4.0
aliases CVE-2020-14349
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cegf-gbkv-aqab
11
url VCID-dv4x-n7v8-vyfh
vulnerability_id VCID-dv4x-n7v8-vyfh
summary Memory disclosure in partitioned-table UPDATE ... RETURNINGmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32029.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32029.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32029
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37703
published_at 2026-04-01T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37769
published_at 2026-04-21T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37831
published_at 2026-04-18T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37885
published_at 2026-04-02T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37909
published_at 2026-04-04T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37788
published_at 2026-04-07T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37838
published_at 2026-04-08T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37851
published_at 2026-04-16T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37866
published_at 2026-04-11T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37804
published_at 2026-04-13T12:55:00Z
10
value 0.00167
scoring_system epss
scoring_elements 0.37829
published_at 2026-04-12T12:55:00Z
11
value 0.00175
scoring_system epss
scoring_elements 0.38759
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32029
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/
7
reference_url https://www.postgresql.org/support/security/CVE-2021-32029/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2021-32029/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1956883
reference_id 1956883
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1956883
9
reference_url https://security.archlinux.org/ASA-202106-15
reference_id ASA-202106-15
reference_type
scores
url https://security.archlinux.org/ASA-202106-15
10
reference_url https://security.archlinux.org/AVG-1956
reference_id AVG-1956
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1956
11
reference_url https://access.redhat.com/errata/RHSA-2021:2372
reference_id RHSA-2021:2372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2372
12
reference_url https://access.redhat.com/errata/RHSA-2021:2375
reference_id RHSA-2021:2375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2375
13
reference_url https://access.redhat.com/errata/RHSA-2021:2389
reference_id RHSA-2021:2389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2389
14
reference_url https://access.redhat.com/errata/RHSA-2021:2394
reference_id RHSA-2021:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2394
15
reference_url https://access.redhat.com/errata/RHSA-2021:2396
reference_id RHSA-2021:2396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2396
16
reference_url https://usn.ubuntu.com/4972-1/
reference_id USN-4972-1
reference_type
scores
url https://usn.ubuntu.com/4972-1/
fixed_packages
0
url pkg:generic/postgresql@12.7.0
purl pkg:generic/postgresql@12.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0
1
url pkg:generic/postgresql@13.3.0
purl pkg:generic/postgresql@13.3.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0
aliases CVE-2021-32029
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dv4x-n7v8-vyfh
12
url VCID-dwqe-a6p3-tyf6
vulnerability_id VCID-dwqe-a6p3-tyf6
summary Buffer overrun from integer overflow in array modificationmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5869.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5869.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5869
reference_id
reference_type
scores
0
value 0.01608
scoring_system epss
scoring_elements 0.81784
published_at 2026-04-18T12:55:00Z
1
value 0.01608
scoring_system epss
scoring_elements 0.81692
published_at 2026-04-02T12:55:00Z
2
value 0.01608
scoring_system epss
scoring_elements 0.81716
published_at 2026-04-04T12:55:00Z
3
value 0.01608
scoring_system epss
scoring_elements 0.81713
published_at 2026-04-07T12:55:00Z
4
value 0.01608
scoring_system epss
scoring_elements 0.81739
published_at 2026-04-08T12:55:00Z
5
value 0.01608
scoring_system epss
scoring_elements 0.81744
published_at 2026-04-09T12:55:00Z
6
value 0.01608
scoring_system epss
scoring_elements 0.81763
published_at 2026-04-11T12:55:00Z
7
value 0.01608
scoring_system epss
scoring_elements 0.81751
published_at 2026-04-12T12:55:00Z
8
value 0.01608
scoring_system epss
scoring_elements 0.81783
published_at 2026-04-16T12:55:00Z
9
value 0.01608
scoring_system epss
scoring_elements 0.81745
published_at 2026-04-13T12:55:00Z
10
value 0.01652
scoring_system epss
scoring_elements 0.82078
published_at 2026-04-24T12:55:00Z
11
value 0.01652
scoring_system epss
scoring_elements 0.82055
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5869
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
8
reference_url https://www.postgresql.org/support/security/CVE-2023-5869/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2023-5869/
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
reference_id 1056283
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2247169
reference_id 2247169
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2247169
11
reference_url https://security.gentoo.org/glsa/202408-06
reference_id GLSA-202408-06
reference_type
scores
url https://security.gentoo.org/glsa/202408-06
12
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7545
13
reference_url https://access.redhat.com/errata/RHSA-2023:7579
reference_id RHSA-2023:7579
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7579
14
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7580
15
reference_url https://access.redhat.com/errata/RHSA-2023:7581
reference_id RHSA-2023:7581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7581
16
reference_url https://access.redhat.com/errata/RHSA-2023:7616
reference_id RHSA-2023:7616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7616
17
reference_url https://access.redhat.com/errata/RHSA-2023:7656
reference_id RHSA-2023:7656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7656
18
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7666
19
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7667
20
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7694
21
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7695
22
reference_url https://access.redhat.com/errata/RHSA-2023:7714
reference_id RHSA-2023:7714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7714
23
reference_url https://access.redhat.com/errata/RHSA-2023:7770
reference_id RHSA-2023:7770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7770
24
reference_url https://access.redhat.com/errata/RHSA-2023:7771
reference_id RHSA-2023:7771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7771
25
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7772
26
reference_url https://access.redhat.com/errata/RHSA-2023:7778
reference_id RHSA-2023:7778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7778
27
reference_url https://access.redhat.com/errata/RHSA-2023:7783
reference_id RHSA-2023:7783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7783
28
reference_url https://access.redhat.com/errata/RHSA-2023:7784
reference_id RHSA-2023:7784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7784
29
reference_url https://access.redhat.com/errata/RHSA-2023:7785
reference_id RHSA-2023:7785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7785
30
reference_url https://access.redhat.com/errata/RHSA-2023:7786
reference_id RHSA-2023:7786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7786
31
reference_url https://access.redhat.com/errata/RHSA-2023:7788
reference_id RHSA-2023:7788
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7788
32
reference_url https://access.redhat.com/errata/RHSA-2023:7789
reference_id RHSA-2023:7789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7789
33
reference_url https://access.redhat.com/errata/RHSA-2023:7790
reference_id RHSA-2023:7790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7790
34
reference_url https://access.redhat.com/errata/RHSA-2023:7878
reference_id RHSA-2023:7878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7878
35
reference_url https://access.redhat.com/errata/RHSA-2023:7883
reference_id RHSA-2023:7883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7883
36
reference_url https://access.redhat.com/errata/RHSA-2023:7884
reference_id RHSA-2023:7884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7884
37
reference_url https://access.redhat.com/errata/RHSA-2023:7885
reference_id RHSA-2023:7885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7885
38
reference_url https://access.redhat.com/errata/RHSA-2024:0304
reference_id RHSA-2024:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0304
39
reference_url https://access.redhat.com/errata/RHSA-2024:0332
reference_id RHSA-2024:0332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0332
40
reference_url https://access.redhat.com/errata/RHSA-2024:0337
reference_id RHSA-2024:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0337
41
reference_url https://usn.ubuntu.com/6538-1/
reference_id USN-6538-1
reference_type
scores
url https://usn.ubuntu.com/6538-1/
42
reference_url https://usn.ubuntu.com/6538-2/
reference_id USN-6538-2
reference_type
scores
url https://usn.ubuntu.com/6538-2/
43
reference_url https://usn.ubuntu.com/6570-1/
reference_id USN-6570-1
reference_type
scores
url https://usn.ubuntu.com/6570-1/
fixed_packages
0
url pkg:generic/postgresql@12.17.0
purl pkg:generic/postgresql@12.17.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.17.0
1
url pkg:generic/postgresql@13.13.0
purl pkg:generic/postgresql@13.13.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.13.0
2
url pkg:generic/postgresql@14.10.0
purl pkg:generic/postgresql@14.10.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.10.0
3
url pkg:generic/postgresql@15.5.0
purl pkg:generic/postgresql@15.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.5.0
4
url pkg:generic/postgresql@16.1.0
purl pkg:generic/postgresql@16.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.1.0
aliases CVE-2023-5869
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dwqe-a6p3-tyf6
13
url VCID-j4cc-p1t3-tydy
vulnerability_id VCID-j4cc-p1t3-tydy
summary PostgreSQL non-owner REFRESH MATERIALIZED VIEW CONCURRENTLY executes arbitrary SQLmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0985.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0985.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0985
reference_id
reference_type
scores
0
value 0.00753
scoring_system epss
scoring_elements 0.73264
published_at 2026-04-18T12:55:00Z
1
value 0.00753
scoring_system epss
scoring_elements 0.73255
published_at 2026-04-16T12:55:00Z
2
value 0.00753
scoring_system epss
scoring_elements 0.73218
published_at 2026-04-12T12:55:00Z
3
value 0.00753
scoring_system epss
scoring_elements 0.73237
published_at 2026-04-11T12:55:00Z
4
value 0.00753
scoring_system epss
scoring_elements 0.73212
published_at 2026-04-13T12:55:00Z
5
value 0.00753
scoring_system epss
scoring_elements 0.73199
published_at 2026-04-08T12:55:00Z
6
value 0.00753
scoring_system epss
scoring_elements 0.73163
published_at 2026-04-07T12:55:00Z
7
value 0.00753
scoring_system epss
scoring_elements 0.73188
published_at 2026-04-04T12:55:00Z
8
value 0.00753
scoring_system epss
scoring_elements 0.73167
published_at 2026-04-02T12:55:00Z
9
value 0.00774
scoring_system epss
scoring_elements 0.73667
published_at 2026-04-24T12:55:00Z
10
value 0.00774
scoring_system epss
scoring_elements 0.73634
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0985
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-162-156-1411-1314-and-1218-released-2807/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-162-156-1411-1314-and-1218-released-2807/
5
reference_url https://www.postgresql.org/support/security/CVE-2024-0985/
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H']
1
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-16T05:00:50Z/
url https://www.postgresql.org/support/security/CVE-2024-0985/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2263384
reference_id 2263384
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2263384
7
reference_url https://security.gentoo.org/glsa/202408-06
reference_id GLSA-202408-06
reference_type
scores
url https://security.gentoo.org/glsa/202408-06
8
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-16T05:00:50Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00017.html
9
reference_url https://saites.dev/projects/personal/postgres-cve-2024-0985/
reference_id postgres-cve-2024-0985
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-16T05:00:50Z/
url https://saites.dev/projects/personal/postgres-cve-2024-0985/
10
reference_url https://access.redhat.com/errata/RHSA-2024:0950
reference_id RHSA-2024:0950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0950
11
reference_url https://access.redhat.com/errata/RHSA-2024:0951
reference_id RHSA-2024:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0951
12
reference_url https://access.redhat.com/errata/RHSA-2024:0956
reference_id RHSA-2024:0956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0956
13
reference_url https://access.redhat.com/errata/RHSA-2024:0973
reference_id RHSA-2024:0973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0973
14
reference_url https://access.redhat.com/errata/RHSA-2024:0974
reference_id RHSA-2024:0974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0974
15
reference_url https://access.redhat.com/errata/RHSA-2024:0975
reference_id RHSA-2024:0975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0975
16
reference_url https://access.redhat.com/errata/RHSA-2024:0988
reference_id RHSA-2024:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0988
17
reference_url https://access.redhat.com/errata/RHSA-2024:0990
reference_id RHSA-2024:0990
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0990
18
reference_url https://access.redhat.com/errata/RHSA-2024:0992
reference_id RHSA-2024:0992
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0992
19
reference_url https://access.redhat.com/errata/RHSA-2024:1017
reference_id RHSA-2024:1017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1017
20
reference_url https://access.redhat.com/errata/RHSA-2024:1069
reference_id RHSA-2024:1069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1069
21
reference_url https://access.redhat.com/errata/RHSA-2024:1070
reference_id RHSA-2024:1070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1070
22
reference_url https://access.redhat.com/errata/RHSA-2024:1071
reference_id RHSA-2024:1071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1071
23
reference_url https://access.redhat.com/errata/RHSA-2024:1195
reference_id RHSA-2024:1195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1195
24
reference_url https://access.redhat.com/errata/RHSA-2024:1240
reference_id RHSA-2024:1240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1240
25
reference_url https://access.redhat.com/errata/RHSA-2024:1241
reference_id RHSA-2024:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1241
26
reference_url https://access.redhat.com/errata/RHSA-2024:1314
reference_id RHSA-2024:1314
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1314
27
reference_url https://access.redhat.com/errata/RHSA-2024:1315
reference_id RHSA-2024:1315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1315
28
reference_url https://access.redhat.com/errata/RHSA-2024:1348
reference_id RHSA-2024:1348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1348
29
reference_url https://access.redhat.com/errata/RHSA-2024:1422
reference_id RHSA-2024:1422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1422
30
reference_url https://access.redhat.com/errata/RHSA-2024:1426
reference_id RHSA-2024:1426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1426
31
reference_url https://access.redhat.com/errata/RHSA-2024:1428
reference_id RHSA-2024:1428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1428
32
reference_url https://access.redhat.com/errata/RHSA-2024:1429
reference_id RHSA-2024:1429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1429
33
reference_url https://access.redhat.com/errata/RHSA-2024:1437
reference_id RHSA-2024:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1437
34
reference_url https://usn.ubuntu.com/6656-1/
reference_id USN-6656-1
reference_type
scores
url https://usn.ubuntu.com/6656-1/
35
reference_url https://usn.ubuntu.com/6656-2/
reference_id USN-6656-2
reference_type
scores
url https://usn.ubuntu.com/6656-2/
fixed_packages
0
url pkg:generic/postgresql@12.18.0
purl pkg:generic/postgresql@12.18.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.18.0
1
url pkg:generic/postgresql@13.14.0
purl pkg:generic/postgresql@13.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.14.0
2
url pkg:generic/postgresql@14.11.0
purl pkg:generic/postgresql@14.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.11.0
3
url pkg:generic/postgresql@15.6.0
purl pkg:generic/postgresql@15.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.6.0
4
url pkg:generic/postgresql@16.2.0
purl pkg:generic/postgresql@16.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.2.0
aliases CVE-2024-0985
risk_score 3.6
exploitability 0.5
weighted_severity 7.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j4cc-p1t3-tydy
14
url VCID-nuek-ypyh-b3dm
vulnerability_id VCID-nuek-ypyh-b3dm
summary Extension scripts replace objects not belonging to the extensionmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2625
reference_id
reference_type
scores
0
value 0.00973
scoring_system epss
scoring_elements 0.76737
published_at 2026-04-24T12:55:00Z
1
value 0.00973
scoring_system epss
scoring_elements 0.76717
published_at 2026-04-18T12:55:00Z
2
value 0.00973
scoring_system epss
scoring_elements 0.76706
published_at 2026-04-21T12:55:00Z
3
value 0.00973
scoring_system epss
scoring_elements 0.76616
published_at 2026-04-02T12:55:00Z
4
value 0.00973
scoring_system epss
scoring_elements 0.76645
published_at 2026-04-04T12:55:00Z
5
value 0.00973
scoring_system epss
scoring_elements 0.76627
published_at 2026-04-07T12:55:00Z
6
value 0.00973
scoring_system epss
scoring_elements 0.7666
published_at 2026-04-08T12:55:00Z
7
value 0.00973
scoring_system epss
scoring_elements 0.76671
published_at 2026-04-09T12:55:00Z
8
value 0.00973
scoring_system epss
scoring_elements 0.76698
published_at 2026-04-11T12:55:00Z
9
value 0.00973
scoring_system epss
scoring_elements 0.76678
published_at 2026-04-12T12:55:00Z
10
value 0.00973
scoring_system epss
scoring_elements 0.7667
published_at 2026-04-13T12:55:00Z
11
value 0.00973
scoring_system epss
scoring_elements 0.76712
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2625
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/
5
reference_url https://www.postgresql.org/support/security/CVE-2022-2625/
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2022-2625/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2113825
reference_id 2113825
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2113825
7
reference_url https://security.gentoo.org/glsa/202211-04
reference_id GLSA-202211-04
reference_type
scores
url https://security.gentoo.org/glsa/202211-04
8
reference_url https://access.redhat.com/errata/RHSA-2022:7128
reference_id RHSA-2022:7128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7128
9
reference_url https://access.redhat.com/errata/RHSA-2023:0113
reference_id RHSA-2023:0113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0113
10
reference_url https://access.redhat.com/errata/RHSA-2023:0160
reference_id RHSA-2023:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0160
11
reference_url https://access.redhat.com/errata/RHSA-2023:1576
reference_id RHSA-2023:1576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1576
12
reference_url https://access.redhat.com/errata/RHSA-2023:1693
reference_id RHSA-2023:1693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1693
13
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7545
14
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7580
15
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7667
16
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7694
17
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7695
18
reference_url https://usn.ubuntu.com/5571-1/
reference_id USN-5571-1
reference_type
scores
url https://usn.ubuntu.com/5571-1/
fixed_packages
0
url pkg:generic/postgresql@12.12.0
purl pkg:generic/postgresql@12.12.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.12.0
1
url pkg:generic/postgresql@13.8.0
purl pkg:generic/postgresql@13.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.8.0
2
url pkg:generic/postgresql@14.5.0
purl pkg:generic/postgresql@14.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.5.0
aliases CVE-2022-2625
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nuek-ypyh-b3dm
15
url VCID-nwfr-t7xn-zuae
vulnerability_id VCID-nwfr-t7xn-zuae
summary Role "pg_signal_backend" can signal certain superuser processesmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5870.json
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5870.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5870
reference_id
reference_type
scores
0
value 0.00621
scoring_system epss
scoring_elements 0.70153
published_at 2026-04-24T12:55:00Z
1
value 0.00621
scoring_system epss
scoring_elements 0.70075
published_at 2026-04-09T12:55:00Z
2
value 0.00621
scoring_system epss
scoring_elements 0.70098
published_at 2026-04-11T12:55:00Z
3
value 0.00621
scoring_system epss
scoring_elements 0.70083
published_at 2026-04-12T12:55:00Z
4
value 0.00621
scoring_system epss
scoring_elements 0.7007
published_at 2026-04-13T12:55:00Z
5
value 0.00621
scoring_system epss
scoring_elements 0.70113
published_at 2026-04-16T12:55:00Z
6
value 0.00621
scoring_system epss
scoring_elements 0.70123
published_at 2026-04-18T12:55:00Z
7
value 0.00621
scoring_system epss
scoring_elements 0.70102
published_at 2026-04-21T12:55:00Z
8
value 0.00621
scoring_system epss
scoring_elements 0.7002
published_at 2026-04-02T12:55:00Z
9
value 0.00621
scoring_system epss
scoring_elements 0.70035
published_at 2026-04-04T12:55:00Z
10
value 0.00621
scoring_system epss
scoring_elements 0.70011
published_at 2026-04-07T12:55:00Z
11
value 0.00621
scoring_system epss
scoring_elements 0.70059
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5870
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
8
reference_url https://www.postgresql.org/support/security/CVE-2023-5870/
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L']
1
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://www.postgresql.org/support/security/CVE-2023-5870/
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
reference_id 1056283
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2247170
reference_id 2247170
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2247170
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8
reference_id cpe:/a:redhat:advanced_cluster_security:3.74::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8
reference_id cpe:/a:redhat:advanced_cluster_security:4.1::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8
reference_id cpe:/a:redhat:advanced_cluster_security:4.2::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
reference_id cpe:/a:redhat:rhel_eus:9.0::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3
reference_id cpe:/a:redhat:rhel_software_collections:3
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7
reference_id cpe:/a:redhat:rhel_software_collections:3::el7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
35
reference_url https://access.redhat.com/security/cve/CVE-2023-5870
reference_id CVE-2023-5870
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/security/cve/CVE-2023-5870
36
reference_url https://security.gentoo.org/glsa/202408-06
reference_id GLSA-202408-06
reference_type
scores
url https://security.gentoo.org/glsa/202408-06
37
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7545
38
reference_url https://access.redhat.com/errata/RHSA-2023:7579
reference_id RHSA-2023:7579
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7579
39
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7580
40
reference_url https://access.redhat.com/errata/RHSA-2023:7581
reference_id RHSA-2023:7581
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7581
41
reference_url https://access.redhat.com/errata/RHSA-2023:7616
reference_id RHSA-2023:7616
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7616
42
reference_url https://access.redhat.com/errata/RHSA-2023:7656
reference_id RHSA-2023:7656
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7656
43
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7666
44
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7667
45
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7694
46
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7695
47
reference_url https://access.redhat.com/errata/RHSA-2023:7714
reference_id RHSA-2023:7714
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7714
48
reference_url https://access.redhat.com/errata/RHSA-2023:7770
reference_id RHSA-2023:7770
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7770
49
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7772
50
reference_url https://access.redhat.com/errata/RHSA-2023:7784
reference_id RHSA-2023:7784
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7784
51
reference_url https://access.redhat.com/errata/RHSA-2023:7785
reference_id RHSA-2023:7785
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7785
52
reference_url https://access.redhat.com/errata/RHSA-2023:7883
reference_id RHSA-2023:7883
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7883
53
reference_url https://access.redhat.com/errata/RHSA-2023:7884
reference_id RHSA-2023:7884
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7884
54
reference_url https://access.redhat.com/errata/RHSA-2023:7885
reference_id RHSA-2023:7885
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7885
55
reference_url https://access.redhat.com/errata/RHSA-2024:0304
reference_id RHSA-2024:0304
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2024:0304
56
reference_url https://access.redhat.com/errata/RHSA-2024:0332
reference_id RHSA-2024:0332
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2024:0332
57
reference_url https://access.redhat.com/errata/RHSA-2024:0337
reference_id RHSA-2024:0337
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2024:0337
58
reference_url https://usn.ubuntu.com/6538-1/
reference_id USN-6538-1
reference_type
scores
url https://usn.ubuntu.com/6538-1/
59
reference_url https://usn.ubuntu.com/6538-2/
reference_id USN-6538-2
reference_type
scores
url https://usn.ubuntu.com/6538-2/
60
reference_url https://usn.ubuntu.com/6570-1/
reference_id USN-6570-1
reference_type
scores
url https://usn.ubuntu.com/6570-1/
fixed_packages
0
url pkg:generic/postgresql@12.17.0
purl pkg:generic/postgresql@12.17.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.17.0
1
url pkg:generic/postgresql@13.13.0
purl pkg:generic/postgresql@13.13.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.13.0
2
url pkg:generic/postgresql@14.10.0
purl pkg:generic/postgresql@14.10.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.10.0
3
url pkg:generic/postgresql@15.5.0
purl pkg:generic/postgresql@15.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.5.0
4
url pkg:generic/postgresql@16.1.0
purl pkg:generic/postgresql@16.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.1.0
aliases CVE-2023-5870
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nwfr-t7xn-zuae
16
url VCID-q5z4-wv12-1fh7
vulnerability_id VCID-q5z4-wv12-1fh7
summary Memory disclosure in aggregate function callsmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5868.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5868.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5868
reference_id
reference_type
scores
0
value 0.02718
scoring_system epss
scoring_elements 0.85963
published_at 2026-04-24T12:55:00Z
1
value 0.02718
scoring_system epss
scoring_elements 0.85952
published_at 2026-04-18T12:55:00Z
2
value 0.02718
scoring_system epss
scoring_elements 0.85943
published_at 2026-04-21T12:55:00Z
3
value 0.02718
scoring_system epss
scoring_elements 0.85874
published_at 2026-04-02T12:55:00Z
4
value 0.02718
scoring_system epss
scoring_elements 0.85891
published_at 2026-04-04T12:55:00Z
5
value 0.02718
scoring_system epss
scoring_elements 0.85894
published_at 2026-04-07T12:55:00Z
6
value 0.02718
scoring_system epss
scoring_elements 0.85913
published_at 2026-04-08T12:55:00Z
7
value 0.02718
scoring_system epss
scoring_elements 0.85923
published_at 2026-04-09T12:55:00Z
8
value 0.02718
scoring_system epss
scoring_elements 0.85937
published_at 2026-04-11T12:55:00Z
9
value 0.02718
scoring_system epss
scoring_elements 0.85935
published_at 2026-04-12T12:55:00Z
10
value 0.02718
scoring_system epss
scoring_elements 0.8593
published_at 2026-04-13T12:55:00Z
11
value 0.02718
scoring_system epss
scoring_elements 0.85949
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5868
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
8
reference_url https://www.postgresql.org/support/security/CVE-2023-5868/
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2023-5868/
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
reference_id 1056283
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2247168
reference_id 2247168
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2247168
11
reference_url https://security.gentoo.org/glsa/202408-06
reference_id GLSA-202408-06
reference_type
scores
url https://security.gentoo.org/glsa/202408-06
12
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7545
13
reference_url https://access.redhat.com/errata/RHSA-2023:7579
reference_id RHSA-2023:7579
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7579
14
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7580
15
reference_url https://access.redhat.com/errata/RHSA-2023:7581
reference_id RHSA-2023:7581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7581
16
reference_url https://access.redhat.com/errata/RHSA-2023:7616
reference_id RHSA-2023:7616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7616
17
reference_url https://access.redhat.com/errata/RHSA-2023:7656
reference_id RHSA-2023:7656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7656
18
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7666
19
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7667
20
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7694
21
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7695
22
reference_url https://access.redhat.com/errata/RHSA-2023:7714
reference_id RHSA-2023:7714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7714
23
reference_url https://access.redhat.com/errata/RHSA-2023:7770
reference_id RHSA-2023:7770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7770
24
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7772
25
reference_url https://access.redhat.com/errata/RHSA-2023:7784
reference_id RHSA-2023:7784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7784
26
reference_url https://access.redhat.com/errata/RHSA-2023:7785
reference_id RHSA-2023:7785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7785
27
reference_url https://access.redhat.com/errata/RHSA-2023:7883
reference_id RHSA-2023:7883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7883
28
reference_url https://access.redhat.com/errata/RHSA-2023:7884
reference_id RHSA-2023:7884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7884
29
reference_url https://access.redhat.com/errata/RHSA-2023:7885
reference_id RHSA-2023:7885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7885
30
reference_url https://access.redhat.com/errata/RHSA-2024:0304
reference_id RHSA-2024:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0304
31
reference_url https://access.redhat.com/errata/RHSA-2024:0332
reference_id RHSA-2024:0332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0332
32
reference_url https://access.redhat.com/errata/RHSA-2024:0337
reference_id RHSA-2024:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0337
33
reference_url https://usn.ubuntu.com/6538-1/
reference_id USN-6538-1
reference_type
scores
url https://usn.ubuntu.com/6538-1/
34
reference_url https://usn.ubuntu.com/6538-2/
reference_id USN-6538-2
reference_type
scores
url https://usn.ubuntu.com/6538-2/
fixed_packages
0
url pkg:generic/postgresql@12.17.0
purl pkg:generic/postgresql@12.17.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.17.0
1
url pkg:generic/postgresql@13.13.0
purl pkg:generic/postgresql@13.13.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.13.0
2
url pkg:generic/postgresql@14.10.0
purl pkg:generic/postgresql@14.10.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.10.0
3
url pkg:generic/postgresql@15.5.0
purl pkg:generic/postgresql@15.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.5.0
4
url pkg:generic/postgresql@16.1.0
purl pkg:generic/postgresql@16.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.1.0
aliases CVE-2023-5868
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5z4-wv12-1fh7
17
url VCID-q8ka-5dxw-w7fs
vulnerability_id VCID-q8ka-5dxw-w7fs
summary Autovacuum, REINDEX, and others omit "security restricted operation" sandboxmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1552.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1552.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1552
reference_id
reference_type
scores
0
value 0.02263
scoring_system epss
scoring_elements 0.84548
published_at 2026-04-01T12:55:00Z
1
value 0.02263
scoring_system epss
scoring_elements 0.84675
published_at 2026-04-24T12:55:00Z
2
value 0.02263
scoring_system epss
scoring_elements 0.84646
published_at 2026-04-16T12:55:00Z
3
value 0.02263
scoring_system epss
scoring_elements 0.84647
published_at 2026-04-18T12:55:00Z
4
value 0.02263
scoring_system epss
scoring_elements 0.84648
published_at 2026-04-21T12:55:00Z
5
value 0.02263
scoring_system epss
scoring_elements 0.84563
published_at 2026-04-02T12:55:00Z
6
value 0.02263
scoring_system epss
scoring_elements 0.84585
published_at 2026-04-04T12:55:00Z
7
value 0.02263
scoring_system epss
scoring_elements 0.84588
published_at 2026-04-07T12:55:00Z
8
value 0.02263
scoring_system epss
scoring_elements 0.84609
published_at 2026-04-08T12:55:00Z
9
value 0.02263
scoring_system epss
scoring_elements 0.84616
published_at 2026-04-09T12:55:00Z
10
value 0.02263
scoring_system epss
scoring_elements 0.84635
published_at 2026-04-11T12:55:00Z
11
value 0.02263
scoring_system epss
scoring_elements 0.8463
published_at 2026-04-12T12:55:00Z
12
value 0.02263
scoring_system epss
scoring_elements 0.84625
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1552
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
5
reference_url https://www.postgresql.org/support/security/CVE-2022-1552/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2022-1552/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2081126
reference_id 2081126
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2081126
7
reference_url https://security.archlinux.org/AVG-2719
reference_id AVG-2719
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2719
8
reference_url https://security.gentoo.org/glsa/202211-04
reference_id GLSA-202211-04
reference_type
scores
url https://security.gentoo.org/glsa/202211-04
9
reference_url https://access.redhat.com/errata/RHSA-2022:4771
reference_id RHSA-2022:4771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4771
10
reference_url https://access.redhat.com/errata/RHSA-2022:4805
reference_id RHSA-2022:4805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4805
11
reference_url https://access.redhat.com/errata/RHSA-2022:4807
reference_id RHSA-2022:4807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4807
12
reference_url https://access.redhat.com/errata/RHSA-2022:4854
reference_id RHSA-2022:4854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4854
13
reference_url https://access.redhat.com/errata/RHSA-2022:4855
reference_id RHSA-2022:4855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4855
14
reference_url https://access.redhat.com/errata/RHSA-2022:4856
reference_id RHSA-2022:4856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4856
15
reference_url https://access.redhat.com/errata/RHSA-2022:4857
reference_id RHSA-2022:4857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4857
16
reference_url https://access.redhat.com/errata/RHSA-2022:4893
reference_id RHSA-2022:4893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4893
17
reference_url https://access.redhat.com/errata/RHSA-2022:4894
reference_id RHSA-2022:4894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4894
18
reference_url https://access.redhat.com/errata/RHSA-2022:4895
reference_id RHSA-2022:4895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4895
19
reference_url https://access.redhat.com/errata/RHSA-2022:4913
reference_id RHSA-2022:4913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4913
20
reference_url https://access.redhat.com/errata/RHSA-2022:4915
reference_id RHSA-2022:4915
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4915
21
reference_url https://access.redhat.com/errata/RHSA-2022:4929
reference_id RHSA-2022:4929
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4929
22
reference_url https://access.redhat.com/errata/RHSA-2022:5162
reference_id RHSA-2022:5162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5162
23
reference_url https://usn.ubuntu.com/5440-1/
reference_id USN-5440-1
reference_type
scores
url https://usn.ubuntu.com/5440-1/
24
reference_url https://usn.ubuntu.com/5676-1/
reference_id USN-5676-1
reference_type
scores
url https://usn.ubuntu.com/5676-1/
fixed_packages
0
url pkg:generic/postgresql@12.11.0
purl pkg:generic/postgresql@12.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.11.0
1
url pkg:generic/postgresql@13.7.0
purl pkg:generic/postgresql@13.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.7.0
2
url pkg:generic/postgresql@14.3.0
purl pkg:generic/postgresql@14.3.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.3.0
aliases CVE-2022-1552
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q8ka-5dxw-w7fs
18
url VCID-qbd9-mpc6-5bap
vulnerability_id VCID-qbd9-mpc6-5bap
summary libpq processes unencrypted bytes from man-in-the-middlemore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23222.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23222.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23222
reference_id
reference_type
scores
0
value 0.00281
scoring_system epss
scoring_elements 0.51508
published_at 2026-04-24T12:55:00Z
1
value 0.00281
scoring_system epss
scoring_elements 0.51555
published_at 2026-04-21T12:55:00Z
2
value 0.00281
scoring_system epss
scoring_elements 0.51576
published_at 2026-04-18T12:55:00Z
3
value 0.00282
scoring_system epss
scoring_elements 0.51523
published_at 2026-04-07T12:55:00Z
4
value 0.00282
scoring_system epss
scoring_elements 0.51574
published_at 2026-04-09T12:55:00Z
5
value 0.00282
scoring_system epss
scoring_elements 0.51624
published_at 2026-04-11T12:55:00Z
6
value 0.00282
scoring_system epss
scoring_elements 0.51602
published_at 2026-04-12T12:55:00Z
7
value 0.00282
scoring_system epss
scoring_elements 0.51586
published_at 2026-04-13T12:55:00Z
8
value 0.00282
scoring_system epss
scoring_elements 0.51628
published_at 2026-04-16T12:55:00Z
9
value 0.00282
scoring_system epss
scoring_elements 0.51577
published_at 2026-04-08T12:55:00Z
10
value 0.00282
scoring_system epss
scoring_elements 0.51484
published_at 2026-04-01T12:55:00Z
11
value 0.00282
scoring_system epss
scoring_elements 0.51535
published_at 2026-04-02T12:55:00Z
12
value 0.00282
scoring_system epss
scoring_elements 0.51562
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
6
reference_url https://www.postgresql.org/support/security/CVE-2021-23222/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2021-23222/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2022675
reference_id 2022675
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2022675
8
reference_url https://security.archlinux.org/AVG-2547
reference_id AVG-2547
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2547
9
reference_url https://security.gentoo.org/glsa/202211-04
reference_id GLSA-202211-04
reference_type
scores
url https://security.gentoo.org/glsa/202211-04
10
reference_url https://access.redhat.com/errata/RHSA-2021:5179
reference_id RHSA-2021:5179
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5179
11
reference_url https://access.redhat.com/errata/RHSA-2021:5197
reference_id RHSA-2021:5197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5197
12
reference_url https://access.redhat.com/errata/RHSA-2022:1891
reference_id RHSA-2022:1891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1891
13
reference_url https://usn.ubuntu.com/5145-1/
reference_id USN-5145-1
reference_type
scores
url https://usn.ubuntu.com/5145-1/
14
reference_url https://usn.ubuntu.com/5765-1/
reference_id USN-5765-1
reference_type
scores
url https://usn.ubuntu.com/5765-1/
fixed_packages
0
url pkg:generic/postgresql@12.9.0
purl pkg:generic/postgresql@12.9.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.9.0
1
url pkg:generic/postgresql@13.5.0
purl pkg:generic/postgresql@13.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.5.0
2
url pkg:generic/postgresql@14.1.0
purl pkg:generic/postgresql@14.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.1.0
aliases CVE-2021-23222
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbd9-mpc6-5bap
19
url VCID-rac3-kfb9-efgf
vulnerability_id VCID-rac3-kfb9-efgf
summary PostgreSQL row security below e.g. subqueries disregards user ID changesmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10976.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10976.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10976
reference_id
reference_type
scores
0
value 0.01099
scoring_system epss
scoring_elements 0.78062
published_at 2026-04-18T12:55:00Z
1
value 0.01099
scoring_system epss
scoring_elements 0.78063
published_at 2026-04-16T12:55:00Z
2
value 0.01099
scoring_system epss
scoring_elements 0.78028
published_at 2026-04-13T12:55:00Z
3
value 0.01099
scoring_system epss
scoring_elements 0.77979
published_at 2026-04-02T12:55:00Z
4
value 0.01099
scoring_system epss
scoring_elements 0.78008
published_at 2026-04-04T12:55:00Z
5
value 0.01099
scoring_system epss
scoring_elements 0.7799
published_at 2026-04-07T12:55:00Z
6
value 0.01099
scoring_system epss
scoring_elements 0.78017
published_at 2026-04-08T12:55:00Z
7
value 0.01099
scoring_system epss
scoring_elements 0.78021
published_at 2026-04-09T12:55:00Z
8
value 0.01099
scoring_system epss
scoring_elements 0.7803
published_at 2026-04-12T12:55:00Z
9
value 0.01099
scoring_system epss
scoring_elements 0.78048
published_at 2026-04-11T12:55:00Z
10
value 0.01129
scoring_system epss
scoring_elements 0.78366
published_at 2026-04-24T12:55:00Z
11
value 0.01129
scoring_system epss
scoring_elements 0.78333
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10976
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10976
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/
5
reference_url https://www.postgresql.org/support/security/CVE-2024-10976/
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N']
1
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-14T18:53:41Z/
url https://www.postgresql.org/support/security/CVE-2024-10976/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2326263
reference_id 2326263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2326263
7
reference_url https://security.gentoo.org/glsa/202412-12
reference_id GLSA-202412-12
reference_type
scores
url https://security.gentoo.org/glsa/202412-12
8
reference_url https://access.redhat.com/errata/RHSA-2024:10785
reference_id RHSA-2024:10785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10785
9
reference_url https://access.redhat.com/errata/RHSA-2024:10787
reference_id RHSA-2024:10787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10787
10
reference_url https://access.redhat.com/errata/RHSA-2024:10788
reference_id RHSA-2024:10788
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10788
11
reference_url https://access.redhat.com/errata/RHSA-2024:10791
reference_id RHSA-2024:10791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10791
12
reference_url https://access.redhat.com/errata/RHSA-2024:10830
reference_id RHSA-2024:10830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10830
13
reference_url https://access.redhat.com/errata/RHSA-2024:10831
reference_id RHSA-2024:10831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10831
14
reference_url https://access.redhat.com/errata/RHSA-2024:10832
reference_id RHSA-2024:10832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10832
15
reference_url https://usn.ubuntu.com/7132-1/
reference_id USN-7132-1
reference_type
scores
url https://usn.ubuntu.com/7132-1/
16
reference_url https://usn.ubuntu.com/7358-1/
reference_id USN-7358-1
reference_type
scores
url https://usn.ubuntu.com/7358-1/
fixed_packages
0
url pkg:generic/postgresql@12.21.0
purl pkg:generic/postgresql@12.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.21.0
1
url pkg:generic/postgresql@13.17.0
purl pkg:generic/postgresql@13.17.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.17.0
2
url pkg:generic/postgresql@14.14.0
purl pkg:generic/postgresql@14.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.14.0
3
url pkg:generic/postgresql@15.9.0
purl pkg:generic/postgresql@15.9.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.9.0
4
url pkg:generic/postgresql@16.5.0
purl pkg:generic/postgresql@16.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.5.0
5
url pkg:generic/postgresql@17.1.0
purl pkg:generic/postgresql@17.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@17.1.0
aliases CVE-2024-10976
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rac3-kfb9-efgf
20
url VCID-srbh-8fdq-bkc2
vulnerability_id VCID-srbh-8fdq-bkc2
summary Server processes unencrypted bytes from man-in-the-middlemore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23214.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23214.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23214
reference_id
reference_type
scores
0
value 0.00193
scoring_system epss
scoring_elements 0.41154
published_at 2026-04-21T12:55:00Z
1
value 0.00193
scoring_system epss
scoring_elements 0.41043
published_at 2026-04-24T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.4157
published_at 2026-04-01T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45209
published_at 2026-04-09T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.4519
published_at 2026-04-02T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45213
published_at 2026-04-04T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45155
published_at 2026-04-07T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.452
published_at 2026-04-13T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45251
published_at 2026-04-16T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.45245
published_at 2026-04-18T12:55:00Z
10
value 0.00225
scoring_system epss
scoring_elements 0.4523
published_at 2026-04-11T12:55:00Z
11
value 0.00225
scoring_system epss
scoring_elements 0.45197
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23214
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
6
reference_url https://www.postgresql.org/support/security/CVE-2021-23214/
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2021-23214/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2022666
reference_id 2022666
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2022666
8
reference_url https://security.archlinux.org/ASA-202204-1
reference_id ASA-202204-1
reference_type
scores
url https://security.archlinux.org/ASA-202204-1
9
reference_url https://security.archlinux.org/AVG-2546
reference_id AVG-2546
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2546
10
reference_url https://security.gentoo.org/glsa/202211-04
reference_id GLSA-202211-04
reference_type
scores
url https://security.gentoo.org/glsa/202211-04
11
reference_url https://access.redhat.com/errata/RHSA-2021:5179
reference_id RHSA-2021:5179
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5179
12
reference_url https://access.redhat.com/errata/RHSA-2021:5197
reference_id RHSA-2021:5197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5197
13
reference_url https://access.redhat.com/errata/RHSA-2021:5235
reference_id RHSA-2021:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5235
14
reference_url https://access.redhat.com/errata/RHSA-2021:5236
reference_id RHSA-2021:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5236
15
reference_url https://access.redhat.com/errata/RHSA-2022:1830
reference_id RHSA-2022:1830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1830
16
reference_url https://usn.ubuntu.com/5145-1/
reference_id USN-5145-1
reference_type
scores
url https://usn.ubuntu.com/5145-1/
17
reference_url https://usn.ubuntu.com/5645-1/
reference_id USN-5645-1
reference_type
scores
url https://usn.ubuntu.com/5645-1/
fixed_packages
0
url pkg:generic/postgresql@12.9.0
purl pkg:generic/postgresql@12.9.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.9.0
1
url pkg:generic/postgresql@13.5.0
purl pkg:generic/postgresql@13.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.5.0
2
url pkg:generic/postgresql@14.1.0
purl pkg:generic/postgresql@14.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.1.0
aliases CVE-2021-23214
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-srbh-8fdq-bkc2
21
url VCID-u751-gq61-fbge
vulnerability_id VCID-u751-gq61-fbge
summary Client memory disclosure when connecting, with Kerberos, to modified servermore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41862.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41862.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41862
reference_id
reference_type
scores
0
value 0.0032
scoring_system epss
scoring_elements 0.55036
published_at 2026-04-24T12:55:00Z
1
value 0.0032
scoring_system epss
scoring_elements 0.55107
published_at 2026-04-08T12:55:00Z
2
value 0.0032
scoring_system epss
scoring_elements 0.55106
published_at 2026-04-09T12:55:00Z
3
value 0.0032
scoring_system epss
scoring_elements 0.55118
published_at 2026-04-11T12:55:00Z
4
value 0.0032
scoring_system epss
scoring_elements 0.55098
published_at 2026-04-12T12:55:00Z
5
value 0.0032
scoring_system epss
scoring_elements 0.55081
published_at 2026-04-13T12:55:00Z
6
value 0.0032
scoring_system epss
scoring_elements 0.55119
published_at 2026-04-16T12:55:00Z
7
value 0.0032
scoring_system epss
scoring_elements 0.55122
published_at 2026-04-18T12:55:00Z
8
value 0.0032
scoring_system epss
scoring_elements 0.55102
published_at 2026-04-21T12:55:00Z
9
value 0.0032
scoring_system epss
scoring_elements 0.55056
published_at 2026-04-02T12:55:00Z
10
value 0.0032
scoring_system epss
scoring_elements 0.55082
published_at 2026-04-04T12:55:00Z
11
value 0.0032
scoring_system epss
scoring_elements 0.55057
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41862
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41862
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-152-147-1310-1214-and-1119-released-2592/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-152-147-1310-1214-and-1119-released-2592/
5
reference_url https://www.postgresql.org/support/security/CVE-2022-41862/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N']
1
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T16:02:06Z/
url https://www.postgresql.org/support/security/CVE-2022-41862/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165722
reference_id 2165722
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T16:02:06Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2165722
7
reference_url https://security.netapp.com/advisory/ntap-20230427-0002/
reference_id ntap-20230427-0002
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T16:02:06Z/
url https://security.netapp.com/advisory/ntap-20230427-0002/
8
reference_url https://access.redhat.com/errata/RHSA-2023:1576
reference_id RHSA-2023:1576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1576
9
reference_url https://access.redhat.com/errata/RHSA-2023:1693
reference_id RHSA-2023:1693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1693
10
reference_url https://access.redhat.com/errata/RHSA-2023:4535
reference_id RHSA-2023:4535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4535
11
reference_url https://access.redhat.com/errata/RHSA-2023:6429
reference_id RHSA-2023:6429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6429
12
reference_url https://access.redhat.com/errata/RHSA-2023:7016
reference_id RHSA-2023:7016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7016
13
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7545
14
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7580
15
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7666
16
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7667
17
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7694
18
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7695
19
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7772
20
reference_url https://usn.ubuntu.com/5906-1/
reference_id USN-5906-1
reference_type
scores
url https://usn.ubuntu.com/5906-1/
fixed_packages
0
url pkg:generic/postgresql@12.14.0
purl pkg:generic/postgresql@12.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.14.0
1
url pkg:generic/postgresql@13.10.0
purl pkg:generic/postgresql@13.10.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.10.0
2
url pkg:generic/postgresql@14.7.0
purl pkg:generic/postgresql@14.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.7.0
3
url pkg:generic/postgresql@15.2.0
purl pkg:generic/postgresql@15.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.2.0
aliases CVE-2022-41862
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u751-gq61-fbge
22
url VCID-umaz-62cm-bqfe
vulnerability_id VCID-umaz-62cm-bqfe
summary Uncontrolled search path element in CREATE EXTENSIONmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14350
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08621
published_at 2026-04-01T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08726
published_at 2026-04-24T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08558
published_at 2026-04-18T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08713
published_at 2026-04-21T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08648
published_at 2026-04-02T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08697
published_at 2026-04-12T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08618
published_at 2026-04-07T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08695
published_at 2026-04-08T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.0872
published_at 2026-04-11T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08682
published_at 2026-04-13T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.0857
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14350
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/
4
reference_url https://www.postgresql.org/support/security/CVE-2020-14350/
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2020-14350/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865746
reference_id 1865746
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865746
6
reference_url https://security.gentoo.org/glsa/202008-13
reference_id GLSA-202008-13
reference_type
scores
url https://security.gentoo.org/glsa/202008-13
7
reference_url https://access.redhat.com/errata/RHSA-2020:3669
reference_id RHSA-2020:3669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3669
8
reference_url https://access.redhat.com/errata/RHSA-2020:4295
reference_id RHSA-2020:4295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4295
9
reference_url https://access.redhat.com/errata/RHSA-2020:5110
reference_id RHSA-2020:5110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5110
10
reference_url https://access.redhat.com/errata/RHSA-2020:5112
reference_id RHSA-2020:5112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5112
11
reference_url https://access.redhat.com/errata/RHSA-2020:5619
reference_id RHSA-2020:5619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5619
12
reference_url https://access.redhat.com/errata/RHSA-2020:5620
reference_id RHSA-2020:5620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5620
13
reference_url https://access.redhat.com/errata/RHSA-2020:5661
reference_id RHSA-2020:5661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5661
14
reference_url https://access.redhat.com/errata/RHSA-2020:5664
reference_id RHSA-2020:5664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5664
15
reference_url https://access.redhat.com/errata/RHSA-2021:0163
reference_id RHSA-2021:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0163
16
reference_url https://access.redhat.com/errata/RHSA-2021:0164
reference_id RHSA-2021:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0164
17
reference_url https://access.redhat.com/errata/RHSA-2021:0166
reference_id RHSA-2021:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0166
18
reference_url https://access.redhat.com/errata/RHSA-2021:0167
reference_id RHSA-2021:0167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0167
19
reference_url https://access.redhat.com/errata/RHSA-2021:0988
reference_id RHSA-2021:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0988
20
reference_url https://usn.ubuntu.com/4472-1/
reference_id USN-4472-1
reference_type
scores
url https://usn.ubuntu.com/4472-1/
fixed_packages
0
url pkg:generic/postgresql@12.4.0
purl pkg:generic/postgresql@12.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.4.0
aliases CVE-2020-14350
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-umaz-62cm-bqfe
23
url VCID-wamn-1as1-qbfa
vulnerability_id VCID-wamn-1as1-qbfa
summary ALTER ... DEPENDS ON EXTENSION is missing authorization checks.more details
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1720
reference_id
reference_type
scores
0
value 0.00351
scoring_system epss
scoring_elements 0.57428
published_at 2026-04-01T12:55:00Z
1
value 0.00351
scoring_system epss
scoring_elements 0.57502
published_at 2026-04-24T12:55:00Z
2
value 0.00351
scoring_system epss
scoring_elements 0.57561
published_at 2026-04-12T12:55:00Z
3
value 0.00351
scoring_system epss
scoring_elements 0.57539
published_at 2026-04-13T12:55:00Z
4
value 0.00351
scoring_system epss
scoring_elements 0.57567
published_at 2026-04-16T12:55:00Z
5
value 0.00351
scoring_system epss
scoring_elements 0.57563
published_at 2026-04-18T12:55:00Z
6
value 0.00351
scoring_system epss
scoring_elements 0.57543
published_at 2026-04-21T12:55:00Z
7
value 0.00351
scoring_system epss
scoring_elements 0.57512
published_at 2026-04-02T12:55:00Z
8
value 0.00351
scoring_system epss
scoring_elements 0.57533
published_at 2026-04-04T12:55:00Z
9
value 0.00351
scoring_system epss
scoring_elements 0.57509
published_at 2026-04-07T12:55:00Z
10
value 0.00351
scoring_system epss
scoring_elements 0.57562
published_at 2026-04-08T12:55:00Z
11
value 0.00351
scoring_system epss
scoring_elements 0.57566
published_at 2026-04-09T12:55:00Z
12
value 0.00351
scoring_system epss
scoring_elements 0.57581
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1720
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.postgresql.org/about/news/2011/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/2011/
7
reference_url https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/
8
reference_url https://www.postgresql.org/support/security/CVE-2020-1720/
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N']
url https://www.postgresql.org/support/security/CVE-2020-1720/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1798852
reference_id 1798852
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1798852
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-1720
reference_id CVE-2020-1720
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
2
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-1720
15
reference_url https://security.gentoo.org/glsa/202003-03
reference_id GLSA-202003-03
reference_type
scores
url https://security.gentoo.org/glsa/202003-03
16
reference_url https://access.redhat.com/errata/RHSA-2020:0980
reference_id RHSA-2020:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0980
17
reference_url https://access.redhat.com/errata/RHSA-2020:3669
reference_id RHSA-2020:3669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3669
18
reference_url https://access.redhat.com/errata/RHSA-2020:4295
reference_id RHSA-2020:4295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4295
19
reference_url https://access.redhat.com/errata/RHSA-2020:5112
reference_id RHSA-2020:5112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5112
20
reference_url https://access.redhat.com/errata/RHSA-2020:5619
reference_id RHSA-2020:5619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5619
21
reference_url https://access.redhat.com/errata/RHSA-2020:5620
reference_id RHSA-2020:5620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5620
22
reference_url https://access.redhat.com/errata/RHSA-2020:5661
reference_id RHSA-2020:5661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5661
23
reference_url https://access.redhat.com/errata/RHSA-2020:5664
reference_id RHSA-2020:5664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5664
24
reference_url https://access.redhat.com/errata/RHSA-2021:0163
reference_id RHSA-2021:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0163
25
reference_url https://access.redhat.com/errata/RHSA-2021:0164
reference_id RHSA-2021:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0164
26
reference_url https://access.redhat.com/errata/RHSA-2021:0166
reference_id RHSA-2021:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0166
27
reference_url https://access.redhat.com/errata/RHSA-2021:0167
reference_id RHSA-2021:0167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0167
28
reference_url https://usn.ubuntu.com/4282-1/
reference_id USN-4282-1
reference_type
scores
url https://usn.ubuntu.com/4282-1/
fixed_packages
0
url pkg:generic/postgresql@12.2.0
purl pkg:generic/postgresql@12.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.2.0
aliases CVE-2020-1720
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wamn-1as1-qbfa
24
url VCID-wxxg-2f53-w3ey
vulnerability_id VCID-wxxg-2f53-w3ey
summary PostgreSQL PL/Perl environment variable changes execute arbitrary codemore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10979.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10979.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10979
reference_id
reference_type
scores
0
value 0.06857
scoring_system epss
scoring_elements 0.91402
published_at 2026-04-24T12:55:00Z
1
value 0.06857
scoring_system epss
scoring_elements 0.91365
published_at 2026-04-11T12:55:00Z
2
value 0.06857
scoring_system epss
scoring_elements 0.91367
published_at 2026-04-13T12:55:00Z
3
value 0.06857
scoring_system epss
scoring_elements 0.91392
published_at 2026-04-21T12:55:00Z
4
value 0.06857
scoring_system epss
scoring_elements 0.9139
published_at 2026-04-18T12:55:00Z
5
value 0.06857
scoring_system epss
scoring_elements 0.91321
published_at 2026-04-02T12:55:00Z
6
value 0.06857
scoring_system epss
scoring_elements 0.91332
published_at 2026-04-04T12:55:00Z
7
value 0.06857
scoring_system epss
scoring_elements 0.91339
published_at 2026-04-07T12:55:00Z
8
value 0.06857
scoring_system epss
scoring_elements 0.91351
published_at 2026-04-08T12:55:00Z
9
value 0.06857
scoring_system epss
scoring_elements 0.91358
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10979
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10979
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/
5
reference_url https://www.postgresql.org/support/security/CVE-2024-10979/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T14:32:36Z/
url https://www.postgresql.org/support/security/CVE-2024-10979/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2326253
reference_id 2326253
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2326253
7
reference_url https://security.gentoo.org/glsa/202412-12
reference_id GLSA-202412-12
reference_type
scores
url https://security.gentoo.org/glsa/202412-12
8
reference_url https://access.redhat.com/errata/RHSA-2024:10593
reference_id RHSA-2024:10593
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10593
9
reference_url https://access.redhat.com/errata/RHSA-2024:10595
reference_id RHSA-2024:10595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10595
10
reference_url https://access.redhat.com/errata/RHSA-2024:10677
reference_id RHSA-2024:10677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10677
11
reference_url https://access.redhat.com/errata/RHSA-2024:10705
reference_id RHSA-2024:10705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10705
12
reference_url https://access.redhat.com/errata/RHSA-2024:10736
reference_id RHSA-2024:10736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10736
13
reference_url https://access.redhat.com/errata/RHSA-2024:10739
reference_id RHSA-2024:10739
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10739
14
reference_url https://access.redhat.com/errata/RHSA-2024:10750
reference_id RHSA-2024:10750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10750
15
reference_url https://access.redhat.com/errata/RHSA-2024:10785
reference_id RHSA-2024:10785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10785
16
reference_url https://access.redhat.com/errata/RHSA-2024:10787
reference_id RHSA-2024:10787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10787
17
reference_url https://access.redhat.com/errata/RHSA-2024:10788
reference_id RHSA-2024:10788
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10788
18
reference_url https://access.redhat.com/errata/RHSA-2024:10789
reference_id RHSA-2024:10789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10789
19
reference_url https://access.redhat.com/errata/RHSA-2024:10791
reference_id RHSA-2024:10791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10791
20
reference_url https://access.redhat.com/errata/RHSA-2024:10800
reference_id RHSA-2024:10800
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10800
21
reference_url https://access.redhat.com/errata/RHSA-2024:10807
reference_id RHSA-2024:10807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10807
22
reference_url https://access.redhat.com/errata/RHSA-2024:10827
reference_id RHSA-2024:10827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10827
23
reference_url https://access.redhat.com/errata/RHSA-2024:10830
reference_id RHSA-2024:10830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10830
24
reference_url https://access.redhat.com/errata/RHSA-2024:10831
reference_id RHSA-2024:10831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10831
25
reference_url https://access.redhat.com/errata/RHSA-2024:10832
reference_id RHSA-2024:10832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10832
26
reference_url https://access.redhat.com/errata/RHSA-2024:10846
reference_id RHSA-2024:10846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10846
27
reference_url https://access.redhat.com/errata/RHSA-2024:10851
reference_id RHSA-2024:10851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10851
28
reference_url https://access.redhat.com/errata/RHSA-2024:10879
reference_id RHSA-2024:10879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10879
29
reference_url https://access.redhat.com/errata/RHSA-2024:10882
reference_id RHSA-2024:10882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10882
30
reference_url https://usn.ubuntu.com/7132-1/
reference_id USN-7132-1
reference_type
scores
url https://usn.ubuntu.com/7132-1/
31
reference_url https://usn.ubuntu.com/7358-1/
reference_id USN-7358-1
reference_type
scores
url https://usn.ubuntu.com/7358-1/
fixed_packages
0
url pkg:generic/postgresql@12.21.0
purl pkg:generic/postgresql@12.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.21.0
1
url pkg:generic/postgresql@13.17.0
purl pkg:generic/postgresql@13.17.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.17.0
2
url pkg:generic/postgresql@14.14.0
purl pkg:generic/postgresql@14.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.14.0
3
url pkg:generic/postgresql@15.9.0
purl pkg:generic/postgresql@15.9.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.9.0
4
url pkg:generic/postgresql@16.5.0
purl pkg:generic/postgresql@16.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.5.0
5
url pkg:generic/postgresql@17.1.0
purl pkg:generic/postgresql@17.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@17.1.0
aliases CVE-2024-10979
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wxxg-2f53-w3ey
25
url VCID-xjv3-x91m-qqhn
vulnerability_id VCID-xjv3-x91m-qqhn
summary psql's \gset allows overwriting specially treated variablesmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25696
reference_id
reference_type
scores
0
value 0.00473
scoring_system epss
scoring_elements 0.64626
published_at 2026-04-01T12:55:00Z
1
value 0.00473
scoring_system epss
scoring_elements 0.64757
published_at 2026-04-24T12:55:00Z
2
value 0.00473
scoring_system epss
scoring_elements 0.64741
published_at 2026-04-16T12:55:00Z
3
value 0.00473
scoring_system epss
scoring_elements 0.64752
published_at 2026-04-18T12:55:00Z
4
value 0.00473
scoring_system epss
scoring_elements 0.64739
published_at 2026-04-21T12:55:00Z
5
value 0.00473
scoring_system epss
scoring_elements 0.64678
published_at 2026-04-02T12:55:00Z
6
value 0.00473
scoring_system epss
scoring_elements 0.64706
published_at 2026-04-04T12:55:00Z
7
value 0.00473
scoring_system epss
scoring_elements 0.64665
published_at 2026-04-07T12:55:00Z
8
value 0.00473
scoring_system epss
scoring_elements 0.64713
published_at 2026-04-08T12:55:00Z
9
value 0.00473
scoring_system epss
scoring_elements 0.64727
published_at 2026-04-09T12:55:00Z
10
value 0.00473
scoring_system epss
scoring_elements 0.64744
published_at 2026-04-11T12:55:00Z
11
value 0.00473
scoring_system epss
scoring_elements 0.64733
published_at 2026-04-12T12:55:00Z
12
value 0.00473
scoring_system epss
scoring_elements 0.64705
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25696
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/
5
reference_url https://www.postgresql.org/support/security/CVE-2020-25696/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2020-25696/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1894430
reference_id 1894430
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1894430
7
reference_url https://security.archlinux.org/ASA-202011-14
reference_id ASA-202011-14
reference_type
scores
url https://security.archlinux.org/ASA-202011-14
8
reference_url https://security.archlinux.org/AVG-1276
reference_id AVG-1276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1276
9
reference_url https://security.gentoo.org/glsa/202012-07
reference_id GLSA-202012-07
reference_type
scores
url https://security.gentoo.org/glsa/202012-07
10
reference_url https://access.redhat.com/errata/RHSA-2020:5316
reference_id RHSA-2020:5316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5316
11
reference_url https://access.redhat.com/errata/RHSA-2020:5317
reference_id RHSA-2020:5317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5317
12
reference_url https://access.redhat.com/errata/RHSA-2020:5401
reference_id RHSA-2020:5401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5401
13
reference_url https://access.redhat.com/errata/RHSA-2020:5567
reference_id RHSA-2020:5567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5567
14
reference_url https://access.redhat.com/errata/RHSA-2020:5619
reference_id RHSA-2020:5619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5619
15
reference_url https://access.redhat.com/errata/RHSA-2020:5620
reference_id RHSA-2020:5620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5620
16
reference_url https://access.redhat.com/errata/RHSA-2020:5638
reference_id RHSA-2020:5638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5638
17
reference_url https://access.redhat.com/errata/RHSA-2020:5661
reference_id RHSA-2020:5661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5661
18
reference_url https://access.redhat.com/errata/RHSA-2020:5664
reference_id RHSA-2020:5664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5664
19
reference_url https://access.redhat.com/errata/RHSA-2021:0057
reference_id RHSA-2021:0057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0057
20
reference_url https://access.redhat.com/errata/RHSA-2021:0161
reference_id RHSA-2021:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0161
21
reference_url https://access.redhat.com/errata/RHSA-2021:0163
reference_id RHSA-2021:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0163
22
reference_url https://access.redhat.com/errata/RHSA-2021:0164
reference_id RHSA-2021:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0164
23
reference_url https://access.redhat.com/errata/RHSA-2021:0165
reference_id RHSA-2021:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0165
24
reference_url https://access.redhat.com/errata/RHSA-2021:0166
reference_id RHSA-2021:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0166
25
reference_url https://access.redhat.com/errata/RHSA-2021:0167
reference_id RHSA-2021:0167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0167
26
reference_url https://usn.ubuntu.com/4633-1/
reference_id USN-4633-1
reference_type
scores
url https://usn.ubuntu.com/4633-1/
fixed_packages
0
url pkg:generic/postgresql@12.5.0
purl pkg:generic/postgresql@12.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0
1
url pkg:generic/postgresql@13.1.0
purl pkg:generic/postgresql@13.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0
aliases CVE-2020-25696
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xjv3-x91m-qqhn
26
url VCID-y871-sfhf-a7by
vulnerability_id VCID-y871-sfhf-a7by
summary Extension script @substitutions@ within quoting allow SQL injectionmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39417.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39417
reference_id
reference_type
scores
0
value 0.00659
scoring_system epss
scoring_elements 0.71012
published_at 2026-04-02T12:55:00Z
1
value 0.00659
scoring_system epss
scoring_elements 0.71005
published_at 2026-04-07T12:55:00Z
2
value 0.00659
scoring_system epss
scoring_elements 0.71047
published_at 2026-04-08T12:55:00Z
3
value 0.00659
scoring_system epss
scoring_elements 0.71062
published_at 2026-04-09T12:55:00Z
4
value 0.00659
scoring_system epss
scoring_elements 0.71085
published_at 2026-04-11T12:55:00Z
5
value 0.00659
scoring_system epss
scoring_elements 0.7107
published_at 2026-04-12T12:55:00Z
6
value 0.00659
scoring_system epss
scoring_elements 0.71053
published_at 2026-04-13T12:55:00Z
7
value 0.00659
scoring_system epss
scoring_elements 0.711
published_at 2026-04-16T12:55:00Z
8
value 0.00659
scoring_system epss
scoring_elements 0.71107
published_at 2026-04-18T12:55:00Z
9
value 0.00659
scoring_system epss
scoring_elements 0.7103
published_at 2026-04-04T12:55:00Z
10
value 0.00677
scoring_system epss
scoring_elements 0.71572
published_at 2026-04-24T12:55:00Z
11
value 0.00677
scoring_system epss
scoring_elements 0.71521
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39417
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.postgresql.org/about/news/postgresql-154-149-1312-1216-1121-and-postgresql-16-beta-3-released-2689/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-154-149-1312-1216-1121-and-postgresql-16-beta-3-released-2689/
8
reference_url https://www.postgresql.org/support/security/CVE-2023-39417/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2023-39417/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228111
reference_id 2228111
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2228111
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8
reference_id cpe:/a:redhat:advanced_cluster_security:3.74::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8
reference_id cpe:/a:redhat:advanced_cluster_security:4.1::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8
reference_id cpe:/a:redhat:advanced_cluster_security:4.2::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
reference_id cpe:/a:redhat:rhel_eus:9.0::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3
reference_id cpe:/a:redhat:rhel_software_collections:3
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7
reference_id cpe:/a:redhat:rhel_software_collections:3::el7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
33
reference_url https://access.redhat.com/security/cve/CVE-2023-39417
reference_id CVE-2023-39417
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/security/cve/CVE-2023-39417
34
reference_url https://www.postgresql.org/support/security/CVE-2023-39417
reference_id CVE-2023-39417
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://www.postgresql.org/support/security/CVE-2023-39417
35
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7545
36
reference_url https://access.redhat.com/errata/RHSA-2023:7579
reference_id RHSA-2023:7579
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7579
37
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7580
38
reference_url https://access.redhat.com/errata/RHSA-2023:7581
reference_id RHSA-2023:7581
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7581
39
reference_url https://access.redhat.com/errata/RHSA-2023:7616
reference_id RHSA-2023:7616
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7616
40
reference_url https://access.redhat.com/errata/RHSA-2023:7656
reference_id RHSA-2023:7656
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7656
41
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7666
42
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7667
43
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7694
44
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7695
45
reference_url https://access.redhat.com/errata/RHSA-2023:7714
reference_id RHSA-2023:7714
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7714
46
reference_url https://access.redhat.com/errata/RHSA-2023:7770
reference_id RHSA-2023:7770
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7770
47
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7772
48
reference_url https://access.redhat.com/errata/RHSA-2023:7784
reference_id RHSA-2023:7784
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7784
49
reference_url https://access.redhat.com/errata/RHSA-2023:7785
reference_id RHSA-2023:7785
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7785
50
reference_url https://access.redhat.com/errata/RHSA-2023:7883
reference_id RHSA-2023:7883
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7883
51
reference_url https://access.redhat.com/errata/RHSA-2023:7884
reference_id RHSA-2023:7884
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7884
52
reference_url https://access.redhat.com/errata/RHSA-2023:7885
reference_id RHSA-2023:7885
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7885
53
reference_url https://access.redhat.com/errata/RHSA-2024:0304
reference_id RHSA-2024:0304
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2024:0304
54
reference_url https://access.redhat.com/errata/RHSA-2024:0332
reference_id RHSA-2024:0332
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2024:0332
55
reference_url https://access.redhat.com/errata/RHSA-2024:0337
reference_id RHSA-2024:0337
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2024:0337
56
reference_url https://usn.ubuntu.com/6296-1/
reference_id USN-6296-1
reference_type
scores
url https://usn.ubuntu.com/6296-1/
57
reference_url https://usn.ubuntu.com/6366-1/
reference_id USN-6366-1
reference_type
scores
url https://usn.ubuntu.com/6366-1/
fixed_packages
0
url pkg:generic/postgresql@12.16.0
purl pkg:generic/postgresql@12.16.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.16.0
1
url pkg:generic/postgresql@13.12.0
purl pkg:generic/postgresql@13.12.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.12.0
2
url pkg:generic/postgresql@14.9.0
purl pkg:generic/postgresql@14.9.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.9.0
3
url pkg:generic/postgresql@15.4.0
purl pkg:generic/postgresql@15.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.4.0
aliases CVE-2023-39417
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y871-sfhf-a7by
27
url VCID-yy3k-mszq-cbcs
vulnerability_id VCID-yy3k-mszq-cbcs
summary Memory disclosure in certain queriesmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3677.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3677.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3677
reference_id
reference_type
scores
0
value 0.00202
scoring_system epss
scoring_elements 0.42211
published_at 2026-04-01T12:55:00Z
1
value 0.00202
scoring_system epss
scoring_elements 0.42323
published_at 2026-04-16T12:55:00Z
2
value 0.00202
scoring_system epss
scoring_elements 0.42273
published_at 2026-04-13T12:55:00Z
3
value 0.00202
scoring_system epss
scoring_elements 0.42286
published_at 2026-04-02T12:55:00Z
4
value 0.00202
scoring_system epss
scoring_elements 0.42314
published_at 2026-04-09T12:55:00Z
5
value 0.00202
scoring_system epss
scoring_elements 0.42256
published_at 2026-04-07T12:55:00Z
6
value 0.00202
scoring_system epss
scoring_elements 0.42307
published_at 2026-04-08T12:55:00Z
7
value 0.00202
scoring_system epss
scoring_elements 0.42301
published_at 2026-04-12T12:55:00Z
8
value 0.00202
scoring_system epss
scoring_elements 0.42337
published_at 2026-04-11T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.45223
published_at 2026-04-24T12:55:00Z
10
value 0.00225
scoring_system epss
scoring_elements 0.45363
published_at 2026-04-18T12:55:00Z
11
value 0.00225
scoring_system epss
scoring_elements 0.45311
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3677
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-134-128-1113-1018-9623-and-14-beta-3-released-2277/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-134-128-1113-1018-9623-and-14-beta-3-released-2277/
5
reference_url https://www.postgresql.org/support/security/CVE-2021-3677/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2021-3677/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2001857
reference_id 2001857
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2001857
7
reference_url https://security.archlinux.org/AVG-2290
reference_id AVG-2290
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2290
8
reference_url https://security.gentoo.org/glsa/202211-04
reference_id GLSA-202211-04
reference_type
scores
url https://security.gentoo.org/glsa/202211-04
9
reference_url https://access.redhat.com/errata/RHSA-2021:5179
reference_id RHSA-2021:5179
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5179
10
reference_url https://access.redhat.com/errata/RHSA-2021:5197
reference_id RHSA-2021:5197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5197
11
reference_url https://access.redhat.com/errata/RHSA-2021:5235
reference_id RHSA-2021:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5235
12
reference_url https://access.redhat.com/errata/RHSA-2021:5236
reference_id RHSA-2021:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5236
13
reference_url https://access.redhat.com/errata/RHSA-2022:4931
reference_id RHSA-2022:4931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4931
14
reference_url https://usn.ubuntu.com/5038-1/
reference_id USN-5038-1
reference_type
scores
url https://usn.ubuntu.com/5038-1/
fixed_packages
0
url pkg:generic/postgresql@12.8.0
purl pkg:generic/postgresql@12.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.8.0
1
url pkg:generic/postgresql@13.4.0
purl pkg:generic/postgresql@13.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.4.0
aliases CVE-2021-3677
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yy3k-mszq-cbcs
28
url VCID-zrcc-w98g-gfhk
vulnerability_id VCID-zrcc-w98g-gfhk
summary pg_ctlcluster script in postgresql-common does not drop privileges when creating socket/statistics temporary directoriesmore details
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3466
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.3202
published_at 2026-04-24T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.3219
published_at 2026-04-01T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32231
published_at 2026-04-16T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.3221
published_at 2026-04-18T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32181
published_at 2026-04-21T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32326
published_at 2026-04-02T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.32364
published_at 2026-04-04T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32188
published_at 2026-04-07T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.32237
published_at 2026-04-08T12:55:00Z
9
value 0.00128
scoring_system epss
scoring_elements 0.32265
published_at 2026-04-09T12:55:00Z
10
value 0.00128
scoring_system epss
scoring_elements 0.32266
published_at 2026-04-11T12:55:00Z
11
value 0.00128
scoring_system epss
scoring_elements 0.32228
published_at 2026-04-12T12:55:00Z
12
value 0.00128
scoring_system epss
scoring_elements 0.32198
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3466
1
reference_url https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/
reference_id
reference_type
scores
url https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466
3
reference_url https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/
4
reference_url https://www.postgresql.org/support/security/CVE-2019-3466/
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2019-3466/
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3466
reference_id CVE-2019-3466
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3466
13
reference_url https://usn.ubuntu.com/4194-1/
reference_id USN-4194-1
reference_type
scores
url https://usn.ubuntu.com/4194-1/
14
reference_url https://usn.ubuntu.com/4194-2/
reference_id USN-4194-2
reference_type
scores
url https://usn.ubuntu.com/4194-2/
fixed_packages
0
url pkg:generic/postgresql@12.1.0
purl pkg:generic/postgresql@12.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.1.0
aliases CVE-2019-3466
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zrcc-w98g-gfhk
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.0.0