Lookup for vulnerable packages by Package URL.

Purlpkg:generic/postgresql@10.0.0
Typegeneric
Namespace
Namepostgresql
Version10.0.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version10.1.0
Latest_non_vulnerable_version18.2.0
Affected_by_vulnerabilities
0
url VCID-1rgq-t3wa-2fck
vulnerability_id VCID-1rgq-t3wa-2fck
summary SQL injection in pg_upgrade and pg_dump, via CREATE TRIGGER ... REFERENCING.more details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16850.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16850.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16850
reference_id
reference_type
scores
0
value 0.01317
scoring_system epss
scoring_elements 0.79805
published_at 2026-04-01T12:55:00Z
1
value 0.01317
scoring_system epss
scoring_elements 0.79813
published_at 2026-04-02T12:55:00Z
2
value 0.01317
scoring_system epss
scoring_elements 0.79834
published_at 2026-04-04T12:55:00Z
3
value 0.01317
scoring_system epss
scoring_elements 0.79822
published_at 2026-04-07T12:55:00Z
4
value 0.01317
scoring_system epss
scoring_elements 0.79851
published_at 2026-04-08T12:55:00Z
5
value 0.01317
scoring_system epss
scoring_elements 0.79859
published_at 2026-04-09T12:55:00Z
6
value 0.01317
scoring_system epss
scoring_elements 0.7988
published_at 2026-04-11T12:55:00Z
7
value 0.01317
scoring_system epss
scoring_elements 0.79863
published_at 2026-04-12T12:55:00Z
8
value 0.01317
scoring_system epss
scoring_elements 0.79856
published_at 2026-04-13T12:55:00Z
9
value 0.01317
scoring_system epss
scoring_elements 0.79884
published_at 2026-04-16T12:55:00Z
10
value 0.01317
scoring_system epss
scoring_elements 0.79885
published_at 2026-04-18T12:55:00Z
11
value 0.01317
scoring_system epss
scoring_elements 0.79888
published_at 2026-04-21T12:55:00Z
12
value 0.01317
scoring_system epss
scoring_elements 0.79916
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16850
2
reference_url https://www.postgresql.org/about/news/postgresql-111-106-9611-9515-9420-and-9325-released-1905/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-111-106-9611-9515-9420-and-9325-released-1905/
3
reference_url https://www.postgresql.org/support/security/CVE-2018-16850/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2018-16850/
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1645937
reference_id 1645937
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1645937
5
reference_url https://security.gentoo.org/glsa/201811-24
reference_id GLSA-201811-24
reference_type
scores
url https://security.gentoo.org/glsa/201811-24
6
reference_url https://access.redhat.com/errata/RHSA-2018:3757
reference_id RHSA-2018:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3757
7
reference_url https://usn.ubuntu.com/3818-1/
reference_id USN-3818-1
reference_type
scores
url https://usn.ubuntu.com/3818-1/
fixed_packages
0
url pkg:generic/postgresql@10.6.0
purl pkg:generic/postgresql@10.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.6.0
1
url pkg:generic/postgresql@11.1.0
purl pkg:generic/postgresql@11.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.1.0
aliases CVE-2018-16850
risk_score 3.6
exploitability 0.5
weighted_severity 7.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1rgq-t3wa-2fck
1
url VCID-36gv-m96w-47db
vulnerability_id VCID-36gv-m96w-47db
summary Reconnection can downgrade connection security settingsmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25694
reference_id
reference_type
scores
0
value 0.00359
scoring_system epss
scoring_elements 0.58007
published_at 2026-04-01T12:55:00Z
1
value 0.00359
scoring_system epss
scoring_elements 0.58124
published_at 2026-04-21T12:55:00Z
2
value 0.00359
scoring_system epss
scoring_elements 0.58118
published_at 2026-04-13T12:55:00Z
3
value 0.00359
scoring_system epss
scoring_elements 0.58148
published_at 2026-04-16T12:55:00Z
4
value 0.00359
scoring_system epss
scoring_elements 0.58149
published_at 2026-04-18T12:55:00Z
5
value 0.00359
scoring_system epss
scoring_elements 0.58091
published_at 2026-04-24T12:55:00Z
6
value 0.00359
scoring_system epss
scoring_elements 0.58113
published_at 2026-04-04T12:55:00Z
7
value 0.00359
scoring_system epss
scoring_elements 0.58087
published_at 2026-04-07T12:55:00Z
8
value 0.00359
scoring_system epss
scoring_elements 0.58142
published_at 2026-04-08T12:55:00Z
9
value 0.00359
scoring_system epss
scoring_elements 0.58145
published_at 2026-04-09T12:55:00Z
10
value 0.00359
scoring_system epss
scoring_elements 0.5816
published_at 2026-04-11T12:55:00Z
11
value 0.00359
scoring_system epss
scoring_elements 0.58137
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/
5
reference_url https://www.postgresql.org/support/security/CVE-2020-25694/
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2020-25694/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1894423
reference_id 1894423
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1894423
7
reference_url https://security.archlinux.org/ASA-202011-14
reference_id ASA-202011-14
reference_type
scores
url https://security.archlinux.org/ASA-202011-14
8
reference_url https://security.archlinux.org/AVG-1276
reference_id AVG-1276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1276
9
reference_url https://security.gentoo.org/glsa/202012-07
reference_id GLSA-202012-07
reference_type
scores
url https://security.gentoo.org/glsa/202012-07
10
reference_url https://access.redhat.com/errata/RHSA-2020:5316
reference_id RHSA-2020:5316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5316
11
reference_url https://access.redhat.com/errata/RHSA-2020:5317
reference_id RHSA-2020:5317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5317
12
reference_url https://access.redhat.com/errata/RHSA-2020:5401
reference_id RHSA-2020:5401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5401
13
reference_url https://access.redhat.com/errata/RHSA-2020:5567
reference_id RHSA-2020:5567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5567
14
reference_url https://access.redhat.com/errata/RHSA-2020:5619
reference_id RHSA-2020:5619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5619
15
reference_url https://access.redhat.com/errata/RHSA-2020:5620
reference_id RHSA-2020:5620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5620
16
reference_url https://access.redhat.com/errata/RHSA-2020:5638
reference_id RHSA-2020:5638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5638
17
reference_url https://access.redhat.com/errata/RHSA-2020:5661
reference_id RHSA-2020:5661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5661
18
reference_url https://access.redhat.com/errata/RHSA-2020:5664
reference_id RHSA-2020:5664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5664
19
reference_url https://access.redhat.com/errata/RHSA-2021:0057
reference_id RHSA-2021:0057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0057
20
reference_url https://access.redhat.com/errata/RHSA-2021:0161
reference_id RHSA-2021:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0161
21
reference_url https://access.redhat.com/errata/RHSA-2021:0163
reference_id RHSA-2021:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0163
22
reference_url https://access.redhat.com/errata/RHSA-2021:0164
reference_id RHSA-2021:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0164
23
reference_url https://access.redhat.com/errata/RHSA-2021:0165
reference_id RHSA-2021:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0165
24
reference_url https://access.redhat.com/errata/RHSA-2021:0166
reference_id RHSA-2021:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0166
25
reference_url https://access.redhat.com/errata/RHSA-2021:0167
reference_id RHSA-2021:0167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0167
26
reference_url https://access.redhat.com/errata/RHSA-2021:1512
reference_id RHSA-2021:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1512
27
reference_url https://usn.ubuntu.com/4633-1/
reference_id USN-4633-1
reference_type
scores
url https://usn.ubuntu.com/4633-1/
fixed_packages
0
url pkg:generic/postgresql@10.15.0
purl pkg:generic/postgresql@10.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.15.0
1
url pkg:generic/postgresql@11.10.0
purl pkg:generic/postgresql@11.10.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0
2
url pkg:generic/postgresql@12.5.0
purl pkg:generic/postgresql@12.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0
3
url pkg:generic/postgresql@13.1.0
purl pkg:generic/postgresql@13.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0
aliases CVE-2020-25694
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-36gv-m96w-47db
2
url VCID-4jdp-3xqp-ufap
vulnerability_id VCID-4jdp-3xqp-ufap
summary Buffer overrun from integer overflow in array subscripting calculationsmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32027
reference_id
reference_type
scores
0
value 0.00491
scoring_system epss
scoring_elements 0.65502
published_at 2026-04-01T12:55:00Z
1
value 0.00491
scoring_system epss
scoring_elements 0.65634
published_at 2026-04-24T12:55:00Z
2
value 0.00491
scoring_system epss
scoring_elements 0.65623
published_at 2026-04-16T12:55:00Z
3
value 0.00491
scoring_system epss
scoring_elements 0.65635
published_at 2026-04-18T12:55:00Z
4
value 0.00491
scoring_system epss
scoring_elements 0.65619
published_at 2026-04-21T12:55:00Z
5
value 0.00491
scoring_system epss
scoring_elements 0.6555
published_at 2026-04-02T12:55:00Z
6
value 0.00491
scoring_system epss
scoring_elements 0.6558
published_at 2026-04-04T12:55:00Z
7
value 0.00491
scoring_system epss
scoring_elements 0.65546
published_at 2026-04-07T12:55:00Z
8
value 0.00491
scoring_system epss
scoring_elements 0.65599
published_at 2026-04-08T12:55:00Z
9
value 0.00491
scoring_system epss
scoring_elements 0.65611
published_at 2026-04-09T12:55:00Z
10
value 0.00491
scoring_system epss
scoring_elements 0.6563
published_at 2026-04-11T12:55:00Z
11
value 0.00491
scoring_system epss
scoring_elements 0.65616
published_at 2026-04-12T12:55:00Z
12
value 0.00491
scoring_system epss
scoring_elements 0.65587
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32027
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/
7
reference_url https://www.postgresql.org/support/security/CVE-2021-32027/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N']
url https://www.postgresql.org/support/security/CVE-2021-32027/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1956876
reference_id 1956876
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1956876
9
reference_url https://security.archlinux.org/ASA-202106-15
reference_id ASA-202106-15
reference_type
scores
url https://security.archlinux.org/ASA-202106-15
10
reference_url https://security.archlinux.org/AVG-1956
reference_id AVG-1956
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1956
11
reference_url https://security.gentoo.org/glsa/202211-04
reference_id GLSA-202211-04
reference_type
scores
url https://security.gentoo.org/glsa/202211-04
12
reference_url https://access.redhat.com/errata/RHSA-2021:2360
reference_id RHSA-2021:2360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2360
13
reference_url https://access.redhat.com/errata/RHSA-2021:2361
reference_id RHSA-2021:2361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2361
14
reference_url https://access.redhat.com/errata/RHSA-2021:2372
reference_id RHSA-2021:2372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2372
15
reference_url https://access.redhat.com/errata/RHSA-2021:2375
reference_id RHSA-2021:2375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2375
16
reference_url https://access.redhat.com/errata/RHSA-2021:2389
reference_id RHSA-2021:2389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2389
17
reference_url https://access.redhat.com/errata/RHSA-2021:2390
reference_id RHSA-2021:2390
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2390
18
reference_url https://access.redhat.com/errata/RHSA-2021:2391
reference_id RHSA-2021:2391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2391
19
reference_url https://access.redhat.com/errata/RHSA-2021:2392
reference_id RHSA-2021:2392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2392
20
reference_url https://access.redhat.com/errata/RHSA-2021:2393
reference_id RHSA-2021:2393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2393
21
reference_url https://access.redhat.com/errata/RHSA-2021:2394
reference_id RHSA-2021:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2394
22
reference_url https://access.redhat.com/errata/RHSA-2021:2395
reference_id RHSA-2021:2395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2395
23
reference_url https://access.redhat.com/errata/RHSA-2021:2396
reference_id RHSA-2021:2396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2396
24
reference_url https://access.redhat.com/errata/RHSA-2021:2397
reference_id RHSA-2021:2397
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2397
25
reference_url https://usn.ubuntu.com/4972-1/
reference_id USN-4972-1
reference_type
scores
url https://usn.ubuntu.com/4972-1/
26
reference_url https://usn.ubuntu.com/5645-1/
reference_id USN-5645-1
reference_type
scores
url https://usn.ubuntu.com/5645-1/
fixed_packages
0
url pkg:generic/postgresql@10.17.0
purl pkg:generic/postgresql@10.17.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.17.0
1
url pkg:generic/postgresql@11.12.0
purl pkg:generic/postgresql@11.12.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0
2
url pkg:generic/postgresql@12.7.0
purl pkg:generic/postgresql@12.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0
3
url pkg:generic/postgresql@13.3.0
purl pkg:generic/postgresql@13.3.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0
aliases CVE-2021-32027
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4jdp-3xqp-ufap
3
url VCID-4jnn-un4y-qkbr
vulnerability_id VCID-4jnn-un4y-qkbr
summary Memory disclosure in table partitioningmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1052.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1052.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1052
reference_id
reference_type
scores
0
value 0.00472
scoring_system epss
scoring_elements 0.64587
published_at 2026-04-01T12:55:00Z
1
value 0.00472
scoring_system epss
scoring_elements 0.6464
published_at 2026-04-02T12:55:00Z
2
value 0.00472
scoring_system epss
scoring_elements 0.64669
published_at 2026-04-04T12:55:00Z
3
value 0.00472
scoring_system epss
scoring_elements 0.64626
published_at 2026-04-07T12:55:00Z
4
value 0.00472
scoring_system epss
scoring_elements 0.64674
published_at 2026-04-08T12:55:00Z
5
value 0.00472
scoring_system epss
scoring_elements 0.6469
published_at 2026-04-09T12:55:00Z
6
value 0.00472
scoring_system epss
scoring_elements 0.64707
published_at 2026-04-11T12:55:00Z
7
value 0.00472
scoring_system epss
scoring_elements 0.64695
published_at 2026-04-12T12:55:00Z
8
value 0.00472
scoring_system epss
scoring_elements 0.64667
published_at 2026-04-13T12:55:00Z
9
value 0.00472
scoring_system epss
scoring_elements 0.64703
published_at 2026-04-16T12:55:00Z
10
value 0.00472
scoring_system epss
scoring_elements 0.64714
published_at 2026-04-18T12:55:00Z
11
value 0.00472
scoring_system epss
scoring_elements 0.64701
published_at 2026-04-21T12:55:00Z
12
value 0.00472
scoring_system epss
scoring_elements 0.64721
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1052
2
reference_url https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/
3
reference_url https://www.postgresql.org/support/security/CVE-2018-1052/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2018-1052/
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1539613
reference_id 1539613
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1539613
fixed_packages
0
url pkg:generic/postgresql@10.2.0
purl pkg:generic/postgresql@10.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.2.0
aliases CVE-2018-1052
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4jnn-un4y-qkbr
4
url VCID-7xfn-1fv3-1bgv
vulnerability_id VCID-7xfn-1fv3-1bgv
summary Uncontrolled search path element in pg_dump and other client applicationsmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1058.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1058.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1058
reference_id
reference_type
scores
0
value 0.82687
scoring_system epss
scoring_elements 0.99229
published_at 2026-04-01T12:55:00Z
1
value 0.82687
scoring_system epss
scoring_elements 0.99245
published_at 2026-04-24T12:55:00Z
2
value 0.82687
scoring_system epss
scoring_elements 0.99239
published_at 2026-04-13T12:55:00Z
3
value 0.82687
scoring_system epss
scoring_elements 0.9924
published_at 2026-04-16T12:55:00Z
4
value 0.82687
scoring_system epss
scoring_elements 0.99241
published_at 2026-04-21T12:55:00Z
5
value 0.82687
scoring_system epss
scoring_elements 0.99231
published_at 2026-04-02T12:55:00Z
6
value 0.82687
scoring_system epss
scoring_elements 0.99234
published_at 2026-04-04T12:55:00Z
7
value 0.82687
scoring_system epss
scoring_elements 0.99238
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1058
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.postgresql.org/about/news/postgresql-103-968-9512-9417-and-9322-released-1834/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-103-968-9512-9417-and-9322-released-1834/
4
reference_url https://www.postgresql.org/support/security/CVE-2018-1058/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2018-1058/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1547044
reference_id 1547044
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1547044
6
reference_url https://security.archlinux.org/ASA-201803-9
reference_id ASA-201803-9
reference_type
scores
url https://security.archlinux.org/ASA-201803-9
7
reference_url https://security.archlinux.org/AVG-643
reference_id AVG-643
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-643
8
reference_url https://access.redhat.com/errata/RHSA-2018:2511
reference_id RHSA-2018:2511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2511
9
reference_url https://access.redhat.com/errata/RHSA-2018:2566
reference_id RHSA-2018:2566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2566
10
reference_url https://access.redhat.com/errata/RHSA-2018:3816
reference_id RHSA-2018:3816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3816
11
reference_url https://usn.ubuntu.com/3589-1/
reference_id USN-3589-1
reference_type
scores
url https://usn.ubuntu.com/3589-1/
fixed_packages
0
url pkg:generic/postgresql@10.3.0
purl pkg:generic/postgresql@10.3.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.3.0
aliases CVE-2018-1058
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7xfn-1fv3-1bgv
5
url VCID-8p8h-jdyq-vfek
vulnerability_id VCID-8p8h-jdyq-vfek
summary Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATEmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32028
reference_id
reference_type
scores
0
value 0.00467
scoring_system epss
scoring_elements 0.64362
published_at 2026-04-01T12:55:00Z
1
value 0.00467
scoring_system epss
scoring_elements 0.645
published_at 2026-04-24T12:55:00Z
2
value 0.00467
scoring_system epss
scoring_elements 0.64475
published_at 2026-04-16T12:55:00Z
3
value 0.00467
scoring_system epss
scoring_elements 0.64487
published_at 2026-04-18T12:55:00Z
4
value 0.00467
scoring_system epss
scoring_elements 0.64479
published_at 2026-04-21T12:55:00Z
5
value 0.00467
scoring_system epss
scoring_elements 0.64415
published_at 2026-04-02T12:55:00Z
6
value 0.00467
scoring_system epss
scoring_elements 0.64445
published_at 2026-04-04T12:55:00Z
7
value 0.00467
scoring_system epss
scoring_elements 0.64405
published_at 2026-04-07T12:55:00Z
8
value 0.00467
scoring_system epss
scoring_elements 0.64453
published_at 2026-04-08T12:55:00Z
9
value 0.00467
scoring_system epss
scoring_elements 0.64469
published_at 2026-04-12T12:55:00Z
10
value 0.00467
scoring_system epss
scoring_elements 0.64481
published_at 2026-04-11T12:55:00Z
11
value 0.00467
scoring_system epss
scoring_elements 0.64441
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32028
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/
7
reference_url https://www.postgresql.org/support/security/CVE-2021-32028/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2021-32028/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1956877
reference_id 1956877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1956877
9
reference_url https://security.archlinux.org/ASA-202106-15
reference_id ASA-202106-15
reference_type
scores
url https://security.archlinux.org/ASA-202106-15
10
reference_url https://security.archlinux.org/AVG-1956
reference_id AVG-1956
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1956
11
reference_url https://security.gentoo.org/glsa/202211-04
reference_id GLSA-202211-04
reference_type
scores
url https://security.gentoo.org/glsa/202211-04
12
reference_url https://access.redhat.com/errata/RHSA-2021:2360
reference_id RHSA-2021:2360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2360
13
reference_url https://access.redhat.com/errata/RHSA-2021:2361
reference_id RHSA-2021:2361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2361
14
reference_url https://access.redhat.com/errata/RHSA-2021:2372
reference_id RHSA-2021:2372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2372
15
reference_url https://access.redhat.com/errata/RHSA-2021:2375
reference_id RHSA-2021:2375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2375
16
reference_url https://access.redhat.com/errata/RHSA-2021:2389
reference_id RHSA-2021:2389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2389
17
reference_url https://access.redhat.com/errata/RHSA-2021:2390
reference_id RHSA-2021:2390
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2390
18
reference_url https://access.redhat.com/errata/RHSA-2021:2391
reference_id RHSA-2021:2391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2391
19
reference_url https://access.redhat.com/errata/RHSA-2021:2392
reference_id RHSA-2021:2392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2392
20
reference_url https://access.redhat.com/errata/RHSA-2021:2393
reference_id RHSA-2021:2393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2393
21
reference_url https://access.redhat.com/errata/RHSA-2021:2394
reference_id RHSA-2021:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2394
22
reference_url https://access.redhat.com/errata/RHSA-2021:2395
reference_id RHSA-2021:2395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2395
23
reference_url https://access.redhat.com/errata/RHSA-2021:2396
reference_id RHSA-2021:2396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2396
24
reference_url https://usn.ubuntu.com/4972-1/
reference_id USN-4972-1
reference_type
scores
url https://usn.ubuntu.com/4972-1/
fixed_packages
0
url pkg:generic/postgresql@10.17.0
purl pkg:generic/postgresql@10.17.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.17.0
1
url pkg:generic/postgresql@11.12.0
purl pkg:generic/postgresql@11.12.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0
2
url pkg:generic/postgresql@12.7.0
purl pkg:generic/postgresql@12.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0
3
url pkg:generic/postgresql@13.3.0
purl pkg:generic/postgresql@13.3.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0
aliases CVE-2021-32028
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8p8h-jdyq-vfek
6
url VCID-a28t-r5gf-bkhx
vulnerability_id VCID-a28t-r5gf-bkhx
summary Too-permissive access control list on function pg_logfile_rotate()more details
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1115.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1115.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1115
reference_id
reference_type
scores
0
value 0.00694
scoring_system epss
scoring_elements 0.71823
published_at 2026-04-01T12:55:00Z
1
value 0.00694
scoring_system epss
scoring_elements 0.7194
published_at 2026-04-24T12:55:00Z
2
value 0.00694
scoring_system epss
scoring_elements 0.71881
published_at 2026-04-12T12:55:00Z
3
value 0.00694
scoring_system epss
scoring_elements 0.71906
published_at 2026-04-16T12:55:00Z
4
value 0.00694
scoring_system epss
scoring_elements 0.71911
published_at 2026-04-18T12:55:00Z
5
value 0.00694
scoring_system epss
scoring_elements 0.71894
published_at 2026-04-21T12:55:00Z
6
value 0.00694
scoring_system epss
scoring_elements 0.71832
published_at 2026-04-02T12:55:00Z
7
value 0.00694
scoring_system epss
scoring_elements 0.71851
published_at 2026-04-04T12:55:00Z
8
value 0.00694
scoring_system epss
scoring_elements 0.71825
published_at 2026-04-07T12:55:00Z
9
value 0.00694
scoring_system epss
scoring_elements 0.71863
published_at 2026-04-13T12:55:00Z
10
value 0.00694
scoring_system epss
scoring_elements 0.71874
published_at 2026-04-09T12:55:00Z
11
value 0.00694
scoring_system epss
scoring_elements 0.71899
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1115
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115
4
reference_url https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
reference_id
reference_type
scores
url https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740
5
reference_url https://www.postgresql.org/about/news/postgresql-104-969-9513-9418-and-9323-released-1851/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-104-969-9513-9418-and-9323-released-1851/
6
reference_url https://www.postgresql.org/support/security/CVE-2018-1115/
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N']
url https://www.postgresql.org/support/security/CVE-2018-1115/
7
reference_url http://www.securityfocus.com/bid/104285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104285
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1573276
reference_id 1573276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1573276
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1115
reference_id CVE-2018-1115
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:P
1
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
2
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-1115
12
reference_url https://security.gentoo.org/glsa/201810-08
reference_id GLSA-201810-08
reference_type
scores
url https://security.gentoo.org/glsa/201810-08
13
reference_url https://access.redhat.com/errata/RHSA-2018:2565
reference_id RHSA-2018:2565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2565
14
reference_url https://access.redhat.com/errata/RHSA-2018:2566
reference_id RHSA-2018:2566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2566
fixed_packages
0
url pkg:generic/postgresql@10.4.0
purl pkg:generic/postgresql@10.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.4.0
aliases CVE-2018-1115
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a28t-r5gf-bkhx
7
url VCID-bb5j-e9vw-mbd1
vulnerability_id VCID-bb5j-e9vw-mbd1
summary TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER executionmore details
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10208.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10208.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10208
reference_id
reference_type
scores
0
value 0.00188
scoring_system epss
scoring_elements 0.40573
published_at 2026-04-01T12:55:00Z
1
value 0.00188
scoring_system epss
scoring_elements 0.40461
published_at 2026-04-24T12:55:00Z
2
value 0.00188
scoring_system epss
scoring_elements 0.4068
published_at 2026-04-11T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.40643
published_at 2026-04-12T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.40625
published_at 2026-04-13T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40671
published_at 2026-04-16T12:55:00Z
6
value 0.00188
scoring_system epss
scoring_elements 0.4064
published_at 2026-04-18T12:55:00Z
7
value 0.00188
scoring_system epss
scoring_elements 0.40563
published_at 2026-04-21T12:55:00Z
8
value 0.00188
scoring_system epss
scoring_elements 0.40654
published_at 2026-04-02T12:55:00Z
9
value 0.00188
scoring_system epss
scoring_elements 0.40682
published_at 2026-04-04T12:55:00Z
10
value 0.00188
scoring_system epss
scoring_elements 0.40603
published_at 2026-04-07T12:55:00Z
11
value 0.00188
scoring_system epss
scoring_elements 0.40653
published_at 2026-04-08T12:55:00Z
12
value 0.00188
scoring_system epss
scoring_elements 0.40662
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10208
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10208
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10208
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.postgresql.org/about/news/1960/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/1960/
8
reference_url https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/
9
reference_url https://www.postgresql.org/support/security/CVE-2019-10208/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2019-10208/
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1734416
reference_id 1734416
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1734416
11
reference_url https://security.archlinux.org/ASA-201908-7
reference_id ASA-201908-7
reference_type
scores
url https://security.archlinux.org/ASA-201908-7
12
reference_url https://security.archlinux.org/ASA-201908-8
reference_id ASA-201908-8
reference_type
scores
url https://security.archlinux.org/ASA-201908-8
13
reference_url https://security.archlinux.org/AVG-1019
reference_id AVG-1019
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1019
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10208
reference_id CVE-2019-10208
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-10208
16
reference_url https://access.redhat.com/errata/RHSA-2020:0980
reference_id RHSA-2020:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0980
17
reference_url https://access.redhat.com/errata/RHSA-2020:3669
reference_id RHSA-2020:3669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3669
18
reference_url https://access.redhat.com/errata/RHSA-2020:4295
reference_id RHSA-2020:4295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4295
19
reference_url https://access.redhat.com/errata/RHSA-2020:5619
reference_id RHSA-2020:5619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5619
20
reference_url https://access.redhat.com/errata/RHSA-2020:5661
reference_id RHSA-2020:5661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5661
21
reference_url https://access.redhat.com/errata/RHSA-2020:5664
reference_id RHSA-2020:5664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5664
22
reference_url https://access.redhat.com/errata/RHSA-2021:0164
reference_id RHSA-2021:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0164
23
reference_url https://access.redhat.com/errata/RHSA-2021:0166
reference_id RHSA-2021:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0166
24
reference_url https://access.redhat.com/errata/RHSA-2021:0167
reference_id RHSA-2021:0167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0167
25
reference_url https://access.redhat.com/errata/RHSA-2021:1512
reference_id RHSA-2021:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1512
26
reference_url https://usn.ubuntu.com/4090-1/
reference_id USN-4090-1
reference_type
scores
url https://usn.ubuntu.com/4090-1/
fixed_packages
0
url pkg:generic/postgresql@10.10.0
purl pkg:generic/postgresql@10.10.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.10.0
1
url pkg:generic/postgresql@11.5.0
purl pkg:generic/postgresql@11.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.5.0
aliases CVE-2019-10208
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bb5j-e9vw-mbd1
8
url VCID-bdw5-v87c-zyfj
vulnerability_id VCID-bdw5-v87c-zyfj
summary Multiple features escape "security restricted operation" sandboxmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25695
reference_id
reference_type
scores
0
value 0.22672
scoring_system epss
scoring_elements 0.95843
published_at 2026-04-04T12:55:00Z
1
value 0.22672
scoring_system epss
scoring_elements 0.95826
published_at 2026-04-01T12:55:00Z
2
value 0.22672
scoring_system epss
scoring_elements 0.95854
published_at 2026-04-08T12:55:00Z
3
value 0.22672
scoring_system epss
scoring_elements 0.95845
published_at 2026-04-07T12:55:00Z
4
value 0.22672
scoring_system epss
scoring_elements 0.95835
published_at 2026-04-02T12:55:00Z
5
value 0.23757
scoring_system epss
scoring_elements 0.96022
published_at 2026-04-24T12:55:00Z
6
value 0.23757
scoring_system epss
scoring_elements 0.96005
published_at 2026-04-13T12:55:00Z
7
value 0.23757
scoring_system epss
scoring_elements 0.96015
published_at 2026-04-16T12:55:00Z
8
value 0.23757
scoring_system epss
scoring_elements 0.9602
published_at 2026-04-18T12:55:00Z
9
value 0.23757
scoring_system epss
scoring_elements 0.95999
published_at 2026-04-09T12:55:00Z
10
value 0.23757
scoring_system epss
scoring_elements 0.96003
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25695
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/
5
reference_url https://www.postgresql.org/support/security/CVE-2020-25695/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2020-25695/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1894425
reference_id 1894425
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1894425
7
reference_url https://security.archlinux.org/ASA-202011-14
reference_id ASA-202011-14
reference_type
scores
url https://security.archlinux.org/ASA-202011-14
8
reference_url https://security.archlinux.org/AVG-1276
reference_id AVG-1276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1276
9
reference_url https://security.gentoo.org/glsa/202012-07
reference_id GLSA-202012-07
reference_type
scores
url https://security.gentoo.org/glsa/202012-07
10
reference_url https://access.redhat.com/errata/RHSA-2020:5316
reference_id RHSA-2020:5316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5316
11
reference_url https://access.redhat.com/errata/RHSA-2020:5317
reference_id RHSA-2020:5317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5317
12
reference_url https://access.redhat.com/errata/RHSA-2020:5567
reference_id RHSA-2020:5567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5567
13
reference_url https://access.redhat.com/errata/RHSA-2020:5619
reference_id RHSA-2020:5619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5619
14
reference_url https://access.redhat.com/errata/RHSA-2020:5620
reference_id RHSA-2020:5620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5620
15
reference_url https://access.redhat.com/errata/RHSA-2020:5661
reference_id RHSA-2020:5661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5661
16
reference_url https://access.redhat.com/errata/RHSA-2020:5664
reference_id RHSA-2020:5664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5664
17
reference_url https://access.redhat.com/errata/RHSA-2021:0161
reference_id RHSA-2021:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0161
18
reference_url https://access.redhat.com/errata/RHSA-2021:0163
reference_id RHSA-2021:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0163
19
reference_url https://access.redhat.com/errata/RHSA-2021:0164
reference_id RHSA-2021:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0164
20
reference_url https://access.redhat.com/errata/RHSA-2021:0166
reference_id RHSA-2021:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0166
21
reference_url https://access.redhat.com/errata/RHSA-2021:0167
reference_id RHSA-2021:0167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0167
22
reference_url https://access.redhat.com/errata/RHSA-2021:1512
reference_id RHSA-2021:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1512
23
reference_url https://usn.ubuntu.com/4633-1/
reference_id USN-4633-1
reference_type
scores
url https://usn.ubuntu.com/4633-1/
fixed_packages
0
url pkg:generic/postgresql@10.15.0
purl pkg:generic/postgresql@10.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.15.0
1
url pkg:generic/postgresql@11.10.0
purl pkg:generic/postgresql@11.10.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0
2
url pkg:generic/postgresql@12.5.0
purl pkg:generic/postgresql@12.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0
3
url pkg:generic/postgresql@13.1.0
purl pkg:generic/postgresql@13.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0
aliases CVE-2020-25695
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdw5-v87c-zyfj
9
url VCID-bq8t-8q8q-dkb6
vulnerability_id VCID-bq8t-8q8q-dkb6
summary INSERT ... ON CONFLICT DO UPDATE fails to enforce SELECT privilegesmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15099.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15099.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15099
reference_id
reference_type
scores
0
value 0.27111
scoring_system epss
scoring_elements 0.96376
published_at 2026-04-12T12:55:00Z
1
value 0.27111
scoring_system epss
scoring_elements 0.9638
published_at 2026-04-13T12:55:00Z
2
value 0.27111
scoring_system epss
scoring_elements 0.96393
published_at 2026-04-21T12:55:00Z
3
value 0.27111
scoring_system epss
scoring_elements 0.96391
published_at 2026-04-18T12:55:00Z
4
value 0.27111
scoring_system epss
scoring_elements 0.96387
published_at 2026-04-16T12:55:00Z
5
value 0.27111
scoring_system epss
scoring_elements 0.96394
published_at 2026-04-24T12:55:00Z
6
value 0.30234
scoring_system epss
scoring_elements 0.96661
published_at 2026-04-04T12:55:00Z
7
value 0.30234
scoring_system epss
scoring_elements 0.96647
published_at 2026-04-01T12:55:00Z
8
value 0.30234
scoring_system epss
scoring_elements 0.96656
published_at 2026-04-02T12:55:00Z
9
value 0.30234
scoring_system epss
scoring_elements 0.96665
published_at 2026-04-07T12:55:00Z
10
value 0.30234
scoring_system epss
scoring_elements 0.96673
published_at 2026-04-08T12:55:00Z
11
value 0.30234
scoring_system epss
scoring_elements 0.96674
published_at 2026-04-09T12:55:00Z
12
value 0.30234
scoring_system epss
scoring_elements 0.96677
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15099
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.debian.org/security/2017/dsa-4028
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4028
6
reference_url https://www.postgresql.org/about/news/1801/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/1801/
7
reference_url https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/
8
reference_url https://www.postgresql.org/support/security/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/
9
reference_url https://www.postgresql.org/support/security/CVE-2017-15099/
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2017-15099/
10
reference_url http://www.securityfocus.com/bid/101781
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101781
11
reference_url http://www.securitytracker.com/id/1039752
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039752
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1508823
reference_id 1508823
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1508823
13
reference_url https://security.archlinux.org/ASA-201711-17
reference_id ASA-201711-17
reference_type
scores
url https://security.archlinux.org/ASA-201711-17
14
reference_url https://security.archlinux.org/ASA-201711-18
reference_id ASA-201711-18
reference_type
scores
url https://security.archlinux.org/ASA-201711-18
15
reference_url https://security.archlinux.org/AVG-485
reference_id AVG-485
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-485
16
reference_url https://security.archlinux.org/AVG-486
reference_id AVG-486
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-486
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15099
reference_id CVE-2017-15099
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-15099
36
reference_url https://access.redhat.com/errata/RHSA-2018:2511
reference_id RHSA-2018:2511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2511
37
reference_url https://access.redhat.com/errata/RHSA-2018:2566
reference_id RHSA-2018:2566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2566
38
reference_url https://usn.ubuntu.com/3479-1/
reference_id USN-3479-1
reference_type
scores
url https://usn.ubuntu.com/3479-1/
fixed_packages
0
url pkg:generic/postgresql@10.1.0
purl pkg:generic/postgresql@10.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.1.0
aliases CVE-2017-15099
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bq8t-8q8q-dkb6
10
url VCID-cegf-gbkv-aqab
vulnerability_id VCID-cegf-gbkv-aqab
summary Uncontrolled search path element in logical replicationmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14349.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14349.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14349
reference_id
reference_type
scores
0
value 0.01548
scoring_system epss
scoring_elements 0.81342
published_at 2026-04-01T12:55:00Z
1
value 0.01548
scoring_system epss
scoring_elements 0.81466
published_at 2026-04-24T12:55:00Z
2
value 0.01548
scoring_system epss
scoring_elements 0.81443
published_at 2026-04-18T12:55:00Z
3
value 0.01548
scoring_system epss
scoring_elements 0.81445
published_at 2026-04-21T12:55:00Z
4
value 0.01548
scoring_system epss
scoring_elements 0.81351
published_at 2026-04-02T12:55:00Z
5
value 0.01548
scoring_system epss
scoring_elements 0.81373
published_at 2026-04-04T12:55:00Z
6
value 0.01548
scoring_system epss
scoring_elements 0.81371
published_at 2026-04-07T12:55:00Z
7
value 0.01548
scoring_system epss
scoring_elements 0.81399
published_at 2026-04-08T12:55:00Z
8
value 0.01548
scoring_system epss
scoring_elements 0.81404
published_at 2026-04-09T12:55:00Z
9
value 0.01548
scoring_system epss
scoring_elements 0.81425
published_at 2026-04-11T12:55:00Z
10
value 0.01548
scoring_system epss
scoring_elements 0.81413
published_at 2026-04-12T12:55:00Z
11
value 0.01548
scoring_system epss
scoring_elements 0.81405
published_at 2026-04-13T12:55:00Z
12
value 0.01548
scoring_system epss
scoring_elements 0.81442
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14349
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/
4
reference_url https://www.postgresql.org/support/security/CVE-2020-14349/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2020-14349/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865744
reference_id 1865744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865744
6
reference_url https://security.gentoo.org/glsa/202008-13
reference_id GLSA-202008-13
reference_type
scores
url https://security.gentoo.org/glsa/202008-13
7
reference_url https://access.redhat.com/errata/RHSA-2020:3669
reference_id RHSA-2020:3669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3669
8
reference_url https://access.redhat.com/errata/RHSA-2020:5110
reference_id RHSA-2020:5110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5110
9
reference_url https://access.redhat.com/errata/RHSA-2020:5112
reference_id RHSA-2020:5112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5112
10
reference_url https://access.redhat.com/errata/RHSA-2020:5620
reference_id RHSA-2020:5620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5620
11
reference_url https://access.redhat.com/errata/RHSA-2020:5664
reference_id RHSA-2020:5664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5664
12
reference_url https://access.redhat.com/errata/RHSA-2021:0163
reference_id RHSA-2021:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0163
13
reference_url https://access.redhat.com/errata/RHSA-2021:0166
reference_id RHSA-2021:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0166
14
reference_url https://access.redhat.com/errata/RHSA-2021:0988
reference_id RHSA-2021:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0988
15
reference_url https://usn.ubuntu.com/4472-1/
reference_id USN-4472-1
reference_type
scores
url https://usn.ubuntu.com/4472-1/
fixed_packages
0
url pkg:generic/postgresql@10.14.0
purl pkg:generic/postgresql@10.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.14.0
1
url pkg:generic/postgresql@11.9.0
purl pkg:generic/postgresql@11.9.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.9.0
2
url pkg:generic/postgresql@12.4.0
purl pkg:generic/postgresql@12.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.4.0
aliases CVE-2020-14349
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cegf-gbkv-aqab
11
url VCID-d362-bmcf-3kdz
vulnerability_id VCID-d362-bmcf-3kdz
summary Memory disclosure in JSON functionsmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15098.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15098.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15098
reference_id
reference_type
scores
0
value 0.00864
scoring_system epss
scoring_elements 0.75049
published_at 2026-04-01T12:55:00Z
1
value 0.00864
scoring_system epss
scoring_elements 0.75167
published_at 2026-04-24T12:55:00Z
2
value 0.00864
scoring_system epss
scoring_elements 0.75103
published_at 2026-04-09T12:55:00Z
3
value 0.00864
scoring_system epss
scoring_elements 0.75125
published_at 2026-04-11T12:55:00Z
4
value 0.00864
scoring_system epss
scoring_elements 0.75104
published_at 2026-04-12T12:55:00Z
5
value 0.00864
scoring_system epss
scoring_elements 0.75094
published_at 2026-04-13T12:55:00Z
6
value 0.00864
scoring_system epss
scoring_elements 0.75132
published_at 2026-04-16T12:55:00Z
7
value 0.00864
scoring_system epss
scoring_elements 0.75139
published_at 2026-04-18T12:55:00Z
8
value 0.00864
scoring_system epss
scoring_elements 0.75128
published_at 2026-04-21T12:55:00Z
9
value 0.00864
scoring_system epss
scoring_elements 0.75052
published_at 2026-04-02T12:55:00Z
10
value 0.00864
scoring_system epss
scoring_elements 0.75082
published_at 2026-04-04T12:55:00Z
11
value 0.00864
scoring_system epss
scoring_elements 0.75058
published_at 2026-04-07T12:55:00Z
12
value 0.00864
scoring_system epss
scoring_elements 0.75092
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15098
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.debian.org/security/2017/dsa-4027
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4027
6
reference_url https://www.debian.org/security/2017/dsa-4028
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4028
7
reference_url https://www.postgresql.org/about/news/1801/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/1801/
8
reference_url https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/
9
reference_url https://www.postgresql.org/support/security/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/
10
reference_url https://www.postgresql.org/support/security/CVE-2017-15098/
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2017-15098/
11
reference_url http://www.securityfocus.com/bid/101781
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101781
12
reference_url http://www.securitytracker.com/id/1039752
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039752
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1508820
reference_id 1508820
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1508820
14
reference_url https://security.archlinux.org/ASA-201711-17
reference_id ASA-201711-17
reference_type
scores
url https://security.archlinux.org/ASA-201711-17
15
reference_url https://security.archlinux.org/ASA-201711-18
reference_id ASA-201711-18
reference_type
scores
url https://security.archlinux.org/ASA-201711-18
16
reference_url https://security.archlinux.org/AVG-485
reference_id AVG-485
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-485
17
reference_url https://security.archlinux.org/AVG-486
reference_id AVG-486
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-486
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15098
reference_id CVE-2017-15098
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15098
72
reference_url https://access.redhat.com/errata/RHSA-2018:2511
reference_id RHSA-2018:2511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2511
73
reference_url https://access.redhat.com/errata/RHSA-2018:2566
reference_id RHSA-2018:2566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2566
74
reference_url https://usn.ubuntu.com/3479-1/
reference_id USN-3479-1
reference_type
scores
url https://usn.ubuntu.com/3479-1/
fixed_packages
0
url pkg:generic/postgresql@10.1.0
purl pkg:generic/postgresql@10.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.1.0
aliases CVE-2017-15098
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d362-bmcf-3kdz
12
url VCID-ne9g-k8fz-dkgb
vulnerability_id VCID-ne9g-k8fz-dkgb
summary Memory disclosure and missing authorization in INSERT ... ON CONFLICT DO UPDATE.more details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10925.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10925
reference_id
reference_type
scores
0
value 0.00383
scoring_system epss
scoring_elements 0.59509
published_at 2026-04-01T12:55:00Z
1
value 0.00383
scoring_system epss
scoring_elements 0.59618
published_at 2026-04-24T12:55:00Z
2
value 0.00383
scoring_system epss
scoring_elements 0.59664
published_at 2026-04-18T12:55:00Z
3
value 0.00383
scoring_system epss
scoring_elements 0.59649
published_at 2026-04-21T12:55:00Z
4
value 0.00383
scoring_system epss
scoring_elements 0.59582
published_at 2026-04-02T12:55:00Z
5
value 0.00383
scoring_system epss
scoring_elements 0.59606
published_at 2026-04-04T12:55:00Z
6
value 0.00383
scoring_system epss
scoring_elements 0.59576
published_at 2026-04-07T12:55:00Z
7
value 0.00383
scoring_system epss
scoring_elements 0.59627
published_at 2026-04-08T12:55:00Z
8
value 0.00383
scoring_system epss
scoring_elements 0.5964
published_at 2026-04-09T12:55:00Z
9
value 0.00383
scoring_system epss
scoring_elements 0.5966
published_at 2026-04-11T12:55:00Z
10
value 0.00383
scoring_system epss
scoring_elements 0.59643
published_at 2026-04-12T12:55:00Z
11
value 0.00383
scoring_system epss
scoring_elements 0.59623
published_at 2026-04-13T12:55:00Z
12
value 0.00383
scoring_system epss
scoring_elements 0.59657
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10925
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/
6
reference_url https://www.postgresql.org/support/security/CVE-2018-10925/
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N']
url https://www.postgresql.org/support/security/CVE-2018-10925/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1612619
reference_id 1612619
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1612619
8
reference_url https://security.gentoo.org/glsa/201810-08
reference_id GLSA-201810-08
reference_type
scores
url https://security.gentoo.org/glsa/201810-08
9
reference_url https://access.redhat.com/errata/RHSA-2018:2511
reference_id RHSA-2018:2511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2511
10
reference_url https://access.redhat.com/errata/RHSA-2018:2565
reference_id RHSA-2018:2565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2565
11
reference_url https://access.redhat.com/errata/RHSA-2018:2566
reference_id RHSA-2018:2566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2566
12
reference_url https://access.redhat.com/errata/RHSA-2018:3816
reference_id RHSA-2018:3816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3816
13
reference_url https://usn.ubuntu.com/3744-1/
reference_id USN-3744-1
reference_type
scores
url https://usn.ubuntu.com/3744-1/
fixed_packages
0
url pkg:generic/postgresql@10.5.0
purl pkg:generic/postgresql@10.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.5.0
aliases CVE-2018-10925
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ne9g-k8fz-dkgb
13
url VCID-nuek-ypyh-b3dm
vulnerability_id VCID-nuek-ypyh-b3dm
summary Extension scripts replace objects not belonging to the extensionmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2625
reference_id
reference_type
scores
0
value 0.00973
scoring_system epss
scoring_elements 0.76737
published_at 2026-04-24T12:55:00Z
1
value 0.00973
scoring_system epss
scoring_elements 0.76717
published_at 2026-04-18T12:55:00Z
2
value 0.00973
scoring_system epss
scoring_elements 0.76706
published_at 2026-04-21T12:55:00Z
3
value 0.00973
scoring_system epss
scoring_elements 0.76616
published_at 2026-04-02T12:55:00Z
4
value 0.00973
scoring_system epss
scoring_elements 0.76645
published_at 2026-04-04T12:55:00Z
5
value 0.00973
scoring_system epss
scoring_elements 0.76627
published_at 2026-04-07T12:55:00Z
6
value 0.00973
scoring_system epss
scoring_elements 0.7666
published_at 2026-04-08T12:55:00Z
7
value 0.00973
scoring_system epss
scoring_elements 0.76671
published_at 2026-04-09T12:55:00Z
8
value 0.00973
scoring_system epss
scoring_elements 0.76698
published_at 2026-04-11T12:55:00Z
9
value 0.00973
scoring_system epss
scoring_elements 0.76678
published_at 2026-04-12T12:55:00Z
10
value 0.00973
scoring_system epss
scoring_elements 0.7667
published_at 2026-04-13T12:55:00Z
11
value 0.00973
scoring_system epss
scoring_elements 0.76712
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2625
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/
5
reference_url https://www.postgresql.org/support/security/CVE-2022-2625/
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2022-2625/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2113825
reference_id 2113825
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2113825
7
reference_url https://security.gentoo.org/glsa/202211-04
reference_id GLSA-202211-04
reference_type
scores
url https://security.gentoo.org/glsa/202211-04
8
reference_url https://access.redhat.com/errata/RHSA-2022:7128
reference_id RHSA-2022:7128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7128
9
reference_url https://access.redhat.com/errata/RHSA-2023:0113
reference_id RHSA-2023:0113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0113
10
reference_url https://access.redhat.com/errata/RHSA-2023:0160
reference_id RHSA-2023:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0160
11
reference_url https://access.redhat.com/errata/RHSA-2023:1576
reference_id RHSA-2023:1576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1576
12
reference_url https://access.redhat.com/errata/RHSA-2023:1693
reference_id RHSA-2023:1693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1693
13
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7545
14
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7580
15
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7667
16
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7694
17
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7695
18
reference_url https://usn.ubuntu.com/5571-1/
reference_id USN-5571-1
reference_type
scores
url https://usn.ubuntu.com/5571-1/
fixed_packages
0
url pkg:generic/postgresql@10.22.0
purl pkg:generic/postgresql@10.22.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.22.0
1
url pkg:generic/postgresql@11.17.0
purl pkg:generic/postgresql@11.17.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.17.0
2
url pkg:generic/postgresql@12.12.0
purl pkg:generic/postgresql@12.12.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.12.0
3
url pkg:generic/postgresql@13.8.0
purl pkg:generic/postgresql@13.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.8.0
4
url pkg:generic/postgresql@14.5.0
purl pkg:generic/postgresql@14.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.5.0
aliases CVE-2022-2625
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nuek-ypyh-b3dm
14
url VCID-pg5v-ux6b-3qdn
vulnerability_id VCID-pg5v-ux6b-3qdn
summary Selectivity estimators bypass row security policiesmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10130.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10130.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10130
reference_id
reference_type
scores
0
value 0.00197
scoring_system epss
scoring_elements 0.41713
published_at 2026-04-01T12:55:00Z
1
value 0.00197
scoring_system epss
scoring_elements 0.41723
published_at 2026-04-21T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.41779
published_at 2026-04-02T12:55:00Z
3
value 0.00197
scoring_system epss
scoring_elements 0.41808
published_at 2026-04-04T12:55:00Z
4
value 0.00197
scoring_system epss
scoring_elements 0.41736
published_at 2026-04-07T12:55:00Z
5
value 0.00197
scoring_system epss
scoring_elements 0.41786
published_at 2026-04-08T12:55:00Z
6
value 0.00197
scoring_system epss
scoring_elements 0.41795
published_at 2026-04-18T12:55:00Z
7
value 0.00197
scoring_system epss
scoring_elements 0.41818
published_at 2026-04-11T12:55:00Z
8
value 0.00197
scoring_system epss
scoring_elements 0.41785
published_at 2026-04-12T12:55:00Z
9
value 0.00197
scoring_system epss
scoring_elements 0.41821
published_at 2026-04-16T12:55:00Z
10
value 0.00197
scoring_system epss
scoring_elements 0.41772
published_at 2026-04-13T12:55:00Z
11
value 0.00203
scoring_system epss
scoring_elements 0.42278
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10130
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/
5
reference_url https://www.postgresql.org/support/security/CVE-2019-10130/
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2019-10130/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1707109
reference_id 1707109
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1707109
7
reference_url https://security.gentoo.org/glsa/202003-03
reference_id GLSA-202003-03
reference_type
scores
url https://security.gentoo.org/glsa/202003-03
8
reference_url https://access.redhat.com/errata/RHSA-2020:0980
reference_id RHSA-2020:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0980
9
reference_url https://access.redhat.com/errata/RHSA-2020:3669
reference_id RHSA-2020:3669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3669
10
reference_url https://access.redhat.com/errata/RHSA-2020:4295
reference_id RHSA-2020:4295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4295
11
reference_url https://access.redhat.com/errata/RHSA-2020:5619
reference_id RHSA-2020:5619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5619
12
reference_url https://access.redhat.com/errata/RHSA-2020:5661
reference_id RHSA-2020:5661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5661
13
reference_url https://access.redhat.com/errata/RHSA-2020:5664
reference_id RHSA-2020:5664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5664
14
reference_url https://access.redhat.com/errata/RHSA-2021:0164
reference_id RHSA-2021:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0164
15
reference_url https://access.redhat.com/errata/RHSA-2021:0166
reference_id RHSA-2021:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0166
16
reference_url https://access.redhat.com/errata/RHSA-2021:0167
reference_id RHSA-2021:0167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0167
17
reference_url https://usn.ubuntu.com/3972-1/
reference_id USN-3972-1
reference_type
scores
url https://usn.ubuntu.com/3972-1/
fixed_packages
0
url pkg:generic/postgresql@10.8.0
purl pkg:generic/postgresql@10.8.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.8.0
1
url pkg:generic/postgresql@11.3.0
purl pkg:generic/postgresql@11.3.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.3.0
aliases CVE-2019-10130
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pg5v-ux6b-3qdn
15
url VCID-q8ka-5dxw-w7fs
vulnerability_id VCID-q8ka-5dxw-w7fs
summary Autovacuum, REINDEX, and others omit "security restricted operation" sandboxmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1552.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1552.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1552
reference_id
reference_type
scores
0
value 0.02263
scoring_system epss
scoring_elements 0.84548
published_at 2026-04-01T12:55:00Z
1
value 0.02263
scoring_system epss
scoring_elements 0.84675
published_at 2026-04-24T12:55:00Z
2
value 0.02263
scoring_system epss
scoring_elements 0.84646
published_at 2026-04-16T12:55:00Z
3
value 0.02263
scoring_system epss
scoring_elements 0.84647
published_at 2026-04-18T12:55:00Z
4
value 0.02263
scoring_system epss
scoring_elements 0.84648
published_at 2026-04-21T12:55:00Z
5
value 0.02263
scoring_system epss
scoring_elements 0.84563
published_at 2026-04-02T12:55:00Z
6
value 0.02263
scoring_system epss
scoring_elements 0.84585
published_at 2026-04-04T12:55:00Z
7
value 0.02263
scoring_system epss
scoring_elements 0.84588
published_at 2026-04-07T12:55:00Z
8
value 0.02263
scoring_system epss
scoring_elements 0.84609
published_at 2026-04-08T12:55:00Z
9
value 0.02263
scoring_system epss
scoring_elements 0.84616
published_at 2026-04-09T12:55:00Z
10
value 0.02263
scoring_system epss
scoring_elements 0.84635
published_at 2026-04-11T12:55:00Z
11
value 0.02263
scoring_system epss
scoring_elements 0.8463
published_at 2026-04-12T12:55:00Z
12
value 0.02263
scoring_system epss
scoring_elements 0.84625
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1552
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
5
reference_url https://www.postgresql.org/support/security/CVE-2022-1552/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2022-1552/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2081126
reference_id 2081126
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2081126
7
reference_url https://security.archlinux.org/AVG-2719
reference_id AVG-2719
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2719
8
reference_url https://security.gentoo.org/glsa/202211-04
reference_id GLSA-202211-04
reference_type
scores
url https://security.gentoo.org/glsa/202211-04
9
reference_url https://access.redhat.com/errata/RHSA-2022:4771
reference_id RHSA-2022:4771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4771
10
reference_url https://access.redhat.com/errata/RHSA-2022:4805
reference_id RHSA-2022:4805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4805
11
reference_url https://access.redhat.com/errata/RHSA-2022:4807
reference_id RHSA-2022:4807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4807
12
reference_url https://access.redhat.com/errata/RHSA-2022:4854
reference_id RHSA-2022:4854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4854
13
reference_url https://access.redhat.com/errata/RHSA-2022:4855
reference_id RHSA-2022:4855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4855
14
reference_url https://access.redhat.com/errata/RHSA-2022:4856
reference_id RHSA-2022:4856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4856
15
reference_url https://access.redhat.com/errata/RHSA-2022:4857
reference_id RHSA-2022:4857
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4857
16
reference_url https://access.redhat.com/errata/RHSA-2022:4893
reference_id RHSA-2022:4893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4893
17
reference_url https://access.redhat.com/errata/RHSA-2022:4894
reference_id RHSA-2022:4894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4894
18
reference_url https://access.redhat.com/errata/RHSA-2022:4895
reference_id RHSA-2022:4895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4895
19
reference_url https://access.redhat.com/errata/RHSA-2022:4913
reference_id RHSA-2022:4913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4913
20
reference_url https://access.redhat.com/errata/RHSA-2022:4915
reference_id RHSA-2022:4915
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4915
21
reference_url https://access.redhat.com/errata/RHSA-2022:4929
reference_id RHSA-2022:4929
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4929
22
reference_url https://access.redhat.com/errata/RHSA-2022:5162
reference_id RHSA-2022:5162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5162
23
reference_url https://usn.ubuntu.com/5440-1/
reference_id USN-5440-1
reference_type
scores
url https://usn.ubuntu.com/5440-1/
24
reference_url https://usn.ubuntu.com/5676-1/
reference_id USN-5676-1
reference_type
scores
url https://usn.ubuntu.com/5676-1/
fixed_packages
0
url pkg:generic/postgresql@10.21.0
purl pkg:generic/postgresql@10.21.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.21.0
1
url pkg:generic/postgresql@11.16.0
purl pkg:generic/postgresql@11.16.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.16.0
2
url pkg:generic/postgresql@12.11.0
purl pkg:generic/postgresql@12.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.11.0
3
url pkg:generic/postgresql@13.7.0
purl pkg:generic/postgresql@13.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.7.0
4
url pkg:generic/postgresql@14.3.0
purl pkg:generic/postgresql@14.3.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.3.0
aliases CVE-2022-1552
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q8ka-5dxw-w7fs
16
url VCID-qbd9-mpc6-5bap
vulnerability_id VCID-qbd9-mpc6-5bap
summary libpq processes unencrypted bytes from man-in-the-middlemore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23222.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23222.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23222
reference_id
reference_type
scores
0
value 0.00281
scoring_system epss
scoring_elements 0.51508
published_at 2026-04-24T12:55:00Z
1
value 0.00281
scoring_system epss
scoring_elements 0.51555
published_at 2026-04-21T12:55:00Z
2
value 0.00281
scoring_system epss
scoring_elements 0.51576
published_at 2026-04-18T12:55:00Z
3
value 0.00282
scoring_system epss
scoring_elements 0.51523
published_at 2026-04-07T12:55:00Z
4
value 0.00282
scoring_system epss
scoring_elements 0.51574
published_at 2026-04-09T12:55:00Z
5
value 0.00282
scoring_system epss
scoring_elements 0.51624
published_at 2026-04-11T12:55:00Z
6
value 0.00282
scoring_system epss
scoring_elements 0.51602
published_at 2026-04-12T12:55:00Z
7
value 0.00282
scoring_system epss
scoring_elements 0.51586
published_at 2026-04-13T12:55:00Z
8
value 0.00282
scoring_system epss
scoring_elements 0.51628
published_at 2026-04-16T12:55:00Z
9
value 0.00282
scoring_system epss
scoring_elements 0.51577
published_at 2026-04-08T12:55:00Z
10
value 0.00282
scoring_system epss
scoring_elements 0.51484
published_at 2026-04-01T12:55:00Z
11
value 0.00282
scoring_system epss
scoring_elements 0.51535
published_at 2026-04-02T12:55:00Z
12
value 0.00282
scoring_system epss
scoring_elements 0.51562
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
6
reference_url https://www.postgresql.org/support/security/CVE-2021-23222/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2021-23222/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2022675
reference_id 2022675
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2022675
8
reference_url https://security.archlinux.org/AVG-2547
reference_id AVG-2547
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2547
9
reference_url https://security.gentoo.org/glsa/202211-04
reference_id GLSA-202211-04
reference_type
scores
url https://security.gentoo.org/glsa/202211-04
10
reference_url https://access.redhat.com/errata/RHSA-2021:5179
reference_id RHSA-2021:5179
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5179
11
reference_url https://access.redhat.com/errata/RHSA-2021:5197
reference_id RHSA-2021:5197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5197
12
reference_url https://access.redhat.com/errata/RHSA-2022:1891
reference_id RHSA-2022:1891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1891
13
reference_url https://usn.ubuntu.com/5145-1/
reference_id USN-5145-1
reference_type
scores
url https://usn.ubuntu.com/5145-1/
14
reference_url https://usn.ubuntu.com/5765-1/
reference_id USN-5765-1
reference_type
scores
url https://usn.ubuntu.com/5765-1/
fixed_packages
0
url pkg:generic/postgresql@10.19.0
purl pkg:generic/postgresql@10.19.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.19.0
1
url pkg:generic/postgresql@11.14.0
purl pkg:generic/postgresql@11.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.14.0
2
url pkg:generic/postgresql@12.9.0
purl pkg:generic/postgresql@12.9.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.9.0
3
url pkg:generic/postgresql@13.5.0
purl pkg:generic/postgresql@13.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.5.0
4
url pkg:generic/postgresql@14.1.0
purl pkg:generic/postgresql@14.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.1.0
aliases CVE-2021-23222
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbd9-mpc6-5bap
17
url VCID-qnt9-qr7p-wkhy
vulnerability_id VCID-qnt9-qr7p-wkhy
summary Start scripts permit database administrator to modify root-owned filesmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12172.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12172.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12172
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16401
published_at 2026-04-01T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.1636
published_at 2026-04-24T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16586
published_at 2026-04-09T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16567
published_at 2026-04-11T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16527
published_at 2026-04-12T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16469
published_at 2026-04-13T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.1641
published_at 2026-04-16T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.1643
published_at 2026-04-18T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16467
published_at 2026-04-21T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16583
published_at 2026-04-02T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16646
published_at 2026-04-04T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16446
published_at 2026-04-07T12:55:00Z
12
value 0.00053
scoring_system epss
scoring_elements 0.16532
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12172
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:C/A:C
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.postgresql.org/about/news/1801/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/1801/
4
reference_url https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/
5
reference_url https://www.postgresql.org/support/security/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/
6
reference_url https://www.postgresql.org/support/security/CVE-2017-12172/
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2017-12172/
7
reference_url http://www.securityfocus.com/bid/101949
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101949
8
reference_url http://www.securitytracker.com/id/1039752
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039752
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1498394
reference_id 1498394
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1498394
10
reference_url https://security.archlinux.org/AVG-487
reference_id AVG-487
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-487
11
reference_url https://security.archlinux.org/AVG-488
reference_id AVG-488
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-488
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-12172
reference_id CVE-2017-12172
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-12172
89
reference_url https://access.redhat.com/errata/RHSA-2017:3402
reference_id RHSA-2017:3402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3402
90
reference_url https://access.redhat.com/errata/RHSA-2017:3403
reference_id RHSA-2017:3403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3403
91
reference_url https://access.redhat.com/errata/RHSA-2017:3404
reference_id RHSA-2017:3404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3404
92
reference_url https://access.redhat.com/errata/RHSA-2017:3405
reference_id RHSA-2017:3405
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3405
fixed_packages
0
url pkg:generic/postgresql@10.1.0
purl pkg:generic/postgresql@10.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.1.0
aliases CVE-2017-12172
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qnt9-qr7p-wkhy
18
url VCID-sq2s-cvrs-7uhh
vulnerability_id VCID-sq2s-cvrs-7uhh
summary Certain host connection parameters defeat client-side security defensesmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10915.json
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10915.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10915
reference_id
reference_type
scores
0
value 0.01753
scoring_system epss
scoring_elements 0.82502
published_at 2026-04-01T12:55:00Z
1
value 0.01753
scoring_system epss
scoring_elements 0.82629
published_at 2026-04-24T12:55:00Z
2
value 0.01753
scoring_system epss
scoring_elements 0.82603
published_at 2026-04-18T12:55:00Z
3
value 0.01753
scoring_system epss
scoring_elements 0.82608
published_at 2026-04-21T12:55:00Z
4
value 0.01753
scoring_system epss
scoring_elements 0.82516
published_at 2026-04-02T12:55:00Z
5
value 0.01753
scoring_system epss
scoring_elements 0.82531
published_at 2026-04-04T12:55:00Z
6
value 0.01753
scoring_system epss
scoring_elements 0.82527
published_at 2026-04-07T12:55:00Z
7
value 0.01753
scoring_system epss
scoring_elements 0.82553
published_at 2026-04-08T12:55:00Z
8
value 0.01753
scoring_system epss
scoring_elements 0.8256
published_at 2026-04-09T12:55:00Z
9
value 0.01753
scoring_system epss
scoring_elements 0.82579
published_at 2026-04-11T12:55:00Z
10
value 0.01753
scoring_system epss
scoring_elements 0.82572
published_at 2026-04-12T12:55:00Z
11
value 0.01753
scoring_system epss
scoring_elements 0.82566
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10915
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/
6
reference_url https://www.postgresql.org/support/security/CVE-2018-10915/
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2018-10915/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1609891
reference_id 1609891
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1609891
8
reference_url https://security.gentoo.org/glsa/201810-08
reference_id GLSA-201810-08
reference_type
scores
url https://security.gentoo.org/glsa/201810-08
9
reference_url https://access.redhat.com/errata/RHSA-2018:2511
reference_id RHSA-2018:2511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2511
10
reference_url https://access.redhat.com/errata/RHSA-2018:2557
reference_id RHSA-2018:2557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2557
11
reference_url https://access.redhat.com/errata/RHSA-2018:2565
reference_id RHSA-2018:2565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2565
12
reference_url https://access.redhat.com/errata/RHSA-2018:2566
reference_id RHSA-2018:2566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2566
13
reference_url https://access.redhat.com/errata/RHSA-2018:3816
reference_id RHSA-2018:3816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3816
14
reference_url https://usn.ubuntu.com/3744-1/
reference_id USN-3744-1
reference_type
scores
url https://usn.ubuntu.com/3744-1/
fixed_packages
0
url pkg:generic/postgresql@10.5.0
purl pkg:generic/postgresql@10.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.5.0
aliases CVE-2018-10915
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sq2s-cvrs-7uhh
19
url VCID-srbh-8fdq-bkc2
vulnerability_id VCID-srbh-8fdq-bkc2
summary Server processes unencrypted bytes from man-in-the-middlemore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23214.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23214.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23214
reference_id
reference_type
scores
0
value 0.00193
scoring_system epss
scoring_elements 0.41154
published_at 2026-04-21T12:55:00Z
1
value 0.00193
scoring_system epss
scoring_elements 0.41043
published_at 2026-04-24T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.4157
published_at 2026-04-01T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45209
published_at 2026-04-09T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.4519
published_at 2026-04-02T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45213
published_at 2026-04-04T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45155
published_at 2026-04-07T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.452
published_at 2026-04-13T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45251
published_at 2026-04-16T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.45245
published_at 2026-04-18T12:55:00Z
10
value 0.00225
scoring_system epss
scoring_elements 0.4523
published_at 2026-04-11T12:55:00Z
11
value 0.00225
scoring_system epss
scoring_elements 0.45197
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23214
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
6
reference_url https://www.postgresql.org/support/security/CVE-2021-23214/
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2021-23214/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2022666
reference_id 2022666
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2022666
8
reference_url https://security.archlinux.org/ASA-202204-1
reference_id ASA-202204-1
reference_type
scores
url https://security.archlinux.org/ASA-202204-1
9
reference_url https://security.archlinux.org/AVG-2546
reference_id AVG-2546
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2546
10
reference_url https://security.gentoo.org/glsa/202211-04
reference_id GLSA-202211-04
reference_type
scores
url https://security.gentoo.org/glsa/202211-04
11
reference_url https://access.redhat.com/errata/RHSA-2021:5179
reference_id RHSA-2021:5179
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5179
12
reference_url https://access.redhat.com/errata/RHSA-2021:5197
reference_id RHSA-2021:5197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5197
13
reference_url https://access.redhat.com/errata/RHSA-2021:5235
reference_id RHSA-2021:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5235
14
reference_url https://access.redhat.com/errata/RHSA-2021:5236
reference_id RHSA-2021:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5236
15
reference_url https://access.redhat.com/errata/RHSA-2022:1830
reference_id RHSA-2022:1830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1830
16
reference_url https://usn.ubuntu.com/5145-1/
reference_id USN-5145-1
reference_type
scores
url https://usn.ubuntu.com/5145-1/
17
reference_url https://usn.ubuntu.com/5645-1/
reference_id USN-5645-1
reference_type
scores
url https://usn.ubuntu.com/5645-1/
fixed_packages
0
url pkg:generic/postgresql@10.19.0
purl pkg:generic/postgresql@10.19.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.19.0
1
url pkg:generic/postgresql@11.14.0
purl pkg:generic/postgresql@11.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.14.0
2
url pkg:generic/postgresql@12.9.0
purl pkg:generic/postgresql@12.9.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.9.0
3
url pkg:generic/postgresql@13.5.0
purl pkg:generic/postgresql@13.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.5.0
4
url pkg:generic/postgresql@14.1.0
purl pkg:generic/postgresql@14.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.1.0
aliases CVE-2021-23214
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-srbh-8fdq-bkc2
20
url VCID-umaz-62cm-bqfe
vulnerability_id VCID-umaz-62cm-bqfe
summary Uncontrolled search path element in CREATE EXTENSIONmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14350
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08621
published_at 2026-04-01T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08726
published_at 2026-04-24T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08558
published_at 2026-04-18T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08713
published_at 2026-04-21T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08648
published_at 2026-04-02T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08697
published_at 2026-04-12T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08618
published_at 2026-04-07T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08695
published_at 2026-04-08T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.0872
published_at 2026-04-11T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08682
published_at 2026-04-13T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.0857
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14350
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/
4
reference_url https://www.postgresql.org/support/security/CVE-2020-14350/
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2020-14350/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865746
reference_id 1865746
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865746
6
reference_url https://security.gentoo.org/glsa/202008-13
reference_id GLSA-202008-13
reference_type
scores
url https://security.gentoo.org/glsa/202008-13
7
reference_url https://access.redhat.com/errata/RHSA-2020:3669
reference_id RHSA-2020:3669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3669
8
reference_url https://access.redhat.com/errata/RHSA-2020:4295
reference_id RHSA-2020:4295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4295
9
reference_url https://access.redhat.com/errata/RHSA-2020:5110
reference_id RHSA-2020:5110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5110
10
reference_url https://access.redhat.com/errata/RHSA-2020:5112
reference_id RHSA-2020:5112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5112
11
reference_url https://access.redhat.com/errata/RHSA-2020:5619
reference_id RHSA-2020:5619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5619
12
reference_url https://access.redhat.com/errata/RHSA-2020:5620
reference_id RHSA-2020:5620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5620
13
reference_url https://access.redhat.com/errata/RHSA-2020:5661
reference_id RHSA-2020:5661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5661
14
reference_url https://access.redhat.com/errata/RHSA-2020:5664
reference_id RHSA-2020:5664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5664
15
reference_url https://access.redhat.com/errata/RHSA-2021:0163
reference_id RHSA-2021:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0163
16
reference_url https://access.redhat.com/errata/RHSA-2021:0164
reference_id RHSA-2021:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0164
17
reference_url https://access.redhat.com/errata/RHSA-2021:0166
reference_id RHSA-2021:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0166
18
reference_url https://access.redhat.com/errata/RHSA-2021:0167
reference_id RHSA-2021:0167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0167
19
reference_url https://access.redhat.com/errata/RHSA-2021:0988
reference_id RHSA-2021:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0988
20
reference_url https://usn.ubuntu.com/4472-1/
reference_id USN-4472-1
reference_type
scores
url https://usn.ubuntu.com/4472-1/
fixed_packages
0
url pkg:generic/postgresql@10.14.0
purl pkg:generic/postgresql@10.14.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.14.0
1
url pkg:generic/postgresql@11.9.0
purl pkg:generic/postgresql@11.9.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.9.0
2
url pkg:generic/postgresql@12.4.0
purl pkg:generic/postgresql@12.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.4.0
aliases CVE-2020-14350
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-umaz-62cm-bqfe
21
url VCID-wamn-1as1-qbfa
vulnerability_id VCID-wamn-1as1-qbfa
summary ALTER ... DEPENDS ON EXTENSION is missing authorization checks.more details
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1720
reference_id
reference_type
scores
0
value 0.00351
scoring_system epss
scoring_elements 0.57428
published_at 2026-04-01T12:55:00Z
1
value 0.00351
scoring_system epss
scoring_elements 0.57502
published_at 2026-04-24T12:55:00Z
2
value 0.00351
scoring_system epss
scoring_elements 0.57561
published_at 2026-04-12T12:55:00Z
3
value 0.00351
scoring_system epss
scoring_elements 0.57539
published_at 2026-04-13T12:55:00Z
4
value 0.00351
scoring_system epss
scoring_elements 0.57567
published_at 2026-04-16T12:55:00Z
5
value 0.00351
scoring_system epss
scoring_elements 0.57563
published_at 2026-04-18T12:55:00Z
6
value 0.00351
scoring_system epss
scoring_elements 0.57543
published_at 2026-04-21T12:55:00Z
7
value 0.00351
scoring_system epss
scoring_elements 0.57512
published_at 2026-04-02T12:55:00Z
8
value 0.00351
scoring_system epss
scoring_elements 0.57533
published_at 2026-04-04T12:55:00Z
9
value 0.00351
scoring_system epss
scoring_elements 0.57509
published_at 2026-04-07T12:55:00Z
10
value 0.00351
scoring_system epss
scoring_elements 0.57562
published_at 2026-04-08T12:55:00Z
11
value 0.00351
scoring_system epss
scoring_elements 0.57566
published_at 2026-04-09T12:55:00Z
12
value 0.00351
scoring_system epss
scoring_elements 0.57581
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1720
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.postgresql.org/about/news/2011/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/2011/
7
reference_url https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/
8
reference_url https://www.postgresql.org/support/security/CVE-2020-1720/
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N']
url https://www.postgresql.org/support/security/CVE-2020-1720/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1798852
reference_id 1798852
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1798852
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-1720
reference_id CVE-2020-1720
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
2
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-1720
15
reference_url https://security.gentoo.org/glsa/202003-03
reference_id GLSA-202003-03
reference_type
scores
url https://security.gentoo.org/glsa/202003-03
16
reference_url https://access.redhat.com/errata/RHSA-2020:0980
reference_id RHSA-2020:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0980
17
reference_url https://access.redhat.com/errata/RHSA-2020:3669
reference_id RHSA-2020:3669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3669
18
reference_url https://access.redhat.com/errata/RHSA-2020:4295
reference_id RHSA-2020:4295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4295
19
reference_url https://access.redhat.com/errata/RHSA-2020:5112
reference_id RHSA-2020:5112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5112
20
reference_url https://access.redhat.com/errata/RHSA-2020:5619
reference_id RHSA-2020:5619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5619
21
reference_url https://access.redhat.com/errata/RHSA-2020:5620
reference_id RHSA-2020:5620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5620
22
reference_url https://access.redhat.com/errata/RHSA-2020:5661
reference_id RHSA-2020:5661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5661
23
reference_url https://access.redhat.com/errata/RHSA-2020:5664
reference_id RHSA-2020:5664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5664
24
reference_url https://access.redhat.com/errata/RHSA-2021:0163
reference_id RHSA-2021:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0163
25
reference_url https://access.redhat.com/errata/RHSA-2021:0164
reference_id RHSA-2021:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0164
26
reference_url https://access.redhat.com/errata/RHSA-2021:0166
reference_id RHSA-2021:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0166
27
reference_url https://access.redhat.com/errata/RHSA-2021:0167
reference_id RHSA-2021:0167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0167
28
reference_url https://usn.ubuntu.com/4282-1/
reference_id USN-4282-1
reference_type
scores
url https://usn.ubuntu.com/4282-1/
fixed_packages
0
url pkg:generic/postgresql@10.12.0
purl pkg:generic/postgresql@10.12.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.12.0
1
url pkg:generic/postgresql@11.7.0
purl pkg:generic/postgresql@11.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.7.0
2
url pkg:generic/postgresql@12.2.0
purl pkg:generic/postgresql@12.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.2.0
aliases CVE-2020-1720
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wamn-1as1-qbfa
22
url VCID-wcsh-zz5q-qqbf
vulnerability_id VCID-wcsh-zz5q-qqbf
summary pg_upgrade creates file of sensitive metadata under prevailing umaskmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1053.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1053
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22014
published_at 2026-04-01T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22084
published_at 2026-04-08T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22172
published_at 2026-04-02T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.2222
published_at 2026-04-04T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22003
published_at 2026-04-07T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22139
published_at 2026-04-09T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24176
published_at 2026-04-24T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24327
published_at 2026-04-18T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24301
published_at 2026-04-21T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24419
published_at 2026-04-11T12:55:00Z
10
value 0.00083
scoring_system epss
scoring_elements 0.24377
published_at 2026-04-12T12:55:00Z
11
value 0.00083
scoring_system epss
scoring_elements 0.24321
published_at 2026-04-13T12:55:00Z
12
value 0.00083
scoring_system epss
scoring_elements 0.24338
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1053
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/
4
reference_url https://www.postgresql.org/support/security/CVE-2018-1053/
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements ['AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2018-1053/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1539619
reference_id 1539619
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1539619
6
reference_url https://access.redhat.com/errata/RHSA-2018:2511
reference_id RHSA-2018:2511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2511
7
reference_url https://access.redhat.com/errata/RHSA-2018:2566
reference_id RHSA-2018:2566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2566
8
reference_url https://access.redhat.com/errata/RHSA-2018:3816
reference_id RHSA-2018:3816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3816
9
reference_url https://usn.ubuntu.com/3564-1/
reference_id USN-3564-1
reference_type
scores
url https://usn.ubuntu.com/3564-1/
fixed_packages
0
url pkg:generic/postgresql@10.2.0
purl pkg:generic/postgresql@10.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.2.0
aliases CVE-2018-1053
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wcsh-zz5q-qqbf
23
url VCID-xjv3-x91m-qqhn
vulnerability_id VCID-xjv3-x91m-qqhn
summary psql's \gset allows overwriting specially treated variablesmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25696
reference_id
reference_type
scores
0
value 0.00473
scoring_system epss
scoring_elements 0.64626
published_at 2026-04-01T12:55:00Z
1
value 0.00473
scoring_system epss
scoring_elements 0.64757
published_at 2026-04-24T12:55:00Z
2
value 0.00473
scoring_system epss
scoring_elements 0.64741
published_at 2026-04-16T12:55:00Z
3
value 0.00473
scoring_system epss
scoring_elements 0.64752
published_at 2026-04-18T12:55:00Z
4
value 0.00473
scoring_system epss
scoring_elements 0.64739
published_at 2026-04-21T12:55:00Z
5
value 0.00473
scoring_system epss
scoring_elements 0.64678
published_at 2026-04-02T12:55:00Z
6
value 0.00473
scoring_system epss
scoring_elements 0.64706
published_at 2026-04-04T12:55:00Z
7
value 0.00473
scoring_system epss
scoring_elements 0.64665
published_at 2026-04-07T12:55:00Z
8
value 0.00473
scoring_system epss
scoring_elements 0.64713
published_at 2026-04-08T12:55:00Z
9
value 0.00473
scoring_system epss
scoring_elements 0.64727
published_at 2026-04-09T12:55:00Z
10
value 0.00473
scoring_system epss
scoring_elements 0.64744
published_at 2026-04-11T12:55:00Z
11
value 0.00473
scoring_system epss
scoring_elements 0.64733
published_at 2026-04-12T12:55:00Z
12
value 0.00473
scoring_system epss
scoring_elements 0.64705
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25696
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/
5
reference_url https://www.postgresql.org/support/security/CVE-2020-25696/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2020-25696/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1894430
reference_id 1894430
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1894430
7
reference_url https://security.archlinux.org/ASA-202011-14
reference_id ASA-202011-14
reference_type
scores
url https://security.archlinux.org/ASA-202011-14
8
reference_url https://security.archlinux.org/AVG-1276
reference_id AVG-1276
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1276
9
reference_url https://security.gentoo.org/glsa/202012-07
reference_id GLSA-202012-07
reference_type
scores
url https://security.gentoo.org/glsa/202012-07
10
reference_url https://access.redhat.com/errata/RHSA-2020:5316
reference_id RHSA-2020:5316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5316
11
reference_url https://access.redhat.com/errata/RHSA-2020:5317
reference_id RHSA-2020:5317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5317
12
reference_url https://access.redhat.com/errata/RHSA-2020:5401
reference_id RHSA-2020:5401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5401
13
reference_url https://access.redhat.com/errata/RHSA-2020:5567
reference_id RHSA-2020:5567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5567
14
reference_url https://access.redhat.com/errata/RHSA-2020:5619
reference_id RHSA-2020:5619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5619
15
reference_url https://access.redhat.com/errata/RHSA-2020:5620
reference_id RHSA-2020:5620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5620
16
reference_url https://access.redhat.com/errata/RHSA-2020:5638
reference_id RHSA-2020:5638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5638
17
reference_url https://access.redhat.com/errata/RHSA-2020:5661
reference_id RHSA-2020:5661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5661
18
reference_url https://access.redhat.com/errata/RHSA-2020:5664
reference_id RHSA-2020:5664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5664
19
reference_url https://access.redhat.com/errata/RHSA-2021:0057
reference_id RHSA-2021:0057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0057
20
reference_url https://access.redhat.com/errata/RHSA-2021:0161
reference_id RHSA-2021:0161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0161
21
reference_url https://access.redhat.com/errata/RHSA-2021:0163
reference_id RHSA-2021:0163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0163
22
reference_url https://access.redhat.com/errata/RHSA-2021:0164
reference_id RHSA-2021:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0164
23
reference_url https://access.redhat.com/errata/RHSA-2021:0165
reference_id RHSA-2021:0165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0165
24
reference_url https://access.redhat.com/errata/RHSA-2021:0166
reference_id RHSA-2021:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0166
25
reference_url https://access.redhat.com/errata/RHSA-2021:0167
reference_id RHSA-2021:0167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0167
26
reference_url https://usn.ubuntu.com/4633-1/
reference_id USN-4633-1
reference_type
scores
url https://usn.ubuntu.com/4633-1/
fixed_packages
0
url pkg:generic/postgresql@10.15.0
purl pkg:generic/postgresql@10.15.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.15.0
1
url pkg:generic/postgresql@11.10.0
purl pkg:generic/postgresql@11.10.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0
2
url pkg:generic/postgresql@12.5.0
purl pkg:generic/postgresql@12.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0
3
url pkg:generic/postgresql@13.1.0
purl pkg:generic/postgresql@13.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0
aliases CVE-2020-25696
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xjv3-x91m-qqhn
24
url VCID-ybb6-2xrm-7fbk
vulnerability_id VCID-ybb6-2xrm-7fbk
summary Stack-based buffer overflow via setting a passwordmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10164.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10164.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10164
reference_id
reference_type
scores
0
value 0.05798
scoring_system epss
scoring_elements 0.90528
published_at 2026-04-16T12:55:00Z
1
value 0.05798
scoring_system epss
scoring_elements 0.90516
published_at 2026-04-12T12:55:00Z
2
value 0.05798
scoring_system epss
scoring_elements 0.9051
published_at 2026-04-13T12:55:00Z
3
value 0.05903
scoring_system epss
scoring_elements 0.90571
published_at 2026-04-04T12:55:00Z
4
value 0.05903
scoring_system epss
scoring_elements 0.90579
published_at 2026-04-07T12:55:00Z
5
value 0.05903
scoring_system epss
scoring_elements 0.90591
published_at 2026-04-08T12:55:00Z
6
value 0.05903
scoring_system epss
scoring_elements 0.90597
published_at 2026-04-09T12:55:00Z
7
value 0.05903
scoring_system epss
scoring_elements 0.90556
published_at 2026-04-01T12:55:00Z
8
value 0.05903
scoring_system epss
scoring_elements 0.9056
published_at 2026-04-02T12:55:00Z
9
value 0.13393
scoring_system epss
scoring_elements 0.94214
published_at 2026-04-24T12:55:00Z
10
value 0.13393
scoring_system epss
scoring_elements 0.94211
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10164
2
reference_url https://www.postgresql.org/about/news/postgresql-114-109-9614-9518-9423-and-12-beta-2-released-1949/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-114-109-9614-9518-9423-and-12-beta-2-released-1949/
3
reference_url https://www.postgresql.org/support/security/CVE-2019-10164/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2019-10164/
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1719698
reference_id 1719698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1719698
5
reference_url https://security.gentoo.org/glsa/202003-03
reference_id GLSA-202003-03
reference_type
scores
url https://security.gentoo.org/glsa/202003-03
6
reference_url https://access.redhat.com/errata/RHSA-2020:0980
reference_id RHSA-2020:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0980
7
reference_url https://access.redhat.com/errata/RHSA-2020:3669
reference_id RHSA-2020:3669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3669
8
reference_url https://access.redhat.com/errata/RHSA-2020:5664
reference_id RHSA-2020:5664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5664
9
reference_url https://access.redhat.com/errata/RHSA-2021:0166
reference_id RHSA-2021:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0166
10
reference_url https://usn.ubuntu.com/4027-1/
reference_id USN-4027-1
reference_type
scores
url https://usn.ubuntu.com/4027-1/
fixed_packages
0
url pkg:generic/postgresql@10.9.0
purl pkg:generic/postgresql@10.9.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.9.0
1
url pkg:generic/postgresql@11.4.0
purl pkg:generic/postgresql@11.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.4.0
aliases CVE-2019-10164
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ybb6-2xrm-7fbk
25
url VCID-zrcc-w98g-gfhk
vulnerability_id VCID-zrcc-w98g-gfhk
summary pg_ctlcluster script in postgresql-common does not drop privileges when creating socket/statistics temporary directoriesmore details
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3466
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.3202
published_at 2026-04-24T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.3219
published_at 2026-04-01T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32231
published_at 2026-04-16T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.3221
published_at 2026-04-18T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32181
published_at 2026-04-21T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32326
published_at 2026-04-02T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.32364
published_at 2026-04-04T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32188
published_at 2026-04-07T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.32237
published_at 2026-04-08T12:55:00Z
9
value 0.00128
scoring_system epss
scoring_elements 0.32265
published_at 2026-04-09T12:55:00Z
10
value 0.00128
scoring_system epss
scoring_elements 0.32266
published_at 2026-04-11T12:55:00Z
11
value 0.00128
scoring_system epss
scoring_elements 0.32228
published_at 2026-04-12T12:55:00Z
12
value 0.00128
scoring_system epss
scoring_elements 0.32198
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3466
1
reference_url https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/
reference_id
reference_type
scores
url https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466
3
reference_url https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/
4
reference_url https://www.postgresql.org/support/security/CVE-2019-3466/
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2019-3466/
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3466
reference_id CVE-2019-3466
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3466
13
reference_url https://usn.ubuntu.com/4194-1/
reference_id USN-4194-1
reference_type
scores
url https://usn.ubuntu.com/4194-1/
14
reference_url https://usn.ubuntu.com/4194-2/
reference_id USN-4194-2
reference_type
scores
url https://usn.ubuntu.com/4194-2/
fixed_packages
0
url pkg:generic/postgresql@10.11.0
purl pkg:generic/postgresql@10.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.11.0
1
url pkg:generic/postgresql@11.6.0
purl pkg:generic/postgresql@11.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.6.0
2
url pkg:generic/postgresql@12.1.0
purl pkg:generic/postgresql@12.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.1.0
aliases CVE-2019-3466
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zrcc-w98g-gfhk
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.0.0