Lookup for vulnerable packages by Package URL.

GET /api/packages/199?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/199?format=api",
    "purl": "pkg:generic/postgresql@10.0.0",
    "type": "generic",
    "namespace": "",
    "name": "postgresql",
    "version": "10.0.0",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "10.1.0",
    "latest_non_vulnerable_version": "18.2.0",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3567?format=api",
            "vulnerability_id": "VCID-1rgq-t3wa-2fck",
            "summary": "SQL injection in pg_upgrade and pg_dump, via CREATE TRIGGER ... REFERENCING.more details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16850.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16850.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16850",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79805",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79813",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79834",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79851",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79859",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7988",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79863",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79856",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79884",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79885",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79888",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79916",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79923",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16850"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-111-106-9611-9515-9420-and-9325-released-1905/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-111-106-9611-9515-9420-and-9325-released-1905/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2018-16850/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2018-16850/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645937",
                    "reference_id": "1645937",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645937"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201811-24",
                    "reference_id": "GLSA-201811-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201811-24"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3757",
                    "reference_id": "RHSA-2018:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3818-1/",
                    "reference_id": "USN-3818-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3818-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/327?format=api",
                    "purl": "pkg:generic/postgresql@10.6.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.6.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/326?format=api",
                    "purl": "pkg:generic/postgresql@11.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.1.0"
                }
            ],
            "aliases": [
                "CVE-2018-16850"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1rgq-t3wa-2fck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3560?format=api",
            "vulnerability_id": "VCID-36gv-m96w-47db",
            "summary": "Reconnection can downgrade connection security settingsmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58007",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58104",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58148",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58149",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58124",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58091",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58113",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58087",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58142",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58145",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5816",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58137",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58118",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25694"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2020-25694/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2020-25694/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894423",
                    "reference_id": "1894423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894423"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-14",
                    "reference_id": "ASA-202011-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-14"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1276",
                    "reference_id": "AVG-1276",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1276"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-07",
                    "reference_id": "GLSA-202012-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202012-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5316",
                    "reference_id": "RHSA-2020:5316",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5316"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5317",
                    "reference_id": "RHSA-2020:5317",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5317"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5401",
                    "reference_id": "RHSA-2020:5401",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5401"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5567",
                    "reference_id": "RHSA-2020:5567",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5567"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619",
                    "reference_id": "RHSA-2020:5619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5619"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620",
                    "reference_id": "RHSA-2020:5620",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5620"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5638",
                    "reference_id": "RHSA-2020:5638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661",
                    "reference_id": "RHSA-2020:5661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0057",
                    "reference_id": "RHSA-2021:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0161",
                    "reference_id": "RHSA-2021:0161",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0161"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163",
                    "reference_id": "RHSA-2021:0163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0163"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164",
                    "reference_id": "RHSA-2021:0164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0165",
                    "reference_id": "RHSA-2021:0165",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0165"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167",
                    "reference_id": "RHSA-2021:0167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0167"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1512",
                    "reference_id": "RHSA-2021:1512",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1512"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4633-1/",
                    "reference_id": "USN-4633-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4633-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/302?format=api",
                    "purl": "pkg:generic/postgresql@10.15.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.15.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/301?format=api",
                    "purl": "pkg:generic/postgresql@11.10.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/300?format=api",
                    "purl": "pkg:generic/postgresql@12.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/299?format=api",
                    "purl": "pkg:generic/postgresql@13.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0"
                }
            ],
            "aliases": [
                "CVE-2020-25694"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-36gv-m96w-47db"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3557?format=api",
            "vulnerability_id": "VCID-4jdp-3xqp-ufap",
            "summary": "Buffer overrun from integer overflow in array subscripting calculationsmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32027",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65502",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65645",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65635",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65619",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65634",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6555",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6558",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65546",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65599",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65611",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6563",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65616",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65587",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65623",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32027"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2021-32027/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2021-32027/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956876",
                    "reference_id": "1956876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956876"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202106-15",
                    "reference_id": "ASA-202106-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202106-15"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1956",
                    "reference_id": "AVG-1956",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1956"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202211-04",
                    "reference_id": "GLSA-202211-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202211-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2360",
                    "reference_id": "RHSA-2021:2360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2360"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2361",
                    "reference_id": "RHSA-2021:2361",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2361"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2372",
                    "reference_id": "RHSA-2021:2372",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2372"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2375",
                    "reference_id": "RHSA-2021:2375",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2375"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2389",
                    "reference_id": "RHSA-2021:2389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2389"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2390",
                    "reference_id": "RHSA-2021:2390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2390"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2391",
                    "reference_id": "RHSA-2021:2391",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2391"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2392",
                    "reference_id": "RHSA-2021:2392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2393",
                    "reference_id": "RHSA-2021:2393",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2393"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2394",
                    "reference_id": "RHSA-2021:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2394"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2395",
                    "reference_id": "RHSA-2021:2395",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2395"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2396",
                    "reference_id": "RHSA-2021:2396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2396"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2397",
                    "reference_id": "RHSA-2021:2397",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2397"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4972-1/",
                    "reference_id": "USN-4972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4972-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5645-1/",
                    "reference_id": "USN-5645-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5645-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/292?format=api",
                    "purl": "pkg:generic/postgresql@10.17.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.17.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/291?format=api",
                    "purl": "pkg:generic/postgresql@11.12.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/290?format=api",
                    "purl": "pkg:generic/postgresql@12.7.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/289?format=api",
                    "purl": "pkg:generic/postgresql@13.3.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0"
                }
            ],
            "aliases": [
                "CVE-2021-32027"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4jdp-3xqp-ufap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3570?format=api",
            "vulnerability_id": "VCID-4jnn-un4y-qkbr",
            "summary": "Memory disclosure in table partitioningmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1052.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1052.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64587",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6464",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64669",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64626",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64674",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6469",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64707",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64695",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64667",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64703",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64714",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64701",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64721",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64734",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1052"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2018-1052/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2018-1052/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539613",
                    "reference_id": "1539613",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539613"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/227?format=api",
                    "purl": "pkg:generic/postgresql@10.2.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.2.0"
                }
            ],
            "aliases": [
                "CVE-2018-1052"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4jnn-un4y-qkbr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3531?format=api",
            "vulnerability_id": "VCID-7xfn-1fv3-1bgv",
            "summary": "Uncontrolled search path element in pg_dump and other client applicationsmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1058.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1058.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1058",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.82687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99229",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.82687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99245",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.82687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99239",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.82687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9924",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.82687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99241",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.82687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99231",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.82687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99234",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.82687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99238",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1058"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-103-968-9512-9417-and-9322-released-1834/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-103-968-9512-9417-and-9322-released-1834/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2018-1058/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2018-1058/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547044",
                    "reference_id": "1547044",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547044"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-9",
                    "reference_id": "ASA-201803-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-643",
                    "reference_id": "AVG-643",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-643"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2511",
                    "reference_id": "RHSA-2018:2511",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2511"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2566",
                    "reference_id": "RHSA-2018:2566",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2566"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3816",
                    "reference_id": "RHSA-2018:3816",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3816"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3589-1/",
                    "reference_id": "USN-3589-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3589-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/222?format=api",
                    "purl": "pkg:generic/postgresql@10.3.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.3.0"
                }
            ],
            "aliases": [
                "CVE-2018-1058"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7xfn-1fv3-1bgv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3556?format=api",
            "vulnerability_id": "VCID-8p8h-jdyq-vfek",
            "summary": "Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATEmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64362",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64513",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64487",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64479",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.645",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64445",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64405",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64453",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64469",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64481",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64441",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64475",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32028"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2021-32028/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2021-32028/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956877",
                    "reference_id": "1956877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956877"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202106-15",
                    "reference_id": "ASA-202106-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202106-15"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1956",
                    "reference_id": "AVG-1956",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1956"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202211-04",
                    "reference_id": "GLSA-202211-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202211-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2360",
                    "reference_id": "RHSA-2021:2360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2360"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2361",
                    "reference_id": "RHSA-2021:2361",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2361"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2372",
                    "reference_id": "RHSA-2021:2372",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2372"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2375",
                    "reference_id": "RHSA-2021:2375",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2375"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2389",
                    "reference_id": "RHSA-2021:2389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2389"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2390",
                    "reference_id": "RHSA-2021:2390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2390"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2391",
                    "reference_id": "RHSA-2021:2391",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2391"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2392",
                    "reference_id": "RHSA-2021:2392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2393",
                    "reference_id": "RHSA-2021:2393",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2393"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2394",
                    "reference_id": "RHSA-2021:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2394"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2395",
                    "reference_id": "RHSA-2021:2395",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2395"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2396",
                    "reference_id": "RHSA-2021:2396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2396"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4972-1/",
                    "reference_id": "USN-4972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4972-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/292?format=api",
                    "purl": "pkg:generic/postgresql@10.17.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.17.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/291?format=api",
                    "purl": "pkg:generic/postgresql@11.12.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/290?format=api",
                    "purl": "pkg:generic/postgresql@12.7.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/289?format=api",
                    "purl": "pkg:generic/postgresql@13.3.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0"
                }
            ],
            "aliases": [
                "CVE-2021-32028"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8p8h-jdyq-vfek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3569?format=api",
            "vulnerability_id": "VCID-a28t-r5gf-bkhx",
            "summary": "Too-permissive access control list on function pg_logfile_rotate()more details",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1115.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1115.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71823",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71945",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71906",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71911",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71894",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7194",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71832",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71851",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71825",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71863",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71874",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71899",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00694",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71881",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1115"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115"
                },
                {
                    "reference_url": "https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-104-969-9513-9418-and-9323-released-1851/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-104-969-9513-9418-and-9323-released-1851/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2018-1115/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2018-1115/"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104285"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573276",
                    "reference_id": "1573276",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573276"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1115",
                    "reference_id": "CVE-2018-1115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:P"
                        },
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1115"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-08",
                    "reference_id": "GLSA-201810-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2565",
                    "reference_id": "RHSA-2018:2565",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2565"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2566",
                    "reference_id": "RHSA-2018:2566",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2566"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/328?format=api",
                    "purl": "pkg:generic/postgresql@10.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.4.0"
                }
            ],
            "aliases": [
                "CVE-2018-1115"
            ],
            "risk_score": 4.1,
            "exploitability": "0.5",
            "weighted_severity": "8.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a28t-r5gf-bkhx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3526?format=api",
            "vulnerability_id": "VCID-bb5j-e9vw-mbd1",
            "summary": "TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER executionmore details",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10208.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10208.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40573",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40447",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40643",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40625",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40671",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4064",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40563",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40461",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40654",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40682",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40603",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40653",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40662",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4068",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10208"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10208"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/1960/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/1960/"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10208/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2019-10208/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734416",
                    "reference_id": "1734416",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734416"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201908-7",
                    "reference_id": "ASA-201908-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201908-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201908-8",
                    "reference_id": "ASA-201908-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201908-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1019",
                    "reference_id": "AVG-1019",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1019"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10208",
                    "reference_id": "CVE-2019-10208",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10208"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980",
                    "reference_id": "RHSA-2020:0980",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0980"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669",
                    "reference_id": "RHSA-2020:3669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295",
                    "reference_id": "RHSA-2020:4295",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4295"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619",
                    "reference_id": "RHSA-2020:5619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5619"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661",
                    "reference_id": "RHSA-2020:5661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164",
                    "reference_id": "RHSA-2021:0164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167",
                    "reference_id": "RHSA-2021:0167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0167"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1512",
                    "reference_id": "RHSA-2021:1512",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1512"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4090-1/",
                    "reference_id": "USN-4090-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4090-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/201?format=api",
                    "purl": "pkg:generic/postgresql@10.10.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.10.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/200?format=api",
                    "purl": "pkg:generic/postgresql@11.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.5.0"
                }
            ],
            "aliases": [
                "CVE-2019-10208"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bb5j-e9vw-mbd1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3559?format=api",
            "vulnerability_id": "VCID-bdw5-v87c-zyfj",
            "summary": "Multiple features escape \"security restricted operation\" sandboxmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.22672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95843",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.22672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95826",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.22672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95854",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.22672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95845",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.22672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95835",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.23757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96022",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.23757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96005",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.23757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96015",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.23757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9602",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.23757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95999",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.23757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96003",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2020-25695/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2020-25695/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894425",
                    "reference_id": "1894425",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894425"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-14",
                    "reference_id": "ASA-202011-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-14"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1276",
                    "reference_id": "AVG-1276",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1276"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-07",
                    "reference_id": "GLSA-202012-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202012-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5316",
                    "reference_id": "RHSA-2020:5316",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5316"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5317",
                    "reference_id": "RHSA-2020:5317",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5317"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5567",
                    "reference_id": "RHSA-2020:5567",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5567"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619",
                    "reference_id": "RHSA-2020:5619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5619"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620",
                    "reference_id": "RHSA-2020:5620",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5620"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661",
                    "reference_id": "RHSA-2020:5661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0161",
                    "reference_id": "RHSA-2021:0161",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0161"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163",
                    "reference_id": "RHSA-2021:0163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0163"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164",
                    "reference_id": "RHSA-2021:0164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167",
                    "reference_id": "RHSA-2021:0167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0167"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1512",
                    "reference_id": "RHSA-2021:1512",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1512"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4633-1/",
                    "reference_id": "USN-4633-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4633-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/302?format=api",
                    "purl": "pkg:generic/postgresql@10.15.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.15.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/301?format=api",
                    "purl": "pkg:generic/postgresql@11.10.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/300?format=api",
                    "purl": "pkg:generic/postgresql@12.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/299?format=api",
                    "purl": "pkg:generic/postgresql@13.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0"
                }
            ],
            "aliases": [
                "CVE-2020-25695"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bdw5-v87c-zyfj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3571?format=api",
            "vulnerability_id": "VCID-bq8t-8q8q-dkb6",
            "summary": "INSERT ... ON CONFLICT DO UPDATE fails to enforce SELECT privilegesmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15099.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15099.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15099",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.27111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96395",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.27111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96376",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.27111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96394",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.27111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96393",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.27111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96391",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.27111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9638",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.27111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96387",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.30234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96665",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.30234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96647",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.30234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96656",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.30234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96661",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.30234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96673",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.30234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96674",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.30234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96677",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15099"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2017/dsa-4028"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/1801/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/1801/"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/support/security/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2017-15099/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2017-15099/"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/101781"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039752",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1039752"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508823",
                    "reference_id": "1508823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508823"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-17",
                    "reference_id": "ASA-201711-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-17"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-18",
                    "reference_id": "ASA-201711-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-18"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-485",
                    "reference_id": "AVG-485",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-485"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-486",
                    "reference_id": "AVG-486",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-486"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15099",
                    "reference_id": "CVE-2017-15099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2511",
                    "reference_id": "RHSA-2018:2511",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2511"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2566",
                    "reference_id": "RHSA-2018:2566",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2566"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3479-1/",
                    "reference_id": "USN-3479-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3479-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/232?format=api",
                    "purl": "pkg:generic/postgresql@10.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.1.0"
                }
            ],
            "aliases": [
                "CVE-2017-15099"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bq8t-8q8q-dkb6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3562?format=api",
            "vulnerability_id": "VCID-cegf-gbkv-aqab",
            "summary": "Uncontrolled search path element in logical replicationmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14349.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14349.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81342",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81474",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81445",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81466",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81351",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81373",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81371",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81399",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81404",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81425",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81413",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81405",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81442",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81443",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14349"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2020-14349/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2020-14349/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865744",
                    "reference_id": "1865744",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865744"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202008-13",
                    "reference_id": "GLSA-202008-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202008-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669",
                    "reference_id": "RHSA-2020:3669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5110",
                    "reference_id": "RHSA-2020:5110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5112",
                    "reference_id": "RHSA-2020:5112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5112"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620",
                    "reference_id": "RHSA-2020:5620",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5620"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163",
                    "reference_id": "RHSA-2021:0163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0163"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0988",
                    "reference_id": "RHSA-2021:0988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0988"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4472-1/",
                    "reference_id": "USN-4472-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4472-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/307?format=api",
                    "purl": "pkg:generic/postgresql@10.14.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.14.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/306?format=api",
                    "purl": "pkg:generic/postgresql@11.9.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.9.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/305?format=api",
                    "purl": "pkg:generic/postgresql@12.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.4.0"
                }
            ],
            "aliases": [
                "CVE-2020-14349"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cegf-gbkv-aqab"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3533?format=api",
            "vulnerability_id": "VCID-d362-bmcf-3kdz",
            "summary": "Memory disclosure in JSON functionsmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15098.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15098.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00864",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75049",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00864",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75171",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00864",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75125",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00864",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75104",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00864",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75094",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00864",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75132",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00864",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75139",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00864",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75128",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00864",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75167",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00864",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75052",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00864",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75082",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00864",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75058",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00864",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75092",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00864",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75103",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15098"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:P"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4027",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2017/dsa-4027"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2017/dsa-4028"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/1801/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/1801/"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/support/security/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2017-15098/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2017-15098/"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/101781"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039752",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1039752"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508820",
                    "reference_id": "1508820",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508820"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-17",
                    "reference_id": "ASA-201711-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-17"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-18",
                    "reference_id": "ASA-201711-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-18"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-485",
                    "reference_id": "AVG-485",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-485"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-486",
                    "reference_id": "AVG-486",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-486"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15098",
                    "reference_id": "CVE-2017-15098",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:P"
                        },
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2511",
                    "reference_id": "RHSA-2018:2511",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2511"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2566",
                    "reference_id": "RHSA-2018:2566",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2566"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3479-1/",
                    "reference_id": "USN-3479-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3479-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/232?format=api",
                    "purl": "pkg:generic/postgresql@10.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.1.0"
                }
            ],
            "aliases": [
                "CVE-2017-15098"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d362-bmcf-3kdz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3568?format=api",
            "vulnerability_id": "VCID-ne9g-k8fz-dkgb",
            "summary": "Memory disclosure and missing authorization in INSERT ... ON CONFLICT DO UPDATE.more details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10925.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10925.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59509",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59638",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59649",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59618",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59582",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59606",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59576",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59627",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5964",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5966",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59643",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59623",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59657",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59664",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10925"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2018-10925/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2018-10925/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612619",
                    "reference_id": "1612619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612619"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-08",
                    "reference_id": "GLSA-201810-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2511",
                    "reference_id": "RHSA-2018:2511",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2511"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2565",
                    "reference_id": "RHSA-2018:2565",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2565"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2566",
                    "reference_id": "RHSA-2018:2566",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2566"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3816",
                    "reference_id": "RHSA-2018:3816",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3816"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3744-1/",
                    "reference_id": "USN-3744-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3744-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/217?format=api",
                    "purl": "pkg:generic/postgresql@10.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.5.0"
                }
            ],
            "aliases": [
                "CVE-2018-10925"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ne9g-k8fz-dkgb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3520?format=api",
            "vulnerability_id": "VCID-nuek-ypyh-b3dm",
            "summary": "Extension scripts replace objects not belonging to the extensionmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76743",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76706",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76737",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76616",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76645",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76627",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7666",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76671",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76698",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76678",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7667",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76712",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76717",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2625"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2022-2625/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2022-2625/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113825",
                    "reference_id": "2113825",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113825"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202211-04",
                    "reference_id": "GLSA-202211-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202211-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7128",
                    "reference_id": "RHSA-2022:7128",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7128"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0113",
                    "reference_id": "RHSA-2023:0113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0113"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0160",
                    "reference_id": "RHSA-2023:0160",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0160"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1576",
                    "reference_id": "RHSA-2023:1576",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1576"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1693",
                    "reference_id": "RHSA-2023:1693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1693"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7545",
                    "reference_id": "RHSA-2023:7545",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7545"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7580",
                    "reference_id": "RHSA-2023:7580",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7580"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7667",
                    "reference_id": "RHSA-2023:7667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7694",
                    "reference_id": "RHSA-2023:7694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7694"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7695",
                    "reference_id": "RHSA-2023:7695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7695"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5571-1/",
                    "reference_id": "USN-5571-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5571-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/284?format=api",
                    "purl": "pkg:generic/postgresql@10.22.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.22.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/283?format=api",
                    "purl": "pkg:generic/postgresql@11.17.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.17.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/282?format=api",
                    "purl": "pkg:generic/postgresql@12.12.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.12.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/281?format=api",
                    "purl": "pkg:generic/postgresql@13.8.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.8.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/159?format=api",
                    "purl": "pkg:generic/postgresql@14.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.5.0"
                }
            ],
            "aliases": [
                "CVE-2022-2625"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nuek-ypyh-b3dm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3566?format=api",
            "vulnerability_id": "VCID-pg5v-ux6b-3qdn",
            "summary": "Selectivity estimators bypass row security policiesmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10130.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10130.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10130",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41713",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41723",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41779",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41808",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41736",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41786",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41795",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41818",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41785",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41821",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41772",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42273",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42278",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10130"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10130/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2019-10130/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707109",
                    "reference_id": "1707109",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707109"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-03",
                    "reference_id": "GLSA-202003-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980",
                    "reference_id": "RHSA-2020:0980",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0980"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669",
                    "reference_id": "RHSA-2020:3669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295",
                    "reference_id": "RHSA-2020:4295",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4295"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619",
                    "reference_id": "RHSA-2020:5619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5619"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661",
                    "reference_id": "RHSA-2020:5661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164",
                    "reference_id": "RHSA-2021:0164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167",
                    "reference_id": "RHSA-2021:0167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0167"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3972-1/",
                    "reference_id": "USN-3972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3972-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/323?format=api",
                    "purl": "pkg:generic/postgresql@10.8.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.8.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/322?format=api",
                    "purl": "pkg:generic/postgresql@11.3.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.3.0"
                }
            ],
            "aliases": [
                "CVE-2019-10130"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pg5v-ux6b-3qdn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3521?format=api",
            "vulnerability_id": "VCID-q8ka-5dxw-w7fs",
            "summary": "Autovacuum, REINDEX, and others omit \"security restricted operation\" sandboxmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1552.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1552.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84548",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84685",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84647",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84648",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84675",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84563",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84585",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84588",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84609",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84616",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84635",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8463",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84625",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84646",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2022-1552/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2022-1552/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081126",
                    "reference_id": "2081126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081126"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2719",
                    "reference_id": "AVG-2719",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2719"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202211-04",
                    "reference_id": "GLSA-202211-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202211-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4771",
                    "reference_id": "RHSA-2022:4771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4771"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4805",
                    "reference_id": "RHSA-2022:4805",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4805"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4807",
                    "reference_id": "RHSA-2022:4807",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4807"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4854",
                    "reference_id": "RHSA-2022:4854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4854"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4855",
                    "reference_id": "RHSA-2022:4855",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4855"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4856",
                    "reference_id": "RHSA-2022:4856",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4856"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4857",
                    "reference_id": "RHSA-2022:4857",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4857"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4893",
                    "reference_id": "RHSA-2022:4893",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4893"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4894",
                    "reference_id": "RHSA-2022:4894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4895",
                    "reference_id": "RHSA-2022:4895",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4895"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4913",
                    "reference_id": "RHSA-2022:4913",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4913"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4915",
                    "reference_id": "RHSA-2022:4915",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4915"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4929",
                    "reference_id": "RHSA-2022:4929",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4929"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5162",
                    "reference_id": "RHSA-2022:5162",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5162"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5440-1/",
                    "reference_id": "USN-5440-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5440-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5676-1/",
                    "reference_id": "USN-5676-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5676-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/288?format=api",
                    "purl": "pkg:generic/postgresql@10.21.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.21.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/287?format=api",
                    "purl": "pkg:generic/postgresql@11.16.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.16.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/286?format=api",
                    "purl": "pkg:generic/postgresql@12.11.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.11.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/285?format=api",
                    "purl": "pkg:generic/postgresql@13.7.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.7.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/160?format=api",
                    "purl": "pkg:generic/postgresql@14.3.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.3.0"
                }
            ],
            "aliases": [
                "CVE-2022-1552"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q8ka-5dxw-w7fs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3522?format=api",
            "vulnerability_id": "VCID-qbd9-mpc6-5bap",
            "summary": "libpq processes unencrypted bytes from man-in-the-middlemore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23222.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23222.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51515",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51508",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51555",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51576",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51577",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51624",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51602",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51586",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51628",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51574",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51484",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51535",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51562",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51523",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23222"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2021-23222/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2021-23222/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022675",
                    "reference_id": "2022675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022675"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2547",
                    "reference_id": "AVG-2547",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2547"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202211-04",
                    "reference_id": "GLSA-202211-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202211-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5179",
                    "reference_id": "RHSA-2021:5179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5179"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5197",
                    "reference_id": "RHSA-2021:5197",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5197"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1891",
                    "reference_id": "RHSA-2022:1891",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1891"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5145-1/",
                    "reference_id": "USN-5145-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5145-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5765-1/",
                    "reference_id": "USN-5765-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5765-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/297?format=api",
                    "purl": "pkg:generic/postgresql@10.19.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.19.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/296?format=api",
                    "purl": "pkg:generic/postgresql@11.14.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.14.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/295?format=api",
                    "purl": "pkg:generic/postgresql@12.9.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.9.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/294?format=api",
                    "purl": "pkg:generic/postgresql@13.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.5.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/161?format=api",
                    "purl": "pkg:generic/postgresql@14.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.1.0"
                }
            ],
            "aliases": [
                "CVE-2021-23222"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qbd9-mpc6-5bap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3534?format=api",
            "vulnerability_id": "VCID-qnt9-qr7p-wkhy",
            "summary": "Start scripts permit database administrator to modify root-owned filesmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12172.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12172.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12172",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16401",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16359",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16567",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16527",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16469",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1641",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1643",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16467",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1636",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16583",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16646",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16446",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16532",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16586",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12172"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:S/C:C/I:C/A:C"
                        },
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/1801/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/1801/"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/support/security/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2017-12172/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2017-12172/"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101949",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/101949"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039752",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1039752"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498394",
                    "reference_id": "1498394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498394"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-487",
                    "reference_id": "AVG-487",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-487"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-488",
                    "reference_id": "AVG-488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-488"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12172",
                    "reference_id": "CVE-2017-12172",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12172"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3402",
                    "reference_id": "RHSA-2017:3402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3402"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3403",
                    "reference_id": "RHSA-2017:3403",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3403"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3404",
                    "reference_id": "RHSA-2017:3404",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3404"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3405",
                    "reference_id": "RHSA-2017:3405",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3405"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/232?format=api",
                    "purl": "pkg:generic/postgresql@10.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.1.0"
                }
            ],
            "aliases": [
                "CVE-2017-12172"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qnt9-qr7p-wkhy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3530?format=api",
            "vulnerability_id": "VCID-sq2s-cvrs-7uhh",
            "summary": "Certain host connection parameters defeat client-side security defensesmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10915.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10915.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10915",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82502",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82639",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82608",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82629",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82516",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82531",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82527",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82553",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8256",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82579",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82572",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82566",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82603",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10915"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2018-10915/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2018-10915/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609891",
                    "reference_id": "1609891",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609891"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-08",
                    "reference_id": "GLSA-201810-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2511",
                    "reference_id": "RHSA-2018:2511",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2511"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2557",
                    "reference_id": "RHSA-2018:2557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2565",
                    "reference_id": "RHSA-2018:2565",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2565"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2566",
                    "reference_id": "RHSA-2018:2566",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2566"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3816",
                    "reference_id": "RHSA-2018:3816",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3816"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3744-1/",
                    "reference_id": "USN-3744-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3744-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/217?format=api",
                    "purl": "pkg:generic/postgresql@10.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.5.0"
                }
            ],
            "aliases": [
                "CVE-2018-10915"
            ],
            "risk_score": 3.9,
            "exploitability": "0.5",
            "weighted_severity": "7.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sq2s-cvrs-7uhh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3523?format=api",
            "vulnerability_id": "VCID-srbh-8fdq-bkc2",
            "summary": "Server processes unencrypted bytes from man-in-the-middlemore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23214.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23214.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41043",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41037",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41154",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4157",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45197",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.452",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45251",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45245",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45209",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4519",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45213",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45155",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4523",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23214"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2021-23214/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2021-23214/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022666",
                    "reference_id": "2022666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022666"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202204-1",
                    "reference_id": "ASA-202204-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202204-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2546",
                    "reference_id": "AVG-2546",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2546"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202211-04",
                    "reference_id": "GLSA-202211-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202211-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5179",
                    "reference_id": "RHSA-2021:5179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5179"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5197",
                    "reference_id": "RHSA-2021:5197",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5197"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5235",
                    "reference_id": "RHSA-2021:5235",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5235"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5236",
                    "reference_id": "RHSA-2021:5236",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5236"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1830",
                    "reference_id": "RHSA-2022:1830",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1830"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5145-1/",
                    "reference_id": "USN-5145-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5145-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5645-1/",
                    "reference_id": "USN-5645-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5645-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/297?format=api",
                    "purl": "pkg:generic/postgresql@10.19.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.19.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/296?format=api",
                    "purl": "pkg:generic/postgresql@11.14.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.14.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/295?format=api",
                    "purl": "pkg:generic/postgresql@12.9.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.9.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/294?format=api",
                    "purl": "pkg:generic/postgresql@13.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.5.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/161?format=api",
                    "purl": "pkg:generic/postgresql@14.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.1.0"
                }
            ],
            "aliases": [
                "CVE-2021-23214"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-srbh-8fdq-bkc2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3561?format=api",
            "vulnerability_id": "VCID-umaz-62cm-bqfe",
            "summary": "Uncontrolled search path element in CREATE EXTENSIONmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08621",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0868",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08713",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08726",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08648",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08697",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08618",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08695",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0872",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08682",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0857",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08558",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14350"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2020-14350/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2020-14350/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865746",
                    "reference_id": "1865746",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865746"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202008-13",
                    "reference_id": "GLSA-202008-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202008-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669",
                    "reference_id": "RHSA-2020:3669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295",
                    "reference_id": "RHSA-2020:4295",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4295"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5110",
                    "reference_id": "RHSA-2020:5110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5112",
                    "reference_id": "RHSA-2020:5112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5112"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619",
                    "reference_id": "RHSA-2020:5619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5619"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620",
                    "reference_id": "RHSA-2020:5620",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5620"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661",
                    "reference_id": "RHSA-2020:5661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163",
                    "reference_id": "RHSA-2021:0163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0163"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164",
                    "reference_id": "RHSA-2021:0164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167",
                    "reference_id": "RHSA-2021:0167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0167"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0988",
                    "reference_id": "RHSA-2021:0988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0988"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4472-1/",
                    "reference_id": "USN-4472-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4472-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/307?format=api",
                    "purl": "pkg:generic/postgresql@10.14.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.14.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/306?format=api",
                    "purl": "pkg:generic/postgresql@11.9.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.9.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/305?format=api",
                    "purl": "pkg:generic/postgresql@12.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.4.0"
                }
            ],
            "aliases": [
                "CVE-2020-14350"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-umaz-62cm-bqfe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3564?format=api",
            "vulnerability_id": "VCID-wamn-1as1-qbfa",
            "summary": "ALTER ... DEPENDS ON EXTENSION is missing authorization checks.more details",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1720",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57428",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57522",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57539",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57567",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57563",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57543",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57502",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57512",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57509",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57562",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57566",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57581",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57561",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1720"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/2011/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/2011/"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2020-1720/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2020-1720/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798852",
                    "reference_id": "1798852",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798852"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1720",
                    "reference_id": "CVE-2020-1720",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:P/A:N"
                        },
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1720"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-03",
                    "reference_id": "GLSA-202003-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980",
                    "reference_id": "RHSA-2020:0980",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0980"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669",
                    "reference_id": "RHSA-2020:3669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295",
                    "reference_id": "RHSA-2020:4295",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4295"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5112",
                    "reference_id": "RHSA-2020:5112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5112"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619",
                    "reference_id": "RHSA-2020:5619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5619"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620",
                    "reference_id": "RHSA-2020:5620",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5620"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661",
                    "reference_id": "RHSA-2020:5661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163",
                    "reference_id": "RHSA-2021:0163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0163"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164",
                    "reference_id": "RHSA-2021:0164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167",
                    "reference_id": "RHSA-2021:0167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0167"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4282-1/",
                    "reference_id": "USN-4282-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4282-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/318?format=api",
                    "purl": "pkg:generic/postgresql@10.12.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.12.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/317?format=api",
                    "purl": "pkg:generic/postgresql@11.7.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.7.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/316?format=api",
                    "purl": "pkg:generic/postgresql@12.2.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.2.0"
                }
            ],
            "aliases": [
                "CVE-2020-1720"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wamn-1as1-qbfa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3532?format=api",
            "vulnerability_id": "VCID-wcsh-zz5q-qqbf",
            "summary": "pg_upgrade creates file of sensitive metadata under prevailing umaskmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1053.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1053.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22014",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22084",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22172",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2222",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22003",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22139",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24163",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24301",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24176",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24419",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24377",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24321",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24338",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24327",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1053"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2018-1053/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2018-1053/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539619",
                    "reference_id": "1539619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539619"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2511",
                    "reference_id": "RHSA-2018:2511",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2511"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2566",
                    "reference_id": "RHSA-2018:2566",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2566"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3816",
                    "reference_id": "RHSA-2018:3816",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3816"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3564-1/",
                    "reference_id": "USN-3564-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3564-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/227?format=api",
                    "purl": "pkg:generic/postgresql@10.2.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.2.0"
                }
            ],
            "aliases": [
                "CVE-2018-1053"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wcsh-zz5q-qqbf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3558?format=api",
            "vulnerability_id": "VCID-xjv3-x91m-qqhn",
            "summary": "psql's \\gset allows overwriting specially treated variablesmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64626",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6477",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64752",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64739",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64757",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64678",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64706",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64665",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64713",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64727",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64744",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64733",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64705",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64741",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25696"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2020-25696/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2020-25696/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894430",
                    "reference_id": "1894430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894430"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-14",
                    "reference_id": "ASA-202011-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-14"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1276",
                    "reference_id": "AVG-1276",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1276"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-07",
                    "reference_id": "GLSA-202012-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202012-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5316",
                    "reference_id": "RHSA-2020:5316",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5316"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5317",
                    "reference_id": "RHSA-2020:5317",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5317"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5401",
                    "reference_id": "RHSA-2020:5401",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5401"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5567",
                    "reference_id": "RHSA-2020:5567",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5567"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619",
                    "reference_id": "RHSA-2020:5619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5619"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620",
                    "reference_id": "RHSA-2020:5620",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5620"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5638",
                    "reference_id": "RHSA-2020:5638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661",
                    "reference_id": "RHSA-2020:5661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0057",
                    "reference_id": "RHSA-2021:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0161",
                    "reference_id": "RHSA-2021:0161",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0161"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163",
                    "reference_id": "RHSA-2021:0163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0163"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164",
                    "reference_id": "RHSA-2021:0164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0165",
                    "reference_id": "RHSA-2021:0165",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0165"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167",
                    "reference_id": "RHSA-2021:0167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0167"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4633-1/",
                    "reference_id": "USN-4633-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4633-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/302?format=api",
                    "purl": "pkg:generic/postgresql@10.15.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.15.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/301?format=api",
                    "purl": "pkg:generic/postgresql@11.10.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/300?format=api",
                    "purl": "pkg:generic/postgresql@12.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/299?format=api",
                    "purl": "pkg:generic/postgresql@13.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0"
                }
            ],
            "aliases": [
                "CVE-2020-25696"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xjv3-x91m-qqhn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3565?format=api",
            "vulnerability_id": "VCID-ybb6-2xrm-7fbk",
            "summary": "Stack-based buffer overflow via setting a passwordmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10164.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10164.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90528",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90516",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9051",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90571",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90579",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90591",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90597",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90556",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9056",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.13393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94214",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.13393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94211",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10164"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-114-109-9614-9518-9423-and-12-beta-2-released-1949/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-114-109-9614-9518-9423-and-12-beta-2-released-1949/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10164/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2019-10164/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719698",
                    "reference_id": "1719698",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719698"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-03",
                    "reference_id": "GLSA-202003-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980",
                    "reference_id": "RHSA-2020:0980",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0980"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669",
                    "reference_id": "RHSA-2020:3669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4027-1/",
                    "reference_id": "USN-4027-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4027-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/321?format=api",
                    "purl": "pkg:generic/postgresql@10.9.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.9.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/320?format=api",
                    "purl": "pkg:generic/postgresql@11.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.4.0"
                }
            ],
            "aliases": [
                "CVE-2019-10164"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ybb6-2xrm-7fbk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3529?format=api",
            "vulnerability_id": "VCID-zrcc-w98g-gfhk",
            "summary": "pg_ctlcluster script in postgresql-common does not drop privileges when creating socket/statistics temporary directoriesmore details",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31892",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3219",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3221",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32181",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3202",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32326",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32364",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32188",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32237",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32265",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32266",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32228",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32198",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32231",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3466"
                },
                {
                    "reference_url": "https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2019-3466/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2019-3466/"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3466",
                    "reference_id": "CVE-2019-3466",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3466"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4194-1/",
                    "reference_id": "USN-4194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4194-2/",
                    "reference_id": "USN-4194-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4194-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/212?format=api",
                    "purl": "pkg:generic/postgresql@10.11.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.11.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/211?format=api",
                    "purl": "pkg:generic/postgresql@11.6.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.6.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/210?format=api",
                    "purl": "pkg:generic/postgresql@12.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.1.0"
                }
            ],
            "aliases": [
                "CVE-2019-3466"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zrcc-w98g-gfhk"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.0.0"
}