Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/199?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/199?format=api", "purl": "pkg:generic/postgresql@10.0.0", "type": "generic", "namespace": "", "name": "postgresql", "version": "10.0.0", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "10.1.0", "latest_non_vulnerable_version": "18.2.0", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3567?format=api", "vulnerability_id": "VCID-1rgq-t3wa-2fck", "summary": "SQL injection in pg_upgrade and pg_dump, via CREATE TRIGGER ... REFERENCING.more details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16850.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16850.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16850", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79805", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79813", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79822", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79851", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79859", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.7988", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79863", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79856", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79884", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79885", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79888", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79916", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79923", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16850" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-111-106-9611-9515-9420-and-9325-released-1905/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-111-106-9611-9515-9420-and-9325-released-1905/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2018-16850/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2018-16850/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645937", "reference_id": "1645937", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645937" }, { "reference_url": "https://security.gentoo.org/glsa/201811-24", "reference_id": "GLSA-201811-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3757", "reference_id": "RHSA-2018:3757", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3757" }, { "reference_url": "https://usn.ubuntu.com/3818-1/", "reference_id": "USN-3818-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3818-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/327?format=api", "purl": "pkg:generic/postgresql@10.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/326?format=api", "purl": "pkg:generic/postgresql@11.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.1.0" } ], "aliases": [ "CVE-2018-16850" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1rgq-t3wa-2fck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3560?format=api", "vulnerability_id": "VCID-36gv-m96w-47db", "summary": "Reconnection can downgrade connection security settingsmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25694", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58007", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58104", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58148", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58149", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58124", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58091", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58113", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58087", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58142", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58145", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.5816", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58137", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58118", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2020-25694/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2020-25694/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894423", "reference_id": "1894423", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894423" }, { "reference_url": "https://security.archlinux.org/ASA-202011-14", "reference_id": "ASA-202011-14", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202011-14" }, { "reference_url": "https://security.archlinux.org/AVG-1276", "reference_id": "AVG-1276", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1276" }, { "reference_url": "https://security.gentoo.org/glsa/202012-07", "reference_id": "GLSA-202012-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202012-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5316", "reference_id": "RHSA-2020:5316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5316" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5317", "reference_id": "RHSA-2020:5317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5401", "reference_id": "RHSA-2020:5401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5401" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5567", "reference_id": "RHSA-2020:5567", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5567" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619", "reference_id": "RHSA-2020:5619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620", "reference_id": "RHSA-2020:5620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5638", "reference_id": "RHSA-2020:5638", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5638" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661", "reference_id": "RHSA-2020:5661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0057", "reference_id": "RHSA-2021:0057", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0057" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0161", "reference_id": "RHSA-2021:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163", "reference_id": "RHSA-2021:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164", "reference_id": "RHSA-2021:0164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0165", "reference_id": "RHSA-2021:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167", "reference_id": "RHSA-2021:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1512", "reference_id": "RHSA-2021:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1512" }, { "reference_url": "https://usn.ubuntu.com/4633-1/", "reference_id": "USN-4633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4633-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/302?format=api", "purl": "pkg:generic/postgresql@10.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.15.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/301?format=api", "purl": "pkg:generic/postgresql@11.10.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/300?format=api", "purl": "pkg:generic/postgresql@12.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/299?format=api", "purl": "pkg:generic/postgresql@13.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0" } ], "aliases": [ "CVE-2020-25694" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-36gv-m96w-47db" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3557?format=api", "vulnerability_id": "VCID-4jdp-3xqp-ufap", "summary": "Buffer overrun from integer overflow in array subscripting calculationsmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32027", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65502", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65645", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65635", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65619", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65634", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.6555", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.6558", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65546", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65599", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65611", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.6563", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65616", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65587", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65623", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2021-32027/", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2021-32027/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956876", "reference_id": "1956876", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956876" }, { "reference_url": "https://security.archlinux.org/ASA-202106-15", "reference_id": "ASA-202106-15", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-15" }, { "reference_url": "https://security.archlinux.org/AVG-1956", "reference_id": "AVG-1956", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1956" }, { "reference_url": "https://security.gentoo.org/glsa/202211-04", "reference_id": "GLSA-202211-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202211-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2360", "reference_id": "RHSA-2021:2360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2361", "reference_id": "RHSA-2021:2361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2372", "reference_id": "RHSA-2021:2372", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2372" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2375", "reference_id": "RHSA-2021:2375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2375" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2389", "reference_id": "RHSA-2021:2389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2390", "reference_id": "RHSA-2021:2390", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2390" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2391", "reference_id": "RHSA-2021:2391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2392", "reference_id": "RHSA-2021:2392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2393", "reference_id": "RHSA-2021:2393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2394", "reference_id": "RHSA-2021:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2395", "reference_id": "RHSA-2021:2395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2396", "reference_id": "RHSA-2021:2396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2397", "reference_id": "RHSA-2021:2397", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2397" }, { "reference_url": "https://usn.ubuntu.com/4972-1/", "reference_id": "USN-4972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4972-1/" }, { "reference_url": "https://usn.ubuntu.com/5645-1/", "reference_id": "USN-5645-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5645-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/292?format=api", "purl": "pkg:generic/postgresql@10.17.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.17.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/291?format=api", "purl": "pkg:generic/postgresql@11.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/290?format=api", "purl": "pkg:generic/postgresql@12.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/289?format=api", "purl": "pkg:generic/postgresql@13.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0" } ], "aliases": [ "CVE-2021-32027" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4jdp-3xqp-ufap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3570?format=api", "vulnerability_id": "VCID-4jnn-un4y-qkbr", "summary": "Memory disclosure in table partitioningmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1052.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1052.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1052", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64587", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.6464", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64669", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64626", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64674", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.6469", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64707", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64695", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64667", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64703", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64714", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64701", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64721", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64734", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1052" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2018-1052/", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2018-1052/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539613", "reference_id": "1539613", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539613" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/227?format=api", "purl": "pkg:generic/postgresql@10.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.2.0" } ], "aliases": [ "CVE-2018-1052" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4jnn-un4y-qkbr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3531?format=api", "vulnerability_id": "VCID-7xfn-1fv3-1bgv", "summary": "Uncontrolled search path element in pg_dump and other client applicationsmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1058.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1058.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1058", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.82687", "scoring_system": "epss", "scoring_elements": "0.99229", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.82687", "scoring_system": "epss", "scoring_elements": "0.99245", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.82687", "scoring_system": "epss", "scoring_elements": "0.99239", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.82687", "scoring_system": "epss", "scoring_elements": "0.9924", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.82687", "scoring_system": "epss", "scoring_elements": "0.99241", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.82687", "scoring_system": "epss", "scoring_elements": "0.99231", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.82687", "scoring_system": "epss", "scoring_elements": "0.99234", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.82687", "scoring_system": "epss", "scoring_elements": "0.99238", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1058" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-103-968-9512-9417-and-9322-released-1834/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-103-968-9512-9417-and-9322-released-1834/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2018-1058/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2018-1058/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547044", "reference_id": "1547044", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547044" }, { "reference_url": "https://security.archlinux.org/ASA-201803-9", "reference_id": "ASA-201803-9", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201803-9" }, { "reference_url": "https://security.archlinux.org/AVG-643", "reference_id": "AVG-643", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2511", "reference_id": "RHSA-2018:2511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2566", "reference_id": "RHSA-2018:2566", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2566" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3816", "reference_id": "RHSA-2018:3816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3816" }, { "reference_url": "https://usn.ubuntu.com/3589-1/", "reference_id": "USN-3589-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3589-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/222?format=api", "purl": "pkg:generic/postgresql@10.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.3.0" } ], "aliases": [ "CVE-2018-1058" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7xfn-1fv3-1bgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3556?format=api", "vulnerability_id": "VCID-8p8h-jdyq-vfek", "summary": "Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATEmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32028", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64362", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64513", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64487", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64479", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.645", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64445", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64405", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64453", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64469", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64481", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64441", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64475", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2021-32028/", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2021-32028/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956877", "reference_id": "1956877", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956877" }, { "reference_url": "https://security.archlinux.org/ASA-202106-15", "reference_id": "ASA-202106-15", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-15" }, { "reference_url": "https://security.archlinux.org/AVG-1956", "reference_id": "AVG-1956", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1956" }, { "reference_url": "https://security.gentoo.org/glsa/202211-04", "reference_id": "GLSA-202211-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202211-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2360", "reference_id": "RHSA-2021:2360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2361", "reference_id": "RHSA-2021:2361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2372", "reference_id": "RHSA-2021:2372", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2372" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2375", "reference_id": "RHSA-2021:2375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2375" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2389", "reference_id": "RHSA-2021:2389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2390", "reference_id": "RHSA-2021:2390", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2390" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2391", "reference_id": "RHSA-2021:2391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2392", "reference_id": "RHSA-2021:2392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2393", "reference_id": "RHSA-2021:2393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2394", "reference_id": "RHSA-2021:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2395", "reference_id": "RHSA-2021:2395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2396", "reference_id": "RHSA-2021:2396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2396" }, { "reference_url": "https://usn.ubuntu.com/4972-1/", "reference_id": "USN-4972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/292?format=api", "purl": "pkg:generic/postgresql@10.17.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.17.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/291?format=api", "purl": "pkg:generic/postgresql@11.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/290?format=api", "purl": "pkg:generic/postgresql@12.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/289?format=api", "purl": "pkg:generic/postgresql@13.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0" } ], "aliases": [ "CVE-2021-32028" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8p8h-jdyq-vfek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3569?format=api", "vulnerability_id": "VCID-a28t-r5gf-bkhx", "summary": "Too-permissive access control list on function pg_logfile_rotate()more details", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1115.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1115.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1115", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71823", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71945", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71906", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71911", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71894", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.7194", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71832", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71851", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71825", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71863", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71874", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71899", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71881", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1115" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115" }, { "reference_url": "https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-104-969-9513-9418-and-9323-released-1851/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-104-969-9513-9418-and-9323-released-1851/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2018-1115/", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2018-1115/" }, { "reference_url": "http://www.securityfocus.com/bid/104285", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104285" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573276", "reference_id": "1573276", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573276" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1115", "reference_id": "CVE-2018-1115", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:P" }, { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" }, { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1115" }, { "reference_url": "https://security.gentoo.org/glsa/201810-08", "reference_id": "GLSA-201810-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2565", "reference_id": "RHSA-2018:2565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2566", "reference_id": "RHSA-2018:2566", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2566" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/328?format=api", "purl": "pkg:generic/postgresql@10.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.4.0" } ], "aliases": [ "CVE-2018-1115" ], "risk_score": 4.1, "exploitability": "0.5", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a28t-r5gf-bkhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3526?format=api", "vulnerability_id": "VCID-bb5j-e9vw-mbd1", "summary": "TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER executionmore details", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10208.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10208.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10208", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40573", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40447", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40643", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40625", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40671", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.4064", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40563", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40461", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40654", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40682", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40603", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40653", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40662", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.4068", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10208" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/1960/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/1960/" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10208/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2019-10208/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734416", "reference_id": "1734416", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734416" }, { "reference_url": "https://security.archlinux.org/ASA-201908-7", "reference_id": "ASA-201908-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201908-7" }, { "reference_url": "https://security.archlinux.org/ASA-201908-8", "reference_id": "ASA-201908-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201908-8" }, { "reference_url": "https://security.archlinux.org/AVG-1019", "reference_id": "AVG-1019", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1019" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10208", "reference_id": "CVE-2019-10208", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980", "reference_id": "RHSA-2020:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669", "reference_id": "RHSA-2020:3669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295", "reference_id": "RHSA-2020:4295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619", "reference_id": "RHSA-2020:5619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661", "reference_id": "RHSA-2020:5661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164", "reference_id": "RHSA-2021:0164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167", "reference_id": "RHSA-2021:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1512", "reference_id": "RHSA-2021:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1512" }, { "reference_url": "https://usn.ubuntu.com/4090-1/", "reference_id": "USN-4090-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4090-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/201?format=api", "purl": "pkg:generic/postgresql@10.10.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.10.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/200?format=api", "purl": "pkg:generic/postgresql@11.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.5.0" } ], "aliases": [ "CVE-2019-10208" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bb5j-e9vw-mbd1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3559?format=api", "vulnerability_id": "VCID-bdw5-v87c-zyfj", "summary": "Multiple features escape \"security restricted operation\" sandboxmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25695", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.22672", "scoring_system": "epss", "scoring_elements": "0.95843", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.22672", "scoring_system": "epss", "scoring_elements": "0.95826", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.22672", "scoring_system": "epss", "scoring_elements": "0.95854", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.22672", "scoring_system": "epss", "scoring_elements": "0.95845", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.22672", "scoring_system": "epss", "scoring_elements": "0.95835", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.23757", "scoring_system": "epss", "scoring_elements": "0.96022", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.23757", "scoring_system": "epss", "scoring_elements": "0.96005", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.23757", "scoring_system": "epss", "scoring_elements": "0.96015", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.23757", "scoring_system": "epss", "scoring_elements": "0.9602", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.23757", "scoring_system": "epss", "scoring_elements": "0.95999", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.23757", "scoring_system": "epss", "scoring_elements": "0.96003", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2020-25695/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2020-25695/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894425", "reference_id": "1894425", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894425" }, { "reference_url": "https://security.archlinux.org/ASA-202011-14", "reference_id": "ASA-202011-14", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202011-14" }, { "reference_url": "https://security.archlinux.org/AVG-1276", "reference_id": "AVG-1276", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1276" }, { "reference_url": "https://security.gentoo.org/glsa/202012-07", "reference_id": "GLSA-202012-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202012-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5316", "reference_id": "RHSA-2020:5316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5316" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5317", "reference_id": "RHSA-2020:5317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5567", "reference_id": "RHSA-2020:5567", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5567" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619", "reference_id": "RHSA-2020:5619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620", "reference_id": "RHSA-2020:5620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661", "reference_id": "RHSA-2020:5661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0161", "reference_id": "RHSA-2021:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163", "reference_id": "RHSA-2021:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164", "reference_id": "RHSA-2021:0164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167", "reference_id": "RHSA-2021:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1512", "reference_id": "RHSA-2021:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1512" }, { "reference_url": "https://usn.ubuntu.com/4633-1/", "reference_id": "USN-4633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4633-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/302?format=api", "purl": "pkg:generic/postgresql@10.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.15.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/301?format=api", "purl": "pkg:generic/postgresql@11.10.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/300?format=api", "purl": "pkg:generic/postgresql@12.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/299?format=api", "purl": "pkg:generic/postgresql@13.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0" } ], "aliases": [ "CVE-2020-25695" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bdw5-v87c-zyfj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3571?format=api", "vulnerability_id": "VCID-bq8t-8q8q-dkb6", "summary": "INSERT ... ON CONFLICT DO UPDATE fails to enforce SELECT privilegesmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15099.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15099.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15099", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.27111", "scoring_system": "epss", "scoring_elements": "0.96395", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.27111", "scoring_system": "epss", "scoring_elements": "0.96376", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.27111", "scoring_system": "epss", "scoring_elements": "0.96394", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.27111", "scoring_system": "epss", "scoring_elements": "0.96393", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.27111", "scoring_system": "epss", "scoring_elements": "0.96391", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.27111", "scoring_system": "epss", "scoring_elements": "0.9638", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.27111", "scoring_system": "epss", "scoring_elements": "0.96387", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.30234", "scoring_system": "epss", "scoring_elements": "0.96665", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.30234", "scoring_system": "epss", "scoring_elements": "0.96647", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.30234", "scoring_system": "epss", "scoring_elements": "0.96656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.30234", "scoring_system": "epss", "scoring_elements": "0.96661", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.30234", "scoring_system": "epss", "scoring_elements": "0.96673", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.30234", "scoring_system": "epss", "scoring_elements": "0.96674", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.30234", "scoring_system": "epss", "scoring_elements": "0.96677", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15099" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.debian.org/security/2017/dsa-4028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-4028" }, { "reference_url": "https://www.postgresql.org/about/news/1801/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/1801/" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/" }, { "reference_url": "https://www.postgresql.org/support/security/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/support/security/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2017-15099/", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2017-15099/" }, { "reference_url": "http://www.securityfocus.com/bid/101781", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101781" }, { "reference_url": "http://www.securitytracker.com/id/1039752", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1039752" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508823", "reference_id": "1508823", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508823" }, { "reference_url": "https://security.archlinux.org/ASA-201711-17", "reference_id": "ASA-201711-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201711-17" }, { "reference_url": "https://security.archlinux.org/ASA-201711-18", "reference_id": "ASA-201711-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201711-18" }, { "reference_url": "https://security.archlinux.org/AVG-485", "reference_id": "AVG-485", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-485" }, { "reference_url": "https://security.archlinux.org/AVG-486", "reference_id": "AVG-486", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-486" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15099", "reference_id": "CVE-2017-15099", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15099" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2511", "reference_id": "RHSA-2018:2511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2566", "reference_id": "RHSA-2018:2566", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2566" }, { "reference_url": "https://usn.ubuntu.com/3479-1/", "reference_id": "USN-3479-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3479-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/232?format=api", "purl": "pkg:generic/postgresql@10.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.1.0" } ], "aliases": [ "CVE-2017-15099" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bq8t-8q8q-dkb6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3562?format=api", "vulnerability_id": "VCID-cegf-gbkv-aqab", "summary": "Uncontrolled search path element in logical replicationmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14349.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14349.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14349", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81342", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81474", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81445", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81466", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81351", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81373", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81371", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81399", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81404", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81425", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81413", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81405", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81442", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81443", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14349" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2020-14349/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2020-14349/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865744", "reference_id": "1865744", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865744" }, { "reference_url": "https://security.gentoo.org/glsa/202008-13", "reference_id": "GLSA-202008-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202008-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669", "reference_id": "RHSA-2020:3669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5110", "reference_id": "RHSA-2020:5110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5112", "reference_id": "RHSA-2020:5112", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5112" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620", "reference_id": "RHSA-2020:5620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163", "reference_id": "RHSA-2021:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0988", "reference_id": "RHSA-2021:0988", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0988" }, { "reference_url": "https://usn.ubuntu.com/4472-1/", "reference_id": "USN-4472-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4472-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/307?format=api", "purl": "pkg:generic/postgresql@10.14.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.14.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/306?format=api", "purl": "pkg:generic/postgresql@11.9.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.9.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/305?format=api", "purl": "pkg:generic/postgresql@12.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.4.0" } ], "aliases": [ "CVE-2020-14349" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cegf-gbkv-aqab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3533?format=api", "vulnerability_id": "VCID-d362-bmcf-3kdz", "summary": "Memory disclosure in JSON functionsmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15098.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15098.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15098", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75049", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75171", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75125", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75104", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75094", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75132", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75139", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75128", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75167", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75052", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75082", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75058", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75092", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75103", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15098" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:P" }, { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.debian.org/security/2017/dsa-4027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-4027" }, { "reference_url": "https://www.debian.org/security/2017/dsa-4028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-4028" }, { "reference_url": "https://www.postgresql.org/about/news/1801/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/1801/" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/" }, { "reference_url": "https://www.postgresql.org/support/security/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/support/security/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2017-15098/", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2017-15098/" }, { "reference_url": "http://www.securityfocus.com/bid/101781", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101781" }, { "reference_url": "http://www.securitytracker.com/id/1039752", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1039752" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508820", "reference_id": "1508820", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508820" }, { "reference_url": "https://security.archlinux.org/ASA-201711-17", "reference_id": "ASA-201711-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201711-17" }, { "reference_url": "https://security.archlinux.org/ASA-201711-18", "reference_id": "ASA-201711-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201711-18" }, { "reference_url": "https://security.archlinux.org/AVG-485", "reference_id": "AVG-485", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-485" }, { "reference_url": "https://security.archlinux.org/AVG-486", "reference_id": "AVG-486", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-486" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15098", "reference_id": "CVE-2017-15098", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15098" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2511", "reference_id": "RHSA-2018:2511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2566", "reference_id": "RHSA-2018:2566", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2566" }, { "reference_url": "https://usn.ubuntu.com/3479-1/", "reference_id": "USN-3479-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3479-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/232?format=api", "purl": "pkg:generic/postgresql@10.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.1.0" } ], "aliases": [ "CVE-2017-15098" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d362-bmcf-3kdz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3568?format=api", "vulnerability_id": "VCID-ne9g-k8fz-dkgb", "summary": "Memory disclosure and missing authorization in INSERT ... ON CONFLICT DO UPDATE.more details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10925.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10925.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10925", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00383", "scoring_system": "epss", "scoring_elements": "0.59509", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00383", "scoring_system": "epss", "scoring_elements": "0.59638", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00383", "scoring_system": "epss", "scoring_elements": "0.59649", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00383", "scoring_system": "epss", "scoring_elements": "0.59618", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00383", "scoring_system": "epss", "scoring_elements": "0.59582", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00383", "scoring_system": "epss", "scoring_elements": "0.59606", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00383", "scoring_system": "epss", "scoring_elements": "0.59576", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00383", "scoring_system": "epss", "scoring_elements": "0.59627", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00383", "scoring_system": "epss", "scoring_elements": "0.5964", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00383", "scoring_system": "epss", "scoring_elements": "0.5966", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00383", "scoring_system": "epss", "scoring_elements": "0.59643", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00383", "scoring_system": "epss", "scoring_elements": "0.59623", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00383", "scoring_system": "epss", "scoring_elements": "0.59657", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00383", "scoring_system": "epss", "scoring_elements": "0.59664", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2018-10925/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2018-10925/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612619", "reference_id": "1612619", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612619" }, { "reference_url": "https://security.gentoo.org/glsa/201810-08", "reference_id": "GLSA-201810-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2511", "reference_id": "RHSA-2018:2511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2565", "reference_id": "RHSA-2018:2565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2566", "reference_id": "RHSA-2018:2566", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2566" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3816", "reference_id": "RHSA-2018:3816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3816" }, { "reference_url": "https://usn.ubuntu.com/3744-1/", "reference_id": "USN-3744-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3744-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/217?format=api", "purl": "pkg:generic/postgresql@10.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.5.0" } ], "aliases": [ "CVE-2018-10925" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ne9g-k8fz-dkgb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3520?format=api", "vulnerability_id": "VCID-nuek-ypyh-b3dm", "summary": "Extension scripts replace objects not belonging to the extensionmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2625", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76743", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76706", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76737", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76616", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76645", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76627", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.7666", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76671", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76698", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76678", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.7667", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76712", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76717", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2022-2625/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2022-2625/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113825", "reference_id": "2113825", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113825" }, { "reference_url": "https://security.gentoo.org/glsa/202211-04", "reference_id": "GLSA-202211-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202211-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7128", "reference_id": "RHSA-2022:7128", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7128" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0113", "reference_id": "RHSA-2023:0113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0160", "reference_id": "RHSA-2023:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0160" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1576", "reference_id": "RHSA-2023:1576", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1576" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1693", "reference_id": "RHSA-2023:1693", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1693" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7545", "reference_id": "RHSA-2023:7545", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7580", "reference_id": "RHSA-2023:7580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7667", "reference_id": "RHSA-2023:7667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7694", "reference_id": "RHSA-2023:7694", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7694" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7695", "reference_id": "RHSA-2023:7695", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7695" }, { "reference_url": "https://usn.ubuntu.com/5571-1/", "reference_id": "USN-5571-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5571-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/284?format=api", "purl": "pkg:generic/postgresql@10.22.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.22.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/283?format=api", "purl": "pkg:generic/postgresql@11.17.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.17.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/282?format=api", "purl": "pkg:generic/postgresql@12.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/281?format=api", "purl": "pkg:generic/postgresql@13.8.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.8.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/159?format=api", "purl": "pkg:generic/postgresql@14.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.5.0" } ], "aliases": [ "CVE-2022-2625" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nuek-ypyh-b3dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3566?format=api", "vulnerability_id": "VCID-pg5v-ux6b-3qdn", "summary": "Selectivity estimators bypass row security policiesmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10130.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10130.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10130", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41713", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41723", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41779", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41808", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41736", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41786", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41795", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41818", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41785", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41821", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41772", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42273", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42278", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10130/", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2019-10130/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707109", "reference_id": "1707109", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707109" }, { "reference_url": "https://security.gentoo.org/glsa/202003-03", "reference_id": "GLSA-202003-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980", "reference_id": "RHSA-2020:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669", "reference_id": "RHSA-2020:3669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295", "reference_id": "RHSA-2020:4295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619", "reference_id": "RHSA-2020:5619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661", "reference_id": "RHSA-2020:5661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164", "reference_id": "RHSA-2021:0164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167", "reference_id": "RHSA-2021:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0167" }, { "reference_url": "https://usn.ubuntu.com/3972-1/", "reference_id": "USN-3972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/323?format=api", "purl": "pkg:generic/postgresql@10.8.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.8.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/322?format=api", "purl": "pkg:generic/postgresql@11.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.3.0" } ], "aliases": [ "CVE-2019-10130" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pg5v-ux6b-3qdn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3521?format=api", "vulnerability_id": "VCID-q8ka-5dxw-w7fs", "summary": "Autovacuum, REINDEX, and others omit \"security restricted operation\" sandboxmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1552.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1552.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1552", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84548", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84685", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84647", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84648", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84675", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84563", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84588", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84609", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84616", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84635", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.8463", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84625", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84646", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2022-1552/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2022-1552/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081126", "reference_id": "2081126", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081126" }, { "reference_url": "https://security.archlinux.org/AVG-2719", "reference_id": "AVG-2719", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2719" }, { "reference_url": "https://security.gentoo.org/glsa/202211-04", "reference_id": "GLSA-202211-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202211-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4771", "reference_id": "RHSA-2022:4771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4805", "reference_id": "RHSA-2022:4805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4807", "reference_id": "RHSA-2022:4807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4854", "reference_id": "RHSA-2022:4854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4855", "reference_id": "RHSA-2022:4855", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4855" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4856", "reference_id": "RHSA-2022:4856", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4856" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4857", "reference_id": "RHSA-2022:4857", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4857" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4893", "reference_id": "RHSA-2022:4893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4894", "reference_id": "RHSA-2022:4894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4895", "reference_id": "RHSA-2022:4895", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4895" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4913", "reference_id": "RHSA-2022:4913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4915", "reference_id": "RHSA-2022:4915", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4915" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4929", "reference_id": "RHSA-2022:4929", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4929" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5162", "reference_id": "RHSA-2022:5162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5162" }, { "reference_url": "https://usn.ubuntu.com/5440-1/", "reference_id": "USN-5440-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5440-1/" }, { "reference_url": "https://usn.ubuntu.com/5676-1/", "reference_id": "USN-5676-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5676-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/288?format=api", "purl": "pkg:generic/postgresql@10.21.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.21.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/287?format=api", "purl": "pkg:generic/postgresql@11.16.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.16.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/286?format=api", "purl": "pkg:generic/postgresql@12.11.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.11.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/285?format=api", "purl": "pkg:generic/postgresql@13.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.7.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/160?format=api", "purl": "pkg:generic/postgresql@14.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.3.0" } ], "aliases": [ "CVE-2022-1552" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q8ka-5dxw-w7fs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3522?format=api", "vulnerability_id": "VCID-qbd9-mpc6-5bap", "summary": "libpq processes unencrypted bytes from man-in-the-middlemore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23222.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23222.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23222", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51515", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51508", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51555", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51576", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51577", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51624", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51602", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51586", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51628", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51574", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51484", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51535", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51562", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51523", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2021-23222/", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2021-23222/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022675", "reference_id": "2022675", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022675" }, { "reference_url": "https://security.archlinux.org/AVG-2547", "reference_id": "AVG-2547", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2547" }, { "reference_url": "https://security.gentoo.org/glsa/202211-04", "reference_id": "GLSA-202211-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202211-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5179", "reference_id": "RHSA-2021:5179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5197", "reference_id": "RHSA-2021:5197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1891", "reference_id": "RHSA-2022:1891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1891" }, { "reference_url": "https://usn.ubuntu.com/5145-1/", "reference_id": "USN-5145-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5145-1/" }, { "reference_url": "https://usn.ubuntu.com/5765-1/", "reference_id": "USN-5765-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5765-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/297?format=api", "purl": "pkg:generic/postgresql@10.19.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.19.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/296?format=api", "purl": "pkg:generic/postgresql@11.14.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.14.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/295?format=api", "purl": "pkg:generic/postgresql@12.9.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.9.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/294?format=api", "purl": "pkg:generic/postgresql@13.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/161?format=api", "purl": "pkg:generic/postgresql@14.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.1.0" } ], "aliases": [ "CVE-2021-23222" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qbd9-mpc6-5bap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3534?format=api", "vulnerability_id": "VCID-qnt9-qr7p-wkhy", "summary": "Start scripts permit database administrator to modify root-owned filesmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12172.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12172.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12172", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16401", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16359", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16567", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16527", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16469", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1641", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1643", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16467", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1636", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16583", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16646", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16446", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16532", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16586", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12172" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:S/C:C/I:C/A:C" }, { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/1801/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/1801/" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/" }, { "reference_url": "https://www.postgresql.org/support/security/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/support/security/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2017-12172/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2017-12172/" }, { "reference_url": "http://www.securityfocus.com/bid/101949", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101949" }, { "reference_url": "http://www.securitytracker.com/id/1039752", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1039752" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498394", "reference_id": "1498394", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498394" }, { "reference_url": "https://security.archlinux.org/AVG-487", "reference_id": "AVG-487", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-487" }, { "reference_url": "https://security.archlinux.org/AVG-488", "reference_id": "AVG-488", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-488" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12172", "reference_id": "CVE-2017-12172", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3402", "reference_id": "RHSA-2017:3402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3403", "reference_id": "RHSA-2017:3403", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3403" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3404", "reference_id": "RHSA-2017:3404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3404" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3405", "reference_id": "RHSA-2017:3405", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3405" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/232?format=api", "purl": "pkg:generic/postgresql@10.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.1.0" } ], "aliases": [ "CVE-2017-12172" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qnt9-qr7p-wkhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3530?format=api", "vulnerability_id": "VCID-sq2s-cvrs-7uhh", "summary": "Certain host connection parameters defeat client-side security defensesmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10915.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10915.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10915", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82502", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82639", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82608", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82629", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82516", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82531", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82527", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82553", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.8256", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82579", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82572", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82566", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01753", "scoring_system": "epss", "scoring_elements": "0.82603", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2018-10915/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2018-10915/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609891", "reference_id": "1609891", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609891" }, { "reference_url": "https://security.gentoo.org/glsa/201810-08", "reference_id": "GLSA-201810-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2511", "reference_id": "RHSA-2018:2511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2557", "reference_id": "RHSA-2018:2557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2565", "reference_id": "RHSA-2018:2565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2566", "reference_id": "RHSA-2018:2566", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2566" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3816", "reference_id": "RHSA-2018:3816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3816" }, { "reference_url": "https://usn.ubuntu.com/3744-1/", "reference_id": "USN-3744-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3744-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/217?format=api", "purl": "pkg:generic/postgresql@10.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.5.0" } ], "aliases": [ "CVE-2018-10915" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sq2s-cvrs-7uhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3523?format=api", "vulnerability_id": "VCID-srbh-8fdq-bkc2", "summary": "Server processes unencrypted bytes from man-in-the-middlemore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23214.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23214.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23214", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41043", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41037", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41154", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.4157", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45197", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.452", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45251", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45245", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45209", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.4519", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45213", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45155", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.4523", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2021-23214/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2021-23214/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022666", "reference_id": "2022666", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022666" }, { "reference_url": "https://security.archlinux.org/ASA-202204-1", "reference_id": "ASA-202204-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202204-1" }, { "reference_url": "https://security.archlinux.org/AVG-2546", "reference_id": "AVG-2546", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2546" }, { "reference_url": "https://security.gentoo.org/glsa/202211-04", "reference_id": "GLSA-202211-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202211-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5179", "reference_id": "RHSA-2021:5179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5197", "reference_id": "RHSA-2021:5197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5235", "reference_id": "RHSA-2021:5235", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5235" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5236", "reference_id": "RHSA-2021:5236", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5236" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1830", "reference_id": "RHSA-2022:1830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1830" }, { "reference_url": "https://usn.ubuntu.com/5145-1/", "reference_id": "USN-5145-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5145-1/" }, { "reference_url": "https://usn.ubuntu.com/5645-1/", "reference_id": "USN-5645-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5645-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/297?format=api", "purl": "pkg:generic/postgresql@10.19.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.19.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/296?format=api", "purl": "pkg:generic/postgresql@11.14.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.14.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/295?format=api", "purl": "pkg:generic/postgresql@12.9.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.9.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/294?format=api", "purl": "pkg:generic/postgresql@13.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/161?format=api", "purl": "pkg:generic/postgresql@14.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.1.0" } ], "aliases": [ "CVE-2021-23214" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-srbh-8fdq-bkc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3561?format=api", "vulnerability_id": "VCID-umaz-62cm-bqfe", "summary": "Uncontrolled search path element in CREATE EXTENSIONmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14350", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08621", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0868", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08713", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08726", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08648", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08697", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08618", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08695", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0872", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08682", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0857", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08558", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14350" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2020-14350/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2020-14350/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865746", "reference_id": "1865746", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865746" }, { "reference_url": "https://security.gentoo.org/glsa/202008-13", "reference_id": "GLSA-202008-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202008-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669", "reference_id": "RHSA-2020:3669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295", "reference_id": "RHSA-2020:4295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5110", "reference_id": "RHSA-2020:5110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5112", "reference_id": "RHSA-2020:5112", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5112" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619", "reference_id": "RHSA-2020:5619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620", "reference_id": "RHSA-2020:5620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661", "reference_id": "RHSA-2020:5661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163", "reference_id": "RHSA-2021:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164", "reference_id": "RHSA-2021:0164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167", "reference_id": "RHSA-2021:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0988", "reference_id": "RHSA-2021:0988", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0988" }, { "reference_url": "https://usn.ubuntu.com/4472-1/", "reference_id": "USN-4472-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4472-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/307?format=api", "purl": "pkg:generic/postgresql@10.14.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.14.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/306?format=api", "purl": "pkg:generic/postgresql@11.9.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.9.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/305?format=api", "purl": "pkg:generic/postgresql@12.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.4.0" } ], "aliases": [ "CVE-2020-14350" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-umaz-62cm-bqfe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3564?format=api", "vulnerability_id": "VCID-wamn-1as1-qbfa", "summary": "ALTER ... DEPENDS ON EXTENSION is missing authorization checks.more details", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1720", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57428", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57522", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57539", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57567", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57563", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57543", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57502", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57512", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57533", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57509", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57562", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57566", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57581", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57561", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1720" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/2011/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/2011/" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2020-1720/", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2020-1720/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798852", "reference_id": "1798852", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798852" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1720", "reference_id": "CVE-2020-1720", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:P/A:N" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1720" }, { "reference_url": "https://security.gentoo.org/glsa/202003-03", "reference_id": "GLSA-202003-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980", "reference_id": "RHSA-2020:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669", "reference_id": "RHSA-2020:3669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295", "reference_id": "RHSA-2020:4295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5112", "reference_id": "RHSA-2020:5112", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5112" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619", "reference_id": "RHSA-2020:5619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620", "reference_id": "RHSA-2020:5620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661", "reference_id": "RHSA-2020:5661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163", "reference_id": "RHSA-2021:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164", "reference_id": "RHSA-2021:0164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167", "reference_id": "RHSA-2021:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0167" }, { "reference_url": "https://usn.ubuntu.com/4282-1/", "reference_id": "USN-4282-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4282-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/318?format=api", "purl": "pkg:generic/postgresql@10.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/317?format=api", "purl": "pkg:generic/postgresql@11.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.7.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/316?format=api", "purl": "pkg:generic/postgresql@12.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.2.0" } ], "aliases": [ "CVE-2020-1720" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wamn-1as1-qbfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3532?format=api", "vulnerability_id": "VCID-wcsh-zz5q-qqbf", "summary": "pg_upgrade creates file of sensitive metadata under prevailing umaskmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1053.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1053.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1053", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22014", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22084", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22172", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.2222", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22003", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22139", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24163", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24301", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24176", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24419", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24377", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24321", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24338", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24327", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1053" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2018-1053/", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "['AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2018-1053/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539619", "reference_id": "1539619", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2511", "reference_id": "RHSA-2018:2511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2566", "reference_id": "RHSA-2018:2566", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2566" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3816", "reference_id": "RHSA-2018:3816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3816" }, { "reference_url": "https://usn.ubuntu.com/3564-1/", "reference_id": "USN-3564-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3564-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/227?format=api", "purl": "pkg:generic/postgresql@10.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.2.0" } ], "aliases": [ "CVE-2018-1053" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wcsh-zz5q-qqbf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3558?format=api", "vulnerability_id": "VCID-xjv3-x91m-qqhn", "summary": "psql's \\gset allows overwriting specially treated variablesmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25696", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64626", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.6477", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64752", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64739", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64757", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64678", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64706", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64665", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64713", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64727", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64744", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64733", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64705", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64741", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2020-25696/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2020-25696/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894430", "reference_id": "1894430", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894430" }, { "reference_url": "https://security.archlinux.org/ASA-202011-14", "reference_id": "ASA-202011-14", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202011-14" }, { "reference_url": "https://security.archlinux.org/AVG-1276", "reference_id": "AVG-1276", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1276" }, { "reference_url": "https://security.gentoo.org/glsa/202012-07", "reference_id": "GLSA-202012-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202012-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5316", "reference_id": "RHSA-2020:5316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5316" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5317", "reference_id": "RHSA-2020:5317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5401", "reference_id": "RHSA-2020:5401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5401" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5567", "reference_id": "RHSA-2020:5567", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5567" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619", "reference_id": "RHSA-2020:5619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620", "reference_id": "RHSA-2020:5620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5638", "reference_id": "RHSA-2020:5638", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5638" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661", "reference_id": "RHSA-2020:5661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0057", "reference_id": "RHSA-2021:0057", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0057" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0161", "reference_id": "RHSA-2021:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163", "reference_id": "RHSA-2021:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164", "reference_id": "RHSA-2021:0164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0165", "reference_id": "RHSA-2021:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167", "reference_id": "RHSA-2021:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0167" }, { "reference_url": "https://usn.ubuntu.com/4633-1/", "reference_id": "USN-4633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4633-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/302?format=api", "purl": "pkg:generic/postgresql@10.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.15.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/301?format=api", "purl": "pkg:generic/postgresql@11.10.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/300?format=api", "purl": "pkg:generic/postgresql@12.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/299?format=api", "purl": "pkg:generic/postgresql@13.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0" } ], "aliases": [ "CVE-2020-25696" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xjv3-x91m-qqhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3565?format=api", "vulnerability_id": "VCID-ybb6-2xrm-7fbk", "summary": "Stack-based buffer overflow via setting a passwordmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10164.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10164.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10164", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05798", "scoring_system": "epss", "scoring_elements": "0.90528", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05798", "scoring_system": "epss", "scoring_elements": "0.90516", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05798", "scoring_system": "epss", "scoring_elements": "0.9051", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.90571", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.90579", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.90591", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.90597", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.90556", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.9056", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13393", "scoring_system": "epss", "scoring_elements": "0.94214", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.13393", "scoring_system": "epss", "scoring_elements": "0.94211", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10164" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-114-109-9614-9518-9423-and-12-beta-2-released-1949/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-114-109-9614-9518-9423-and-12-beta-2-released-1949/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10164/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2019-10164/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719698", "reference_id": "1719698", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719698" }, { "reference_url": "https://security.gentoo.org/glsa/202003-03", "reference_id": "GLSA-202003-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980", "reference_id": "RHSA-2020:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669", "reference_id": "RHSA-2020:3669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://usn.ubuntu.com/4027-1/", "reference_id": "USN-4027-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4027-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/321?format=api", "purl": "pkg:generic/postgresql@10.9.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.9.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/320?format=api", "purl": "pkg:generic/postgresql@11.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.4.0" } ], "aliases": [ "CVE-2019-10164" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ybb6-2xrm-7fbk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3529?format=api", "vulnerability_id": "VCID-zrcc-w98g-gfhk", "summary": "pg_ctlcluster script in postgresql-common does not drop privileges when creating socket/statistics temporary directoriesmore details", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3466", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.31892", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.3219", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.3221", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32181", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.3202", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32326", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32364", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32188", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32237", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32265", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32266", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32198", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32231", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3466" }, { "reference_url": "https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466" }, { "reference_url": "https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2019-3466/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2019-3466/" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3466", "reference_id": "CVE-2019-3466", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3466" }, { "reference_url": "https://usn.ubuntu.com/4194-1/", "reference_id": "USN-4194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4194-1/" }, { "reference_url": "https://usn.ubuntu.com/4194-2/", "reference_id": "USN-4194-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4194-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/212?format=api", "purl": "pkg:generic/postgresql@10.11.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.11.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/211?format=api", "purl": "pkg:generic/postgresql@11.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/210?format=api", "purl": "pkg:generic/postgresql@12.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.1.0" } ], "aliases": [ "CVE-2019-3466" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zrcc-w98g-gfhk" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.0.0" }