Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/291?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/291?format=api", "purl": "pkg:generic/postgresql@11.12.0", "type": "generic", "namespace": "", "name": "postgresql", "version": "11.12.0", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "11.13.0", "latest_non_vulnerable_version": "18.2.0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3557?format=api", "vulnerability_id": "VCID-4jdp-3xqp-ufap", "summary": "Buffer overrun from integer overflow in array subscripting calculationsmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32027", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65502", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65644", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65619", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65634", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65645", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.6555", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.6558", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65546", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65599", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65611", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.6563", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65616", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65587", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65623", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65635", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2021-32027/", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2021-32027/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956876", "reference_id": "1956876", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956876" }, { "reference_url": "https://security.archlinux.org/ASA-202106-15", "reference_id": "ASA-202106-15", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-15" }, { "reference_url": "https://security.archlinux.org/AVG-1956", "reference_id": "AVG-1956", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1956" }, { "reference_url": "https://security.gentoo.org/glsa/202211-04", "reference_id": "GLSA-202211-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202211-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2360", "reference_id": "RHSA-2021:2360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2361", "reference_id": "RHSA-2021:2361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2372", "reference_id": "RHSA-2021:2372", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2372" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2375", "reference_id": "RHSA-2021:2375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2375" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2389", "reference_id": "RHSA-2021:2389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2390", "reference_id": "RHSA-2021:2390", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2390" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2391", "reference_id": "RHSA-2021:2391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2392", "reference_id": "RHSA-2021:2392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2393", "reference_id": "RHSA-2021:2393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2394", "reference_id": "RHSA-2021:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2395", "reference_id": "RHSA-2021:2395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2396", "reference_id": "RHSA-2021:2396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2397", "reference_id": "RHSA-2021:2397", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2397" }, { "reference_url": "https://usn.ubuntu.com/4972-1/", "reference_id": "USN-4972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4972-1/" }, { "reference_url": "https://usn.ubuntu.com/5645-1/", "reference_id": "USN-5645-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5645-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/293?format=api", "purl": "pkg:generic/postgresql@9.6.22", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.22" }, { "url": "http://public2.vulnerablecode.io/api/packages/292?format=api", "purl": "pkg:generic/postgresql@10.17.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.17.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/291?format=api", "purl": "pkg:generic/postgresql@11.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/290?format=api", "purl": "pkg:generic/postgresql@12.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/289?format=api", "purl": "pkg:generic/postgresql@13.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0" } ], "aliases": [ "CVE-2021-32027" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4jdp-3xqp-ufap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3556?format=api", "vulnerability_id": "VCID-8p8h-jdyq-vfek", "summary": "Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATEmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32028", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64362", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64512", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64479", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.645", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64513", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64445", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64405", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64453", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64469", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64481", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64441", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64475", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64487", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2021-32028/", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2021-32028/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956877", "reference_id": "1956877", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956877" }, { "reference_url": "https://security.archlinux.org/ASA-202106-15", "reference_id": "ASA-202106-15", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-15" }, { "reference_url": "https://security.archlinux.org/AVG-1956", "reference_id": "AVG-1956", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1956" }, { "reference_url": "https://security.gentoo.org/glsa/202211-04", "reference_id": "GLSA-202211-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202211-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2360", "reference_id": "RHSA-2021:2360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2361", "reference_id": "RHSA-2021:2361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2372", "reference_id": "RHSA-2021:2372", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2372" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2375", "reference_id": "RHSA-2021:2375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2375" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2389", "reference_id": "RHSA-2021:2389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2390", "reference_id": "RHSA-2021:2390", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2390" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2391", "reference_id": "RHSA-2021:2391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2392", "reference_id": "RHSA-2021:2392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2393", "reference_id": "RHSA-2021:2393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2394", "reference_id": "RHSA-2021:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2395", "reference_id": "RHSA-2021:2395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2396", "reference_id": "RHSA-2021:2396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2396" }, { "reference_url": "https://usn.ubuntu.com/4972-1/", "reference_id": "USN-4972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/293?format=api", "purl": "pkg:generic/postgresql@9.6.22", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.22" }, { "url": "http://public2.vulnerablecode.io/api/packages/292?format=api", "purl": "pkg:generic/postgresql@10.17.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.17.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/291?format=api", "purl": "pkg:generic/postgresql@11.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/290?format=api", "purl": "pkg:generic/postgresql@12.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/289?format=api", "purl": "pkg:generic/postgresql@13.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0" } ], "aliases": [ "CVE-2021-32028" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8p8h-jdyq-vfek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3593?format=api", "vulnerability_id": "VCID-dv4x-n7v8-vyfh", "summary": "Memory disclosure in partitioned-table UPDATE ... RETURNINGmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32029.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32029.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32029", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37703", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37769", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37831", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37909", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37788", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37838", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37851", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37866", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37804", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38647", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38759", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38735", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2021-32029/", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2021-32029/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956883", "reference_id": "1956883", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956883" }, { "reference_url": "https://security.archlinux.org/ASA-202106-15", "reference_id": "ASA-202106-15", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-15" }, { "reference_url": "https://security.archlinux.org/AVG-1956", "reference_id": "AVG-1956", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2372", "reference_id": "RHSA-2021:2372", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2372" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2375", "reference_id": "RHSA-2021:2375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2375" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2389", "reference_id": "RHSA-2021:2389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2394", "reference_id": "RHSA-2021:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2396", "reference_id": "RHSA-2021:2396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2396" }, { "reference_url": "https://usn.ubuntu.com/4972-1/", "reference_id": "USN-4972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/291?format=api", "purl": "pkg:generic/postgresql@11.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/290?format=api", "purl": "pkg:generic/postgresql@12.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/289?format=api", "purl": "pkg:generic/postgresql@13.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0" } ], "aliases": [ "CVE-2021-32029" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dv4x-n7v8-vyfh" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0" }