Lookup for vulnerable packages by Package URL.

Purlpkg:generic/postgresql@7.3.0
Typegeneric
Namespace
Namepostgresql
Version7.3.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version7.3.8
Latest_non_vulnerable_version18.2.0
Affected_by_vulnerabilities
0
url VCID-5zj2-a3y7-zueh
vulnerability_id VCID-5zj2-a3y7-zueh
summary DBLink functions combined with local trust or ident access control could be used by a malicious user togain superuser privileges. A valid login is required to exploit this vulnerability.more details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6601.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6601
reference_id
reference_type
scores
0
value 0.00869
scoring_system epss
scoring_elements 0.75128
published_at 2026-04-01T12:55:00Z
1
value 0.00869
scoring_system epss
scoring_elements 0.75131
published_at 2026-04-02T12:55:00Z
2
value 0.00869
scoring_system epss
scoring_elements 0.75162
published_at 2026-04-04T12:55:00Z
3
value 0.00869
scoring_system epss
scoring_elements 0.75138
published_at 2026-04-07T12:55:00Z
4
value 0.00869
scoring_system epss
scoring_elements 0.75173
published_at 2026-04-08T12:55:00Z
5
value 0.00869
scoring_system epss
scoring_elements 0.75185
published_at 2026-04-09T12:55:00Z
6
value 0.00869
scoring_system epss
scoring_elements 0.75206
published_at 2026-04-11T12:55:00Z
7
value 0.00869
scoring_system epss
scoring_elements 0.75184
published_at 2026-04-12T12:55:00Z
8
value 0.00869
scoring_system epss
scoring_elements 0.75172
published_at 2026-04-13T12:55:00Z
9
value 0.00869
scoring_system epss
scoring_elements 0.7521
published_at 2026-04-16T12:55:00Z
10
value 0.00869
scoring_system epss
scoring_elements 0.75216
published_at 2026-04-18T12:55:00Z
11
value 0.00869
scoring_system epss
scoring_elements 0.75205
published_at 2026-04-21T12:55:00Z
12
value 0.00869
scoring_system epss
scoring_elements 0.75243
published_at 2026-04-24T12:55:00Z
13
value 0.00869
scoring_system epss
scoring_elements 0.75247
published_at 2026-04-26T12:55:00Z
14
value 0.00869
scoring_system epss
scoring_elements 0.7525
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6601
2
reference_url https://www.postgresql.org/support/security/CVE-2007-6601/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2007-6601/
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=427128
reference_id 427128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=427128
4
reference_url https://security.gentoo.org/glsa/200801-15
reference_id GLSA-200801-15
reference_type
scores
url https://security.gentoo.org/glsa/200801-15
5
reference_url https://access.redhat.com/errata/RHSA-2008:0038
reference_id RHSA-2008:0038
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0038
6
reference_url https://access.redhat.com/errata/RHSA-2008:0039
reference_id RHSA-2008:0039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0039
7
reference_url https://access.redhat.com/errata/RHSA-2008:0040
reference_id RHSA-2008:0040
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0040
8
reference_url https://usn.ubuntu.com/568-1/
reference_id USN-568-1
reference_type
scores
url https://usn.ubuntu.com/568-1/
fixed_packages
0
url pkg:generic/postgresql@7.3.21
purl pkg:generic/postgresql@7.3.21
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.21
1
url pkg:generic/postgresql@7.4.19
purl pkg:generic/postgresql@7.4.19
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.19
2
url pkg:generic/postgresql@8.0.15
purl pkg:generic/postgresql@8.0.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.15
3
url pkg:generic/postgresql@8.1.11
purl pkg:generic/postgresql@8.1.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.11
4
url pkg:generic/postgresql@8.2.6
purl pkg:generic/postgresql@8.2.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.6
aliases CVE-2007-6601
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5zj2-a3y7-zueh
1
url VCID-6ppw-nxh2-2bfs
vulnerability_id VCID-6ppw-nxh2-2bfs
summary A bug in the handling of SET SESSION AUTHORIZATION can cause a backend crash in Assert enabled builds. This will cause the postmaster to restart all backend, resulting in a denial of service. A valid login is required to exploit this vulnerability.more details
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-0678
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25364
published_at 2026-04-01T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25433
published_at 2026-04-02T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25468
published_at 2026-04-04T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25241
published_at 2026-04-07T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.2531
published_at 2026-04-08T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25355
published_at 2026-04-09T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25367
published_at 2026-04-11T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25324
published_at 2026-04-12T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25271
published_at 2026-04-13T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25278
published_at 2026-04-16T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25269
published_at 2026-04-18T12:55:00Z
11
value 0.00089
scoring_system epss
scoring_elements 0.25238
published_at 2026-04-21T12:55:00Z
12
value 0.00089
scoring_system epss
scoring_elements 0.25197
published_at 2026-04-24T12:55:00Z
13
value 0.00089
scoring_system epss
scoring_elements 0.25186
published_at 2026-04-26T12:55:00Z
14
value 0.00089
scoring_system epss
scoring_elements 0.2514
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-0678
1
reference_url https://www.postgresql.org/support/security/CVE-2006-0678/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2006-0678/
2
reference_url https://usn.ubuntu.com/258-1/
reference_id USN-258-1
reference_type
scores
url https://usn.ubuntu.com/258-1/
fixed_packages
0
url pkg:generic/postgresql@7.3.14
purl pkg:generic/postgresql@7.3.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.14
1
url pkg:generic/postgresql@7.4.12
purl pkg:generic/postgresql@7.4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.12
2
url pkg:generic/postgresql@8.0.7
purl pkg:generic/postgresql@8.0.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.7
aliases CVE-2006-0678
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ppw-nxh2-2bfs
2
url VCID-8753-jd2h-8yhw
vulnerability_id VCID-8753-jd2h-8yhw
summary EXECUTE permissions are not properly checked when creating aggregates. A valid login is required to exploit this vulnerability.more details
references
0
reference_url http://archives.postgresql.org/pgsql-hackers/2005-01/msg00922.php
reference_id
reference_type
scores
url http://archives.postgresql.org/pgsql-hackers/2005-01/msg00922.php
1
reference_url http://marc.info/?l=bugtraq&m=110806034116082&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110806034116082&w=2
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0244.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0244.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0244
reference_id
reference_type
scores
0
value 0.00836
scoring_system epss
scoring_elements 0.74722
published_at 2026-04-29T12:55:00Z
1
value 0.00836
scoring_system epss
scoring_elements 0.74596
published_at 2026-04-01T12:55:00Z
2
value 0.00836
scoring_system epss
scoring_elements 0.746
published_at 2026-04-02T12:55:00Z
3
value 0.00836
scoring_system epss
scoring_elements 0.74627
published_at 2026-04-04T12:55:00Z
4
value 0.00836
scoring_system epss
scoring_elements 0.74601
published_at 2026-04-07T12:55:00Z
5
value 0.00836
scoring_system epss
scoring_elements 0.74633
published_at 2026-04-08T12:55:00Z
6
value 0.00836
scoring_system epss
scoring_elements 0.74647
published_at 2026-04-09T12:55:00Z
7
value 0.00836
scoring_system epss
scoring_elements 0.7467
published_at 2026-04-11T12:55:00Z
8
value 0.00836
scoring_system epss
scoring_elements 0.7465
published_at 2026-04-12T12:55:00Z
9
value 0.00836
scoring_system epss
scoring_elements 0.74642
published_at 2026-04-13T12:55:00Z
10
value 0.00836
scoring_system epss
scoring_elements 0.74679
published_at 2026-04-21T12:55:00Z
11
value 0.00836
scoring_system epss
scoring_elements 0.74687
published_at 2026-04-18T12:55:00Z
12
value 0.00836
scoring_system epss
scoring_elements 0.74714
published_at 2026-04-24T12:55:00Z
13
value 0.00836
scoring_system epss
scoring_elements 0.7472
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0244
4
reference_url http://secunia.com/advisories/12948
reference_id
reference_type
scores
url http://secunia.com/advisories/12948
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/19184
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/19184
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10927
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10927
7
reference_url https://www.postgresql.org/support/security/CVE-2005-0244/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2005-0244/
8
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:040
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:040
9
reference_url http://www.novell.com/linux/security/advisories/2005_36_sudo.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_36_sudo.html
10
reference_url http://www.redhat.com/support/errata/RHSA-2005-138.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-138.html
11
reference_url http://www.securityfocus.com/bid/12417
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12417
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617505
reference_id 1617505
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617505
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0244
reference_id CVE-2005-0244
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0244
41
reference_url https://access.redhat.com/errata/RHSA-2005:138
reference_id RHSA-2005:138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:138
42
reference_url https://access.redhat.com/errata/RHSA-2005:141
reference_id RHSA-2005:141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:141
43
reference_url https://usn.ubuntu.com/79-1/
reference_id USN-79-1
reference_type
scores
url https://usn.ubuntu.com/79-1/
fixed_packages
0
url pkg:generic/postgresql@7.3.9
purl pkg:generic/postgresql@7.3.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.9
1
url pkg:generic/postgresql@7.4.7
purl pkg:generic/postgresql@7.4.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.7
2
url pkg:generic/postgresql@8.0.1
purl pkg:generic/postgresql@8.0.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.1
aliases CVE-2005-0244
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8753-jd2h-8yhw
3
url VCID-8z74-udgw-kue3
vulnerability_id VCID-8z74-udgw-kue3
summary The widely-used practice of escaping ASCII single quote "'" by turning it into "\'" is unsafe when operating in multibyte encodings that allow 0x5c (ASCII code for backslash) as the trailing byte of a multibyte character.more details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2314.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2314.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2314
reference_id
reference_type
scores
0
value 0.02162
scoring_system epss
scoring_elements 0.84308
published_at 2026-04-16T12:55:00Z
1
value 0.02162
scoring_system epss
scoring_elements 0.84309
published_at 2026-04-18T12:55:00Z
2
value 0.02162
scoring_system epss
scoring_elements 0.84312
published_at 2026-04-21T12:55:00Z
3
value 0.02162
scoring_system epss
scoring_elements 0.84338
published_at 2026-04-24T12:55:00Z
4
value 0.02162
scoring_system epss
scoring_elements 0.84346
published_at 2026-04-26T12:55:00Z
5
value 0.02162
scoring_system epss
scoring_elements 0.84351
published_at 2026-04-29T12:55:00Z
6
value 0.02168
scoring_system epss
scoring_elements 0.84321
published_at 2026-04-11T12:55:00Z
7
value 0.02168
scoring_system epss
scoring_elements 0.84243
published_at 2026-04-01T12:55:00Z
8
value 0.02168
scoring_system epss
scoring_elements 0.84311
published_at 2026-04-13T12:55:00Z
9
value 0.02168
scoring_system epss
scoring_elements 0.84315
published_at 2026-04-12T12:55:00Z
10
value 0.02168
scoring_system epss
scoring_elements 0.84255
published_at 2026-04-02T12:55:00Z
11
value 0.02168
scoring_system epss
scoring_elements 0.84274
published_at 2026-04-04T12:55:00Z
12
value 0.02168
scoring_system epss
scoring_elements 0.84276
published_at 2026-04-07T12:55:00Z
13
value 0.02168
scoring_system epss
scoring_elements 0.84298
published_at 2026-04-08T12:55:00Z
14
value 0.02168
scoring_system epss
scoring_elements 0.84303
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2314
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2314
3
reference_url https://www.postgresql.org/support/security/CVE-2006-2314/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2006-2314/
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618101
reference_id 1618101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618101
5
reference_url https://security.gentoo.org/glsa/200607-04
reference_id GLSA-200607-04
reference_type
scores
url https://security.gentoo.org/glsa/200607-04
6
reference_url https://access.redhat.com/errata/RHSA-2006:0526
reference_id RHSA-2006:0526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0526
7
reference_url https://usn.ubuntu.com/288-1/
reference_id USN-288-1
reference_type
scores
url https://usn.ubuntu.com/288-1/
8
reference_url https://usn.ubuntu.com/288-2/
reference_id USN-288-2
reference_type
scores
url https://usn.ubuntu.com/288-2/
9
reference_url https://usn.ubuntu.com/288-3/
reference_id USN-288-3
reference_type
scores
url https://usn.ubuntu.com/288-3/
fixed_packages
0
url pkg:generic/postgresql@7.3.15
purl pkg:generic/postgresql@7.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.15
1
url pkg:generic/postgresql@7.4.13
purl pkg:generic/postgresql@7.4.13
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.13
2
url pkg:generic/postgresql@8.0.8
purl pkg:generic/postgresql@8.0.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.8
3
url pkg:generic/postgresql@8.1.4
purl pkg:generic/postgresql@8.1.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.4
aliases CVE-2006-2314
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8z74-udgw-kue3
4
url VCID-dema-khb4-d7c3
vulnerability_id VCID-dema-khb4-d7c3
summary An attacker able to submit crafted strings to an application that will embed those strings in SQL commands can use invalidly-encoded multibyte characters to bypass standard string-escaping methods, resulting in possible SQL injection.more details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2313.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2313.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2313
reference_id
reference_type
scores
0
value 0.01496
scoring_system epss
scoring_elements 0.81146
published_at 2026-04-16T12:55:00Z
1
value 0.01496
scoring_system epss
scoring_elements 0.81147
published_at 2026-04-18T12:55:00Z
2
value 0.01496
scoring_system epss
scoring_elements 0.81144
published_at 2026-04-21T12:55:00Z
3
value 0.01496
scoring_system epss
scoring_elements 0.81167
published_at 2026-04-24T12:55:00Z
4
value 0.01496
scoring_system epss
scoring_elements 0.81175
published_at 2026-04-26T12:55:00Z
5
value 0.01496
scoring_system epss
scoring_elements 0.81181
published_at 2026-04-29T12:55:00Z
6
value 0.02022
scoring_system epss
scoring_elements 0.83775
published_at 2026-04-11T12:55:00Z
7
value 0.02022
scoring_system epss
scoring_elements 0.83698
published_at 2026-04-01T12:55:00Z
8
value 0.02022
scoring_system epss
scoring_elements 0.83765
published_at 2026-04-13T12:55:00Z
9
value 0.02022
scoring_system epss
scoring_elements 0.83769
published_at 2026-04-12T12:55:00Z
10
value 0.02022
scoring_system epss
scoring_elements 0.83712
published_at 2026-04-02T12:55:00Z
11
value 0.02022
scoring_system epss
scoring_elements 0.83726
published_at 2026-04-04T12:55:00Z
12
value 0.02022
scoring_system epss
scoring_elements 0.83729
published_at 2026-04-07T12:55:00Z
13
value 0.02022
scoring_system epss
scoring_elements 0.83753
published_at 2026-04-08T12:55:00Z
14
value 0.02022
scoring_system epss
scoring_elements 0.83759
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2313
2
reference_url https://www.postgresql.org/support/security/CVE-2006-2313/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2006-2313/
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618100
reference_id 1618100
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618100
4
reference_url https://security.gentoo.org/glsa/200607-04
reference_id GLSA-200607-04
reference_type
scores
url https://security.gentoo.org/glsa/200607-04
5
reference_url https://access.redhat.com/errata/RHSA-2006:0526
reference_id RHSA-2006:0526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0526
6
reference_url https://usn.ubuntu.com/288-1/
reference_id USN-288-1
reference_type
scores
url https://usn.ubuntu.com/288-1/
7
reference_url https://usn.ubuntu.com/288-2/
reference_id USN-288-2
reference_type
scores
url https://usn.ubuntu.com/288-2/
fixed_packages
0
url pkg:generic/postgresql@7.3.15
purl pkg:generic/postgresql@7.3.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.15
1
url pkg:generic/postgresql@7.4.13
purl pkg:generic/postgresql@7.4.13
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.13
2
url pkg:generic/postgresql@8.0.8
purl pkg:generic/postgresql@8.0.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.8
3
url pkg:generic/postgresql@8.1.4
purl pkg:generic/postgresql@8.1.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.4
aliases CVE-2006-2313
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dema-khb4-d7c3
5
url VCID-dwxv-7v5k-pbgt
vulnerability_id VCID-dwxv-7v5k-pbgt
summary Contrib script make_oidjoins_check uses unsafe temporary files. This script is not a user-facing script.more details
references
0
reference_url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136300
reference_id
reference_type
scores
url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136300
1
reference_url http://marc.info/?l=bugtraq&m=109910073808903&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=109910073808903&w=2
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0977.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0977.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0977
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25068
published_at 2026-04-29T12:55:00Z
1
value 0.00088
scoring_system epss
scoring_elements 0.25282
published_at 2026-04-01T12:55:00Z
2
value 0.00088
scoring_system epss
scoring_elements 0.25356
published_at 2026-04-02T12:55:00Z
3
value 0.00088
scoring_system epss
scoring_elements 0.25392
published_at 2026-04-04T12:55:00Z
4
value 0.00088
scoring_system epss
scoring_elements 0.25169
published_at 2026-04-07T12:55:00Z
5
value 0.00088
scoring_system epss
scoring_elements 0.25238
published_at 2026-04-08T12:55:00Z
6
value 0.00088
scoring_system epss
scoring_elements 0.25283
published_at 2026-04-09T12:55:00Z
7
value 0.00088
scoring_system epss
scoring_elements 0.25297
published_at 2026-04-11T12:55:00Z
8
value 0.00088
scoring_system epss
scoring_elements 0.25255
published_at 2026-04-12T12:55:00Z
9
value 0.00088
scoring_system epss
scoring_elements 0.25202
published_at 2026-04-18T12:55:00Z
10
value 0.00088
scoring_system epss
scoring_elements 0.25212
published_at 2026-04-16T12:55:00Z
11
value 0.00088
scoring_system epss
scoring_elements 0.25171
published_at 2026-04-21T12:55:00Z
12
value 0.00088
scoring_system epss
scoring_elements 0.25124
published_at 2026-04-24T12:55:00Z
13
value 0.00088
scoring_system epss
scoring_elements 0.25113
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0977
4
reference_url http://security.gentoo.org/glsa/glsa-200410-16.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200410-16.xml
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11360
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11360
7
reference_url https://www.postgresql.org/support/security/CVE-2004-0977/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2004-0977/
8
reference_url https://www.ubuntu.com/usn/usn-6-1/
reference_id
reference_type
scores
url https://www.ubuntu.com/usn/usn-6-1/
9
reference_url http://www.debian.org/security/2004/dsa-577
reference_id
reference_type
scores
url http://www.debian.org/security/2004/dsa-577
10
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2004:149
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2004:149
11
reference_url http://www.redhat.com/support/errata/RHSA-2004-489.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2004-489.html
12
reference_url http://www.securityfocus.com/bid/11295
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/11295
13
reference_url http://www.trustix.org/errata/2004/0050
reference_id
reference_type
scores
url http://www.trustix.org/errata/2004/0050
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617340
reference_id 1617340
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617340
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-0977
reference_id CVE-2004-0977
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2004-0977
31
reference_url https://security.gentoo.org/glsa/200410-16
reference_id GLSA-200410-16
reference_type
scores
url https://security.gentoo.org/glsa/200410-16
32
reference_url https://access.redhat.com/errata/RHSA-2004:489
reference_id RHSA-2004:489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:489
33
reference_url https://usn.ubuntu.com/6-1/
reference_id USN-6-1
reference_type
scores
url https://usn.ubuntu.com/6-1/
fixed_packages
0
url pkg:generic/postgresql@7.3.8
purl pkg:generic/postgresql@7.3.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.8
1
url pkg:generic/postgresql@7.4.6
purl pkg:generic/postgresql@7.4.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.6
aliases CVE-2004-0977
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dwxv-7v5k-pbgt
6
url VCID-f89t-37f7-hbau
vulnerability_id VCID-f89t-37f7-hbau
summary Two vulnerabilities in how ANALYZE executes user defined functions that are part of expression indexes allows users to gain superuser privileges. A valid login that has permissions to create functions and tables is required to exploit this vulnearbility.more details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6600.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6600
reference_id
reference_type
scores
0
value 0.00809
scoring_system epss
scoring_elements 0.74165
published_at 2026-04-01T12:55:00Z
1
value 0.00809
scoring_system epss
scoring_elements 0.7417
published_at 2026-04-02T12:55:00Z
2
value 0.00809
scoring_system epss
scoring_elements 0.74196
published_at 2026-04-04T12:55:00Z
3
value 0.00809
scoring_system epss
scoring_elements 0.74169
published_at 2026-04-07T12:55:00Z
4
value 0.00809
scoring_system epss
scoring_elements 0.74202
published_at 2026-04-08T12:55:00Z
5
value 0.00809
scoring_system epss
scoring_elements 0.74217
published_at 2026-04-09T12:55:00Z
6
value 0.00809
scoring_system epss
scoring_elements 0.74238
published_at 2026-04-11T12:55:00Z
7
value 0.00809
scoring_system epss
scoring_elements 0.7422
published_at 2026-04-12T12:55:00Z
8
value 0.00809
scoring_system epss
scoring_elements 0.74213
published_at 2026-04-13T12:55:00Z
9
value 0.00809
scoring_system epss
scoring_elements 0.74251
published_at 2026-04-21T12:55:00Z
10
value 0.00809
scoring_system epss
scoring_elements 0.7426
published_at 2026-04-18T12:55:00Z
11
value 0.00809
scoring_system epss
scoring_elements 0.74286
published_at 2026-04-24T12:55:00Z
12
value 0.00809
scoring_system epss
scoring_elements 0.74294
published_at 2026-04-26T12:55:00Z
13
value 0.00809
scoring_system epss
scoring_elements 0.74293
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6600
2
reference_url https://www.postgresql.org/support/security/CVE-2007-6600/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2007-6600/
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=427127
reference_id 427127
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=427127
4
reference_url https://security.gentoo.org/glsa/200801-15
reference_id GLSA-200801-15
reference_type
scores
url https://security.gentoo.org/glsa/200801-15
5
reference_url https://access.redhat.com/errata/RHSA-2008:0038
reference_id RHSA-2008:0038
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0038
6
reference_url https://access.redhat.com/errata/RHSA-2008:0039
reference_id RHSA-2008:0039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0039
7
reference_url https://access.redhat.com/errata/RHSA-2008:0040
reference_id RHSA-2008:0040
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0040
8
reference_url https://usn.ubuntu.com/568-1/
reference_id USN-568-1
reference_type
scores
url https://usn.ubuntu.com/568-1/
fixed_packages
0
url pkg:generic/postgresql@7.3.21
purl pkg:generic/postgresql@7.3.21
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.21
1
url pkg:generic/postgresql@7.4.19
purl pkg:generic/postgresql@7.4.19
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.19
2
url pkg:generic/postgresql@8.0.15
purl pkg:generic/postgresql@8.0.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.15
3
url pkg:generic/postgresql@8.1.11
purl pkg:generic/postgresql@8.1.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.11
4
url pkg:generic/postgresql@8.2.6
purl pkg:generic/postgresql@8.2.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.6
aliases CVE-2007-6600
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f89t-37f7-hbau
7
url VCID-g5yd-z8gh-pbc4
vulnerability_id VCID-g5yd-z8gh-pbc4
summary A vulnerability involving insecure search_path settings allows unprivileged users to gain the SQL privileges of the owner of any SECURITY DEFINER function they are allowed to call. Securing such a function requires both a software update and changes to the function definition.more details
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2007-0336.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0336.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2138.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2138.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2138
reference_id
reference_type
scores
0
value 0.01593
scoring_system epss
scoring_elements 0.81739
published_at 2026-04-29T12:55:00Z
1
value 0.01593
scoring_system epss
scoring_elements 0.81595
published_at 2026-04-01T12:55:00Z
2
value 0.01593
scoring_system epss
scoring_elements 0.81606
published_at 2026-04-02T12:55:00Z
3
value 0.01593
scoring_system epss
scoring_elements 0.81627
published_at 2026-04-04T12:55:00Z
4
value 0.01593
scoring_system epss
scoring_elements 0.81624
published_at 2026-04-07T12:55:00Z
5
value 0.01593
scoring_system epss
scoring_elements 0.81652
published_at 2026-04-08T12:55:00Z
6
value 0.01593
scoring_system epss
scoring_elements 0.81657
published_at 2026-04-13T12:55:00Z
7
value 0.01593
scoring_system epss
scoring_elements 0.81677
published_at 2026-04-11T12:55:00Z
8
value 0.01593
scoring_system epss
scoring_elements 0.81664
published_at 2026-04-12T12:55:00Z
9
value 0.01593
scoring_system epss
scoring_elements 0.81696
published_at 2026-04-16T12:55:00Z
10
value 0.01593
scoring_system epss
scoring_elements 0.81695
published_at 2026-04-18T12:55:00Z
11
value 0.01593
scoring_system epss
scoring_elements 0.81699
published_at 2026-04-21T12:55:00Z
12
value 0.01593
scoring_system epss
scoring_elements 0.81724
published_at 2026-04-24T12:55:00Z
13
value 0.01593
scoring_system epss
scoring_elements 0.81733
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2138
3
reference_url http://secunia.com/advisories/24989
reference_id
reference_type
scores
url http://secunia.com/advisories/24989
4
reference_url http://secunia.com/advisories/24999
reference_id
reference_type
scores
url http://secunia.com/advisories/24999
5
reference_url http://secunia.com/advisories/25005
reference_id
reference_type
scores
url http://secunia.com/advisories/25005
6
reference_url http://secunia.com/advisories/25019
reference_id
reference_type
scores
url http://secunia.com/advisories/25019
7
reference_url http://secunia.com/advisories/25037
reference_id
reference_type
scores
url http://secunia.com/advisories/25037
8
reference_url http://secunia.com/advisories/25058
reference_id
reference_type
scores
url http://secunia.com/advisories/25058
9
reference_url http://secunia.com/advisories/25184
reference_id
reference_type
scores
url http://secunia.com/advisories/25184
10
reference_url http://secunia.com/advisories/25238
reference_id
reference_type
scores
url http://secunia.com/advisories/25238
11
reference_url http://secunia.com/advisories/25334
reference_id
reference_type
scores
url http://secunia.com/advisories/25334
12
reference_url http://secunia.com/advisories/25717
reference_id
reference_type
scores
url http://secunia.com/advisories/25717
13
reference_url http://secunia.com/advisories/25720
reference_id
reference_type
scores
url http://secunia.com/advisories/25720
14
reference_url http://secunia.com/advisories/25725
reference_id
reference_type
scores
url http://secunia.com/advisories/25725
15
reference_url http://security.gentoo.org/glsa/glsa-200705-12.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-12.xml
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33842
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33842
17
reference_url https://issues.rpath.com/browse/RPL-1292
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1292
18
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10090
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10090
19
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102894-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102894-1
20
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-190.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-190.htm
21
reference_url https://www.postgresql.org/support/security/CVE-2007-2138/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2007-2138/
22
reference_url http://www.debian.org/security/2007/dsa-1309
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1309
23
reference_url http://www.debian.org/security/2007/dsa-1311
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1311
24
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:094
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:094
25
reference_url http://www.postgresql.org/about/news.791
reference_id
reference_type
scores
url http://www.postgresql.org/about/news.791
26
reference_url http://www.postgresql.org/support/security.html
reference_id
reference_type
scores
url http://www.postgresql.org/support/security.html
27
reference_url http://www.redhat.com/support/errata/RHSA-2007-0337.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0337.html
28
reference_url http://www.securityfocus.com/bid/23618
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23618
29
reference_url http://www.securitytracker.com/id?1017974
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017974
30
reference_url http://www.trustix.org/errata/2007/0015/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0015/
31
reference_url http://www.ubuntu.com/usn/usn-454-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-454-1
32
reference_url http://www.vupen.com/english/advisories/2007/1497
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1497
33
reference_url http://www.vupen.com/english/advisories/2007/1549
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1549
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=237682
reference_id 237682
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=237682
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2138
reference_id CVE-2007-2138
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-2138
42
reference_url https://security.gentoo.org/glsa/200705-12
reference_id GLSA-200705-12
reference_type
scores
url https://security.gentoo.org/glsa/200705-12
43
reference_url https://access.redhat.com/errata/RHSA-2007:0336
reference_id RHSA-2007:0336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0336
44
reference_url https://access.redhat.com/errata/RHSA-2007:0337
reference_id RHSA-2007:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0337
45
reference_url https://usn.ubuntu.com/454-1/
reference_id USN-454-1
reference_type
scores
url https://usn.ubuntu.com/454-1/
fixed_packages
0
url pkg:generic/postgresql@7.3.19
purl pkg:generic/postgresql@7.3.19
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.19
1
url pkg:generic/postgresql@7.4.17
purl pkg:generic/postgresql@7.4.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.17
2
url pkg:generic/postgresql@8.0.13
purl pkg:generic/postgresql@8.0.13
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.13
3
url pkg:generic/postgresql@8.1.9
purl pkg:generic/postgresql@8.1.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.9
4
url pkg:generic/postgresql@8.2.4
purl pkg:generic/postgresql@8.2.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.4
aliases CVE-2007-2138
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g5yd-z8gh-pbc4
8
url VCID-hase-39jj-6khk
vulnerability_id VCID-hase-39jj-6khk
summary The intagg contrib module allows attackers to cause a denial of service. A valid login is required to exploit this vulnerability.more details
references
0
reference_url http://archives.postgresql.org/pgsql-committers/2005-01/msg00401.php
reference_id
reference_type
scores
url http://archives.postgresql.org/pgsql-committers/2005-01/msg00401.php
1
reference_url http://marc.info/?l=bugtraq&m=110806034116082&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110806034116082&w=2
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0246.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0246.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0246
reference_id
reference_type
scores
0
value 0.01907
scoring_system epss
scoring_elements 0.83348
published_at 2026-04-29T12:55:00Z
1
value 0.01907
scoring_system epss
scoring_elements 0.83204
published_at 2026-04-01T12:55:00Z
2
value 0.01907
scoring_system epss
scoring_elements 0.83221
published_at 2026-04-02T12:55:00Z
3
value 0.01907
scoring_system epss
scoring_elements 0.83235
published_at 2026-04-04T12:55:00Z
4
value 0.01907
scoring_system epss
scoring_elements 0.83234
published_at 2026-04-07T12:55:00Z
5
value 0.01907
scoring_system epss
scoring_elements 0.83258
published_at 2026-04-08T12:55:00Z
6
value 0.01907
scoring_system epss
scoring_elements 0.83268
published_at 2026-04-09T12:55:00Z
7
value 0.01907
scoring_system epss
scoring_elements 0.83283
published_at 2026-04-11T12:55:00Z
8
value 0.01907
scoring_system epss
scoring_elements 0.83277
published_at 2026-04-12T12:55:00Z
9
value 0.01907
scoring_system epss
scoring_elements 0.83273
published_at 2026-04-13T12:55:00Z
10
value 0.01907
scoring_system epss
scoring_elements 0.83309
published_at 2026-04-16T12:55:00Z
11
value 0.01907
scoring_system epss
scoring_elements 0.8331
published_at 2026-04-18T12:55:00Z
12
value 0.01907
scoring_system epss
scoring_elements 0.83312
published_at 2026-04-21T12:55:00Z
13
value 0.01907
scoring_system epss
scoring_elements 0.83335
published_at 2026-04-24T12:55:00Z
14
value 0.01907
scoring_system epss
scoring_elements 0.83342
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0246
4
reference_url http://secunia.com/advisories/12948
reference_id
reference_type
scores
url http://secunia.com/advisories/12948
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/19185
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/19185
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10148
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10148
7
reference_url https://www.postgresql.org/support/security/CVE-2005-0246/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2005-0246/
8
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:040
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:040
9
reference_url http://www.novell.com/linux/security/advisories/2005_36_sudo.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_36_sudo.html
10
reference_url http://www.redhat.com/support/errata/RHSA-2005-138.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-138.html
11
reference_url http://www.securityfocus.com/bid/12417
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12417
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617507
reference_id 1617507
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617507
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0246
reference_id CVE-2005-0246
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0246
15
reference_url https://access.redhat.com/errata/RHSA-2005:138
reference_id RHSA-2005:138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:138
16
reference_url https://access.redhat.com/errata/RHSA-2005:141
reference_id RHSA-2005:141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:141
17
reference_url https://usn.ubuntu.com/79-1/
reference_id USN-79-1
reference_type
scores
url https://usn.ubuntu.com/79-1/
fixed_packages
0
url pkg:generic/postgresql@7.3.9
purl pkg:generic/postgresql@7.3.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.9
1
url pkg:generic/postgresql@7.4.7
purl pkg:generic/postgresql@7.4.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.7
2
url pkg:generic/postgresql@8.0.1
purl pkg:generic/postgresql@8.0.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.1
aliases CVE-2005-0246
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hase-39jj-6khk
9
url VCID-nj9p-fdc9-m7fu
vulnerability_id VCID-nj9p-fdc9-m7fu
summary A vulnerability allows suppressing the normal checks that a SQL function returns the data type it's declared to do. These errors can easily be exploited to cause a backend crash, and in principle might be used to read database content that the user should not be able to access.more details
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
1
reference_url http://fedoranews.org/cms/node/2554
reference_id
reference_type
scores
url http://fedoranews.org/cms/node/2554
2
reference_url http://lists.rpath.com/pipermail/security-announce/2007-February/000141.html
reference_id
reference_type
scores
url http://lists.rpath.com/pipermail/security-announce/2007-February/000141.html
3
reference_url http://osvdb.org/33087
reference_id
reference_type
scores
url http://osvdb.org/33087
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0555.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0555.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0555
reference_id
reference_type
scores
0
value 0.01905
scoring_system epss
scoring_elements 0.83327
published_at 2026-04-29T12:55:00Z
1
value 0.01905
scoring_system epss
scoring_elements 0.83185
published_at 2026-04-01T12:55:00Z
2
value 0.01905
scoring_system epss
scoring_elements 0.83201
published_at 2026-04-02T12:55:00Z
3
value 0.01905
scoring_system epss
scoring_elements 0.83215
published_at 2026-04-04T12:55:00Z
4
value 0.01905
scoring_system epss
scoring_elements 0.83214
published_at 2026-04-07T12:55:00Z
5
value 0.01905
scoring_system epss
scoring_elements 0.83238
published_at 2026-04-08T12:55:00Z
6
value 0.01905
scoring_system epss
scoring_elements 0.83245
published_at 2026-04-09T12:55:00Z
7
value 0.01905
scoring_system epss
scoring_elements 0.83261
published_at 2026-04-11T12:55:00Z
8
value 0.01905
scoring_system epss
scoring_elements 0.83255
published_at 2026-04-12T12:55:00Z
9
value 0.01905
scoring_system epss
scoring_elements 0.83251
published_at 2026-04-13T12:55:00Z
10
value 0.01905
scoring_system epss
scoring_elements 0.83287
published_at 2026-04-16T12:55:00Z
11
value 0.01905
scoring_system epss
scoring_elements 0.83288
published_at 2026-04-18T12:55:00Z
12
value 0.01905
scoring_system epss
scoring_elements 0.8329
published_at 2026-04-21T12:55:00Z
13
value 0.01905
scoring_system epss
scoring_elements 0.83313
published_at 2026-04-24T12:55:00Z
14
value 0.01905
scoring_system epss
scoring_elements 0.8332
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0555
6
reference_url http://secunia.com/advisories/24028
reference_id
reference_type
scores
url http://secunia.com/advisories/24028
7
reference_url http://secunia.com/advisories/24033
reference_id
reference_type
scores
url http://secunia.com/advisories/24033
8
reference_url http://secunia.com/advisories/24042
reference_id
reference_type
scores
url http://secunia.com/advisories/24042
9
reference_url http://secunia.com/advisories/24050
reference_id
reference_type
scores
url http://secunia.com/advisories/24050
10
reference_url http://secunia.com/advisories/24057
reference_id
reference_type
scores
url http://secunia.com/advisories/24057
11
reference_url http://secunia.com/advisories/24094
reference_id
reference_type
scores
url http://secunia.com/advisories/24094
12
reference_url http://secunia.com/advisories/24151
reference_id
reference_type
scores
url http://secunia.com/advisories/24151
13
reference_url http://secunia.com/advisories/24158
reference_id
reference_type
scores
url http://secunia.com/advisories/24158
14
reference_url http://secunia.com/advisories/24284
reference_id
reference_type
scores
url http://secunia.com/advisories/24284
15
reference_url http://secunia.com/advisories/24315
reference_id
reference_type
scores
url http://secunia.com/advisories/24315
16
reference_url http://secunia.com/advisories/24513
reference_id
reference_type
scores
url http://secunia.com/advisories/24513
17
reference_url http://secunia.com/advisories/24577
reference_id
reference_type
scores
url http://secunia.com/advisories/24577
18
reference_url http://secunia.com/advisories/25220
reference_id
reference_type
scores
url http://secunia.com/advisories/25220
19
reference_url http://security.gentoo.org/glsa/glsa-200703-15.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200703-15.xml
20
reference_url http://securitytracker.com/id?1017597
reference_id
reference_type
scores
url http://securitytracker.com/id?1017597
21
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/32195
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/32195
22
reference_url https://issues.rpath.com/browse/RPL-1025
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1025
23
reference_url https://issues.rpath.com/browse/RPL-830
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-830
24
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9739
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9739
25
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102825-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102825-1
26
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm
27
reference_url https://www.postgresql.org/support/security/CVE-2007-0555/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2007-0555/
28
reference_url http://www.debian.org/security/2007/dsa-1261
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1261
29
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:037
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:037
30
reference_url http://www.novell.com/linux/security/advisories/2007_10_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_10_sr.html
31
reference_url http://www.postgresql.org/support/security
reference_id
reference_type
scores
url http://www.postgresql.org/support/security
32
reference_url http://www.redhat.com/support/errata/RHSA-2007-0064.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0064.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2007-0067.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0067.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2007-0068.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0068.html
35
reference_url http://www.securityfocus.com/archive/1/459280/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/459280/100/0/threaded
36
reference_url http://www.securityfocus.com/archive/1/459448/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/459448/100/0/threaded
37
reference_url http://www.securityfocus.com/bid/22387
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22387
38
reference_url http://www.trustix.org/errata/2007/0007
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0007
39
reference_url http://www.ubuntu.com/usn/usn-417-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-417-2
40
reference_url http://www.vupen.com/english/advisories/2007/0478
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0478
41
reference_url http://www.vupen.com/english/advisories/2007/0774
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0774
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618367
reference_id 1618367
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618367
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0555
reference_id CVE-2007-0555
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-0555
45
reference_url https://security.gentoo.org/glsa/200703-15
reference_id GLSA-200703-15
reference_type
scores
url https://security.gentoo.org/glsa/200703-15
46
reference_url https://access.redhat.com/errata/RHSA-2007:0064
reference_id RHSA-2007:0064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0064
47
reference_url https://access.redhat.com/errata/RHSA-2007:0067
reference_id RHSA-2007:0067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0067
48
reference_url https://access.redhat.com/errata/RHSA-2007:0068
reference_id RHSA-2007:0068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0068
49
reference_url https://usn.ubuntu.com/417-1/
reference_id USN-417-1
reference_type
scores
url https://usn.ubuntu.com/417-1/
fixed_packages
0
url pkg:generic/postgresql@7.3.13
purl pkg:generic/postgresql@7.3.13
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.13
1
url pkg:generic/postgresql@7.4.16
purl pkg:generic/postgresql@7.4.16
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.16
2
url pkg:generic/postgresql@8.0.11
purl pkg:generic/postgresql@8.0.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.11
3
url pkg:generic/postgresql@8.1.7
purl pkg:generic/postgresql@8.1.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.7
4
url pkg:generic/postgresql@8.2.2
purl pkg:generic/postgresql@8.2.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.2
aliases CVE-2007-0555
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nj9p-fdc9-m7fu
10
url VCID-qw91-9hzj-2bbd
vulnerability_id VCID-qw91-9hzj-2bbd
summary Public EXECUTE access is given to certain character conversion functions that are not designed to be safe against malicious arguments. This can cause at least a denial of service. A valid login is required to exploit this vulnerability.Note! See the announcement for special upgrade instructions.more details
references
0
reference_url http://archives.postgresql.org/pgsql-announce/2005-05/msg00001.php
reference_id
reference_type
scores
url http://archives.postgresql.org/pgsql-announce/2005-05/msg00001.php
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1409.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1409.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1409
reference_id
reference_type
scores
0
value 0.0148
scoring_system epss
scoring_elements 0.81063
published_at 2026-04-29T12:55:00Z
1
value 0.0148
scoring_system epss
scoring_elements 0.80929
published_at 2026-04-01T12:55:00Z
2
value 0.0148
scoring_system epss
scoring_elements 0.80938
published_at 2026-04-02T12:55:00Z
3
value 0.0148
scoring_system epss
scoring_elements 0.8096
published_at 2026-04-04T12:55:00Z
4
value 0.0148
scoring_system epss
scoring_elements 0.80958
published_at 2026-04-07T12:55:00Z
5
value 0.0148
scoring_system epss
scoring_elements 0.80986
published_at 2026-04-08T12:55:00Z
6
value 0.0148
scoring_system epss
scoring_elements 0.80993
published_at 2026-04-09T12:55:00Z
7
value 0.0148
scoring_system epss
scoring_elements 0.81009
published_at 2026-04-11T12:55:00Z
8
value 0.0148
scoring_system epss
scoring_elements 0.80995
published_at 2026-04-12T12:55:00Z
9
value 0.0148
scoring_system epss
scoring_elements 0.80988
published_at 2026-04-13T12:55:00Z
10
value 0.0148
scoring_system epss
scoring_elements 0.81025
published_at 2026-04-21T12:55:00Z
11
value 0.0148
scoring_system epss
scoring_elements 0.81026
published_at 2026-04-18T12:55:00Z
12
value 0.0148
scoring_system epss
scoring_elements 0.81047
published_at 2026-04-24T12:55:00Z
13
value 0.0148
scoring_system epss
scoring_elements 0.81056
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1409
3
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10050
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10050
4
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A676
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A676
5
reference_url https://www.postgresql.org/support/security/CVE-2005-1409/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2005-1409/
6
reference_url http://www.novell.com/linux/security/advisories/2005_36_sudo.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_36_sudo.html
7
reference_url http://www.postgresql.org/about/news.315
reference_id
reference_type
scores
url http://www.postgresql.org/about/news.315
8
reference_url http://www.redhat.com/support/errata/RHSA-2005-433.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-433.html
9
reference_url http://www.securityfocus.com/archive/1/426302/30/6680/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/426302/30/6680/threaded
10
reference_url http://www.securityfocus.com/bid/13476
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/13476
11
reference_url http://www.vupen.com/english/advisories/2005/0453
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/0453
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617632
reference_id 1617632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617632
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1409
reference_id CVE-2005-1409
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-1409
42
reference_url https://access.redhat.com/errata/RHSA-2005:433
reference_id RHSA-2005:433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:433
43
reference_url https://usn.ubuntu.com/118-1/
reference_id USN-118-1
reference_type
scores
url https://usn.ubuntu.com/118-1/
fixed_packages
0
url pkg:generic/postgresql@7.3.10
purl pkg:generic/postgresql@7.3.10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.10
1
url pkg:generic/postgresql@7.4.8
purl pkg:generic/postgresql@7.4.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.8
2
url pkg:generic/postgresql@8.0.3
purl pkg:generic/postgresql@8.0.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.3
aliases CVE-2005-1409
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qw91-9hzj-2bbd
11
url VCID-s1hd-1asy-q3dd
vulnerability_id VCID-s1hd-1asy-q3dd
summary Multiple buffer overflows in the PL/PGSQL parser may allow attackers to execute arbitrary code. A valid login is required to exploit this vulnerability.more details
references
0
reference_url http://archives.postgresql.org/pgsql-committers/2005-01/msg00298.php
reference_id
reference_type
scores
url http://archives.postgresql.org/pgsql-committers/2005-01/msg00298.php
1
reference_url http://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php
reference_id
reference_type
scores
url http://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php
2
reference_url http://archives.postgresql.org/pgsql-patches/2005-01/msg00216.php
reference_id
reference_type
scores
url http://archives.postgresql.org/pgsql-patches/2005-01/msg00216.php
3
reference_url http://marc.info/?l=bugtraq&m=110806034116082&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110806034116082&w=2
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0245.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0245.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0245
reference_id
reference_type
scores
0
value 0.23114
scoring_system epss
scoring_elements 0.95945
published_at 2026-04-29T12:55:00Z
1
value 0.23114
scoring_system epss
scoring_elements 0.95889
published_at 2026-04-01T12:55:00Z
2
value 0.23114
scoring_system epss
scoring_elements 0.95897
published_at 2026-04-02T12:55:00Z
3
value 0.23114
scoring_system epss
scoring_elements 0.95906
published_at 2026-04-04T12:55:00Z
4
value 0.23114
scoring_system epss
scoring_elements 0.9591
published_at 2026-04-07T12:55:00Z
5
value 0.23114
scoring_system epss
scoring_elements 0.95918
published_at 2026-04-08T12:55:00Z
6
value 0.23114
scoring_system epss
scoring_elements 0.95921
published_at 2026-04-09T12:55:00Z
7
value 0.23114
scoring_system epss
scoring_elements 0.95925
published_at 2026-04-12T12:55:00Z
8
value 0.23114
scoring_system epss
scoring_elements 0.95926
published_at 2026-04-13T12:55:00Z
9
value 0.23114
scoring_system epss
scoring_elements 0.95938
published_at 2026-04-16T12:55:00Z
10
value 0.23114
scoring_system epss
scoring_elements 0.95943
published_at 2026-04-18T12:55:00Z
11
value 0.23114
scoring_system epss
scoring_elements 0.95944
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0245
6
reference_url http://secunia.com/advisories/12948
reference_id
reference_type
scores
url http://secunia.com/advisories/12948
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/19188
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/19188
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10175
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10175
9
reference_url https://www.postgresql.org/support/security/CVE-2005-0245/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2005-0245/
10
reference_url http://www.debian.org/security/2005/dsa-683
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-683
11
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:040
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:040
12
reference_url http://www.novell.com/linux/security/advisories/2005_36_sudo.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_36_sudo.html
13
reference_url http://www.redhat.com/support/errata/RHSA-2005-138.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-138.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2005-150.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-150.html
15
reference_url http://www.securityfocus.com/bid/12417
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12417
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617506
reference_id 1617506
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617506
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0245
reference_id CVE-2005-0245
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0245
20
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/25076.c
reference_id CVE-2005-0245;OSVDB-13774
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/25076.c
21
reference_url https://www.securityfocus.com/bid/12417/info
reference_id CVE-2005-0245;OSVDB-13774
reference_type exploit
scores
url https://www.securityfocus.com/bid/12417/info
22
reference_url https://access.redhat.com/errata/RHSA-2005:138
reference_id RHSA-2005:138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:138
23
reference_url https://access.redhat.com/errata/RHSA-2005:141
reference_id RHSA-2005:141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:141
24
reference_url https://access.redhat.com/errata/RHSA-2005:150
reference_id RHSA-2005:150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:150
25
reference_url https://usn.ubuntu.com/79-1/
reference_id USN-79-1
reference_type
scores
url https://usn.ubuntu.com/79-1/
fixed_packages
0
url pkg:generic/postgresql@7.3.10
purl pkg:generic/postgresql@7.3.10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.10
1
url pkg:generic/postgresql@7.4.7
purl pkg:generic/postgresql@7.4.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.7
2
url pkg:generic/postgresql@8.0.1
purl pkg:generic/postgresql@8.0.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.1
aliases CVE-2005-0245
risk_score 10.0
exploitability 2.0
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s1hd-1asy-q3dd
12
url VCID-swbt-7zch-sbcp
vulnerability_id VCID-swbt-7zch-sbcp
summary Any database user is permitted to load arbitrary shared libraries using the LOAD command. A valid login is required to exploit this vulnerability.more details
references
0
reference_url http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php
reference_id
reference_type
scores
url http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php
1
reference_url http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php
reference_id
reference_type
scores
url http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php
2
reference_url http://marc.info/?l=bugtraq&m=110726899107148&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110726899107148&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0227.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0227.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0227
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.29929
published_at 2026-04-29T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30335
published_at 2026-04-01T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30365
published_at 2026-04-02T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30413
published_at 2026-04-04T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30228
published_at 2026-04-07T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30288
published_at 2026-04-08T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30322
published_at 2026-04-09T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30326
published_at 2026-04-11T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30281
published_at 2026-04-12T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30235
published_at 2026-04-13T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.3025
published_at 2026-04-16T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30232
published_at 2026-04-18T12:55:00Z
12
value 0.00116
scoring_system epss
scoring_elements 0.30186
published_at 2026-04-21T12:55:00Z
13
value 0.00116
scoring_system epss
scoring_elements 0.30122
published_at 2026-04-24T12:55:00Z
14
value 0.00116
scoring_system epss
scoring_elements 0.30007
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0227
5
reference_url http://secunia.com/advisories/12948
reference_id
reference_type
scores
url http://secunia.com/advisories/12948
6
reference_url http://security.gentoo.org/glsa/glsa-200502-08.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200502-08.xml
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10234
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10234
8
reference_url https://www.postgresql.org/support/security/CVE-2005-0227/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2005-0227/
9
reference_url http://www.debian.org/security/2005/dsa-668
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-668
10
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:040
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:040
11
reference_url http://www.novell.com/linux/security/advisories/2005_36_sudo.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_36_sudo.html
12
reference_url http://www.redhat.com/support/errata/RHSA-2005-138.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-138.html
13
reference_url http://www.redhat.com/support/errata/RHSA-2005-150.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-150.html
14
reference_url http://www.securityfocus.com/bid/12411
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12411
15
reference_url http://www.trustix.org/errata/2005/0003/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0003/
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617499
reference_id 1617499
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617499
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0227
reference_id CVE-2005-0227
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0227
19
reference_url https://access.redhat.com/errata/RHSA-2005:138
reference_id RHSA-2005:138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:138
20
reference_url https://access.redhat.com/errata/RHSA-2005:141
reference_id RHSA-2005:141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:141
21
reference_url https://access.redhat.com/errata/RHSA-2005:150
reference_id RHSA-2005:150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:150
fixed_packages
0
url pkg:generic/postgresql@7.3.9
purl pkg:generic/postgresql@7.3.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.9
1
url pkg:generic/postgresql@7.4.7
purl pkg:generic/postgresql@7.4.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.7
2
url pkg:generic/postgresql@8.0.1
purl pkg:generic/postgresql@8.0.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.1
aliases CVE-2005-0227
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-swbt-7zch-sbcp
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.0