Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/postgresql14@14.10-r0?arch=armhf&distroversion=v3.19&reponame=community
Typeapk
Namespacealpine
Namepostgresql14
Version14.10-r0
Qualifiers
arch armhf
distroversion v3.19
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version14.11-r0
Latest_non_vulnerable_version14.17-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-dwqe-a6p3-tyf6
vulnerability_id VCID-dwqe-a6p3-tyf6
summary Buffer overrun from integer overflow in array modificationmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5869.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5869.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5869
reference_id
reference_type
scores
0
value 0.01608
scoring_system epss
scoring_elements 0.81784
published_at 2026-04-18T12:55:00Z
1
value 0.01608
scoring_system epss
scoring_elements 0.81692
published_at 2026-04-02T12:55:00Z
2
value 0.01608
scoring_system epss
scoring_elements 0.81716
published_at 2026-04-04T12:55:00Z
3
value 0.01608
scoring_system epss
scoring_elements 0.81713
published_at 2026-04-07T12:55:00Z
4
value 0.01608
scoring_system epss
scoring_elements 0.81739
published_at 2026-04-08T12:55:00Z
5
value 0.01608
scoring_system epss
scoring_elements 0.81744
published_at 2026-04-09T12:55:00Z
6
value 0.01608
scoring_system epss
scoring_elements 0.81763
published_at 2026-04-11T12:55:00Z
7
value 0.01608
scoring_system epss
scoring_elements 0.81751
published_at 2026-04-12T12:55:00Z
8
value 0.01608
scoring_system epss
scoring_elements 0.81783
published_at 2026-04-16T12:55:00Z
9
value 0.01608
scoring_system epss
scoring_elements 0.81745
published_at 2026-04-13T12:55:00Z
10
value 0.01652
scoring_system epss
scoring_elements 0.82078
published_at 2026-04-24T12:55:00Z
11
value 0.01652
scoring_system epss
scoring_elements 0.82055
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5869
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
8
reference_url https://www.postgresql.org/support/security/CVE-2023-5869/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2023-5869/
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
reference_id 1056283
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2247169
reference_id 2247169
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2247169
11
reference_url https://security.gentoo.org/glsa/202408-06
reference_id GLSA-202408-06
reference_type
scores
url https://security.gentoo.org/glsa/202408-06
12
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7545
13
reference_url https://access.redhat.com/errata/RHSA-2023:7579
reference_id RHSA-2023:7579
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7579
14
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7580
15
reference_url https://access.redhat.com/errata/RHSA-2023:7581
reference_id RHSA-2023:7581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7581
16
reference_url https://access.redhat.com/errata/RHSA-2023:7616
reference_id RHSA-2023:7616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7616
17
reference_url https://access.redhat.com/errata/RHSA-2023:7656
reference_id RHSA-2023:7656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7656
18
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7666
19
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7667
20
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7694
21
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7695
22
reference_url https://access.redhat.com/errata/RHSA-2023:7714
reference_id RHSA-2023:7714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7714
23
reference_url https://access.redhat.com/errata/RHSA-2023:7770
reference_id RHSA-2023:7770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7770
24
reference_url https://access.redhat.com/errata/RHSA-2023:7771
reference_id RHSA-2023:7771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7771
25
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7772
26
reference_url https://access.redhat.com/errata/RHSA-2023:7778
reference_id RHSA-2023:7778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7778
27
reference_url https://access.redhat.com/errata/RHSA-2023:7783
reference_id RHSA-2023:7783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7783
28
reference_url https://access.redhat.com/errata/RHSA-2023:7784
reference_id RHSA-2023:7784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7784
29
reference_url https://access.redhat.com/errata/RHSA-2023:7785
reference_id RHSA-2023:7785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7785
30
reference_url https://access.redhat.com/errata/RHSA-2023:7786
reference_id RHSA-2023:7786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7786
31
reference_url https://access.redhat.com/errata/RHSA-2023:7788
reference_id RHSA-2023:7788
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7788
32
reference_url https://access.redhat.com/errata/RHSA-2023:7789
reference_id RHSA-2023:7789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7789
33
reference_url https://access.redhat.com/errata/RHSA-2023:7790
reference_id RHSA-2023:7790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7790
34
reference_url https://access.redhat.com/errata/RHSA-2023:7878
reference_id RHSA-2023:7878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7878
35
reference_url https://access.redhat.com/errata/RHSA-2023:7883
reference_id RHSA-2023:7883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7883
36
reference_url https://access.redhat.com/errata/RHSA-2023:7884
reference_id RHSA-2023:7884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7884
37
reference_url https://access.redhat.com/errata/RHSA-2023:7885
reference_id RHSA-2023:7885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7885
38
reference_url https://access.redhat.com/errata/RHSA-2024:0304
reference_id RHSA-2024:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0304
39
reference_url https://access.redhat.com/errata/RHSA-2024:0332
reference_id RHSA-2024:0332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0332
40
reference_url https://access.redhat.com/errata/RHSA-2024:0337
reference_id RHSA-2024:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0337
41
reference_url https://usn.ubuntu.com/6538-1/
reference_id USN-6538-1
reference_type
scores
url https://usn.ubuntu.com/6538-1/
42
reference_url https://usn.ubuntu.com/6538-2/
reference_id USN-6538-2
reference_type
scores
url https://usn.ubuntu.com/6538-2/
43
reference_url https://usn.ubuntu.com/6570-1/
reference_id USN-6570-1
reference_type
scores
url https://usn.ubuntu.com/6570-1/
fixed_packages
0
url pkg:apk/alpine/postgresql14@14.10-r0?arch=armhf&distroversion=v3.19&reponame=community
purl pkg:apk/alpine/postgresql14@14.10-r0?arch=armhf&distroversion=v3.19&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql14@14.10-r0%3Farch=armhf&distroversion=v3.19&reponame=community
aliases CVE-2023-5869
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dwqe-a6p3-tyf6
1
url VCID-nwfr-t7xn-zuae
vulnerability_id VCID-nwfr-t7xn-zuae
summary Role "pg_signal_backend" can signal certain superuser processesmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5870.json
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5870.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5870
reference_id
reference_type
scores
0
value 0.00621
scoring_system epss
scoring_elements 0.70153
published_at 2026-04-24T12:55:00Z
1
value 0.00621
scoring_system epss
scoring_elements 0.70075
published_at 2026-04-09T12:55:00Z
2
value 0.00621
scoring_system epss
scoring_elements 0.70098
published_at 2026-04-11T12:55:00Z
3
value 0.00621
scoring_system epss
scoring_elements 0.70083
published_at 2026-04-12T12:55:00Z
4
value 0.00621
scoring_system epss
scoring_elements 0.7007
published_at 2026-04-13T12:55:00Z
5
value 0.00621
scoring_system epss
scoring_elements 0.70113
published_at 2026-04-16T12:55:00Z
6
value 0.00621
scoring_system epss
scoring_elements 0.70123
published_at 2026-04-18T12:55:00Z
7
value 0.00621
scoring_system epss
scoring_elements 0.70102
published_at 2026-04-21T12:55:00Z
8
value 0.00621
scoring_system epss
scoring_elements 0.7002
published_at 2026-04-02T12:55:00Z
9
value 0.00621
scoring_system epss
scoring_elements 0.70035
published_at 2026-04-04T12:55:00Z
10
value 0.00621
scoring_system epss
scoring_elements 0.70011
published_at 2026-04-07T12:55:00Z
11
value 0.00621
scoring_system epss
scoring_elements 0.70059
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5870
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
8
reference_url https://www.postgresql.org/support/security/CVE-2023-5870/
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L']
1
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://www.postgresql.org/support/security/CVE-2023-5870/
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
reference_id 1056283
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2247170
reference_id 2247170
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2247170
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8
reference_id cpe:/a:redhat:advanced_cluster_security:3.74::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8
reference_id cpe:/a:redhat:advanced_cluster_security:4.1::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8
reference_id cpe:/a:redhat:advanced_cluster_security:4.2::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
reference_id cpe:/a:redhat:rhel_eus:9.0::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3
reference_id cpe:/a:redhat:rhel_software_collections:3
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7
reference_id cpe:/a:redhat:rhel_software_collections:3::el7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
35
reference_url https://access.redhat.com/security/cve/CVE-2023-5870
reference_id CVE-2023-5870
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/security/cve/CVE-2023-5870
36
reference_url https://security.gentoo.org/glsa/202408-06
reference_id GLSA-202408-06
reference_type
scores
url https://security.gentoo.org/glsa/202408-06
37
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7545
38
reference_url https://access.redhat.com/errata/RHSA-2023:7579
reference_id RHSA-2023:7579
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7579
39
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7580
40
reference_url https://access.redhat.com/errata/RHSA-2023:7581
reference_id RHSA-2023:7581
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7581
41
reference_url https://access.redhat.com/errata/RHSA-2023:7616
reference_id RHSA-2023:7616
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7616
42
reference_url https://access.redhat.com/errata/RHSA-2023:7656
reference_id RHSA-2023:7656
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7656
43
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7666
44
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7667
45
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7694
46
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7695
47
reference_url https://access.redhat.com/errata/RHSA-2023:7714
reference_id RHSA-2023:7714
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7714
48
reference_url https://access.redhat.com/errata/RHSA-2023:7770
reference_id RHSA-2023:7770
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7770
49
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7772
50
reference_url https://access.redhat.com/errata/RHSA-2023:7784
reference_id RHSA-2023:7784
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7784
51
reference_url https://access.redhat.com/errata/RHSA-2023:7785
reference_id RHSA-2023:7785
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7785
52
reference_url https://access.redhat.com/errata/RHSA-2023:7883
reference_id RHSA-2023:7883
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7883
53
reference_url https://access.redhat.com/errata/RHSA-2023:7884
reference_id RHSA-2023:7884
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7884
54
reference_url https://access.redhat.com/errata/RHSA-2023:7885
reference_id RHSA-2023:7885
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7885
55
reference_url https://access.redhat.com/errata/RHSA-2024:0304
reference_id RHSA-2024:0304
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2024:0304
56
reference_url https://access.redhat.com/errata/RHSA-2024:0332
reference_id RHSA-2024:0332
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2024:0332
57
reference_url https://access.redhat.com/errata/RHSA-2024:0337
reference_id RHSA-2024:0337
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2024:0337
58
reference_url https://usn.ubuntu.com/6538-1/
reference_id USN-6538-1
reference_type
scores
url https://usn.ubuntu.com/6538-1/
59
reference_url https://usn.ubuntu.com/6538-2/
reference_id USN-6538-2
reference_type
scores
url https://usn.ubuntu.com/6538-2/
60
reference_url https://usn.ubuntu.com/6570-1/
reference_id USN-6570-1
reference_type
scores
url https://usn.ubuntu.com/6570-1/
fixed_packages
0
url pkg:apk/alpine/postgresql14@14.10-r0?arch=armhf&distroversion=v3.19&reponame=community
purl pkg:apk/alpine/postgresql14@14.10-r0?arch=armhf&distroversion=v3.19&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql14@14.10-r0%3Farch=armhf&distroversion=v3.19&reponame=community
aliases CVE-2023-5870
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nwfr-t7xn-zuae
2
url VCID-q5z4-wv12-1fh7
vulnerability_id VCID-q5z4-wv12-1fh7
summary Memory disclosure in aggregate function callsmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5868.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5868.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5868
reference_id
reference_type
scores
0
value 0.02718
scoring_system epss
scoring_elements 0.85963
published_at 2026-04-24T12:55:00Z
1
value 0.02718
scoring_system epss
scoring_elements 0.85952
published_at 2026-04-18T12:55:00Z
2
value 0.02718
scoring_system epss
scoring_elements 0.85943
published_at 2026-04-21T12:55:00Z
3
value 0.02718
scoring_system epss
scoring_elements 0.85874
published_at 2026-04-02T12:55:00Z
4
value 0.02718
scoring_system epss
scoring_elements 0.85891
published_at 2026-04-04T12:55:00Z
5
value 0.02718
scoring_system epss
scoring_elements 0.85894
published_at 2026-04-07T12:55:00Z
6
value 0.02718
scoring_system epss
scoring_elements 0.85913
published_at 2026-04-08T12:55:00Z
7
value 0.02718
scoring_system epss
scoring_elements 0.85923
published_at 2026-04-09T12:55:00Z
8
value 0.02718
scoring_system epss
scoring_elements 0.85937
published_at 2026-04-11T12:55:00Z
9
value 0.02718
scoring_system epss
scoring_elements 0.85935
published_at 2026-04-12T12:55:00Z
10
value 0.02718
scoring_system epss
scoring_elements 0.8593
published_at 2026-04-13T12:55:00Z
11
value 0.02718
scoring_system epss
scoring_elements 0.85949
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5868
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
8
reference_url https://www.postgresql.org/support/security/CVE-2023-5868/
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2023-5868/
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
reference_id 1056283
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2247168
reference_id 2247168
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2247168
11
reference_url https://security.gentoo.org/glsa/202408-06
reference_id GLSA-202408-06
reference_type
scores
url https://security.gentoo.org/glsa/202408-06
12
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7545
13
reference_url https://access.redhat.com/errata/RHSA-2023:7579
reference_id RHSA-2023:7579
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7579
14
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7580
15
reference_url https://access.redhat.com/errata/RHSA-2023:7581
reference_id RHSA-2023:7581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7581
16
reference_url https://access.redhat.com/errata/RHSA-2023:7616
reference_id RHSA-2023:7616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7616
17
reference_url https://access.redhat.com/errata/RHSA-2023:7656
reference_id RHSA-2023:7656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7656
18
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7666
19
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7667
20
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7694
21
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7695
22
reference_url https://access.redhat.com/errata/RHSA-2023:7714
reference_id RHSA-2023:7714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7714
23
reference_url https://access.redhat.com/errata/RHSA-2023:7770
reference_id RHSA-2023:7770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7770
24
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7772
25
reference_url https://access.redhat.com/errata/RHSA-2023:7784
reference_id RHSA-2023:7784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7784
26
reference_url https://access.redhat.com/errata/RHSA-2023:7785
reference_id RHSA-2023:7785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7785
27
reference_url https://access.redhat.com/errata/RHSA-2023:7883
reference_id RHSA-2023:7883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7883
28
reference_url https://access.redhat.com/errata/RHSA-2023:7884
reference_id RHSA-2023:7884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7884
29
reference_url https://access.redhat.com/errata/RHSA-2023:7885
reference_id RHSA-2023:7885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7885
30
reference_url https://access.redhat.com/errata/RHSA-2024:0304
reference_id RHSA-2024:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0304
31
reference_url https://access.redhat.com/errata/RHSA-2024:0332
reference_id RHSA-2024:0332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0332
32
reference_url https://access.redhat.com/errata/RHSA-2024:0337
reference_id RHSA-2024:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0337
33
reference_url https://usn.ubuntu.com/6538-1/
reference_id USN-6538-1
reference_type
scores
url https://usn.ubuntu.com/6538-1/
34
reference_url https://usn.ubuntu.com/6538-2/
reference_id USN-6538-2
reference_type
scores
url https://usn.ubuntu.com/6538-2/
fixed_packages
0
url pkg:apk/alpine/postgresql14@14.10-r0?arch=armhf&distroversion=v3.19&reponame=community
purl pkg:apk/alpine/postgresql14@14.10-r0?arch=armhf&distroversion=v3.19&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql14@14.10-r0%3Farch=armhf&distroversion=v3.19&reponame=community
aliases CVE-2023-5868
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5z4-wv12-1fh7
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql14@14.10-r0%3Farch=armhf&distroversion=v3.19&reponame=community