Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-db/postgresql-server@9.1.5
Typeebuild
Namespacedev-db
Namepostgresql-server
Version9.1.5
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version9.3.3
Latest_non_vulnerable_version9.3.3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2nve-471m-17h6
vulnerability_id VCID-2nve-471m-17h6
summary SECURITY DEFINER and SET attributes on procedural call handlers are not ignored and can be used to crash the servermore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2655.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2655.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2655
reference_id
reference_type
scores
0
value 0.01407
scoring_system epss
scoring_elements 0.80425
published_at 2026-04-01T12:55:00Z
1
value 0.01407
scoring_system epss
scoring_elements 0.80432
published_at 2026-04-02T12:55:00Z
2
value 0.01407
scoring_system epss
scoring_elements 0.80453
published_at 2026-04-04T12:55:00Z
3
value 0.01407
scoring_system epss
scoring_elements 0.80442
published_at 2026-04-07T12:55:00Z
4
value 0.01407
scoring_system epss
scoring_elements 0.80472
published_at 2026-04-08T12:55:00Z
5
value 0.01407
scoring_system epss
scoring_elements 0.80481
published_at 2026-04-09T12:55:00Z
6
value 0.01407
scoring_system epss
scoring_elements 0.805
published_at 2026-04-11T12:55:00Z
7
value 0.01407
scoring_system epss
scoring_elements 0.80485
published_at 2026-04-12T12:55:00Z
8
value 0.01407
scoring_system epss
scoring_elements 0.80478
published_at 2026-04-13T12:55:00Z
9
value 0.01407
scoring_system epss
scoring_elements 0.80506
published_at 2026-04-16T12:55:00Z
10
value 0.01407
scoring_system epss
scoring_elements 0.80507
published_at 2026-04-18T12:55:00Z
11
value 0.01407
scoring_system epss
scoring_elements 0.8051
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2655
2
reference_url https://www.postgresql.org/support/security/CVE-2012-2655/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2012-2655/
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=825995
reference_id 825995
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=825995
4
reference_url https://security.gentoo.org/glsa/201209-24
reference_id GLSA-201209-24
reference_type
scores
url https://security.gentoo.org/glsa/201209-24
5
reference_url https://access.redhat.com/errata/RHSA-2012:1037
reference_id RHSA-2012:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1037
6
reference_url https://usn.ubuntu.com/1461-1/
reference_id USN-1461-1
reference_type
scores
url https://usn.ubuntu.com/1461-1/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql-server@9.1.5
purl pkg:ebuild/dev-db/postgresql-server@9.1.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.1.5
aliases CVE-2012-2655
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2nve-471m-17h6
1
url VCID-35a3-5eq3-8bep
vulnerability_id VCID-35a3-5eq3-8bep
summary Passwords containing the byte 0x80 passed to the crypt() function in pgcrypto are incorrectly truncated if DES encryption was usedmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2143.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2143.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2143
reference_id
reference_type
scores
0
value 0.02995
scoring_system epss
scoring_elements 0.86493
published_at 2026-04-01T12:55:00Z
1
value 0.02995
scoring_system epss
scoring_elements 0.86503
published_at 2026-04-02T12:55:00Z
2
value 0.02995
scoring_system epss
scoring_elements 0.86522
published_at 2026-04-04T12:55:00Z
3
value 0.02995
scoring_system epss
scoring_elements 0.86521
published_at 2026-04-07T12:55:00Z
4
value 0.02995
scoring_system epss
scoring_elements 0.86541
published_at 2026-04-08T12:55:00Z
5
value 0.02995
scoring_system epss
scoring_elements 0.8655
published_at 2026-04-09T12:55:00Z
6
value 0.02995
scoring_system epss
scoring_elements 0.86565
published_at 2026-04-11T12:55:00Z
7
value 0.02995
scoring_system epss
scoring_elements 0.86562
published_at 2026-04-12T12:55:00Z
8
value 0.02995
scoring_system epss
scoring_elements 0.86555
published_at 2026-04-13T12:55:00Z
9
value 0.02995
scoring_system epss
scoring_elements 0.86569
published_at 2026-04-16T12:55:00Z
10
value 0.02995
scoring_system epss
scoring_elements 0.86574
published_at 2026-04-18T12:55:00Z
11
value 0.02995
scoring_system epss
scoring_elements 0.86567
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2143
2
reference_url https://www.postgresql.org/support/security/CVE-2012-2143/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2012-2143/
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=816956
reference_id 816956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=816956
4
reference_url https://security.gentoo.org/glsa/201209-03
reference_id GLSA-201209-03
reference_type
scores
url https://security.gentoo.org/glsa/201209-03
5
reference_url https://security.gentoo.org/glsa/201209-24
reference_id GLSA-201209-24
reference_type
scores
url https://security.gentoo.org/glsa/201209-24
6
reference_url https://access.redhat.com/errata/RHSA-2012:1036
reference_id RHSA-2012:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1036
7
reference_url https://access.redhat.com/errata/RHSA-2012:1037
reference_id RHSA-2012:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1037
8
reference_url https://access.redhat.com/errata/RHSA-2012:1046
reference_id RHSA-2012:1046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1046
9
reference_url https://access.redhat.com/errata/RHSA-2012:1047
reference_id RHSA-2012:1047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1047
10
reference_url https://usn.ubuntu.com/1461-1/
reference_id USN-1461-1
reference_type
scores
url https://usn.ubuntu.com/1461-1/
11
reference_url https://usn.ubuntu.com/1481-1/
reference_id USN-1481-1
reference_type
scores
url https://usn.ubuntu.com/1481-1/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql-server@9.1.5
purl pkg:ebuild/dev-db/postgresql-server@9.1.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.1.5
aliases CVE-2012-2143
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-35a3-5eq3-8bep
2
url VCID-7jb6-q4x1-cfbw
vulnerability_id VCID-7jb6-q4x1-cfbw
summary xml_parse() DTD validation can be used to read arbitrary filesmore details
references
0
reference_url http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2012-1263.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1263.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3489.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3489.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3489
reference_id
reference_type
scores
0
value 0.00956
scoring_system epss
scoring_elements 0.76462
published_at 2026-04-21T12:55:00Z
1
value 0.00956
scoring_system epss
scoring_elements 0.76477
published_at 2026-04-18T12:55:00Z
2
value 0.00956
scoring_system epss
scoring_elements 0.76373
published_at 2026-04-01T12:55:00Z
3
value 0.00956
scoring_system epss
scoring_elements 0.76376
published_at 2026-04-02T12:55:00Z
4
value 0.00956
scoring_system epss
scoring_elements 0.76406
published_at 2026-04-04T12:55:00Z
5
value 0.00956
scoring_system epss
scoring_elements 0.76388
published_at 2026-04-07T12:55:00Z
6
value 0.00956
scoring_system epss
scoring_elements 0.7642
published_at 2026-04-08T12:55:00Z
7
value 0.00956
scoring_system epss
scoring_elements 0.76434
published_at 2026-04-09T12:55:00Z
8
value 0.00956
scoring_system epss
scoring_elements 0.76459
published_at 2026-04-11T12:55:00Z
9
value 0.00956
scoring_system epss
scoring_elements 0.76437
published_at 2026-04-12T12:55:00Z
10
value 0.00956
scoring_system epss
scoring_elements 0.76432
published_at 2026-04-13T12:55:00Z
11
value 0.00956
scoring_system epss
scoring_elements 0.76472
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3489
7
reference_url https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_postgresql2
reference_id
reference_type
scores
url https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_postgresql2
8
reference_url http://secunia.com/advisories/50635
reference_id
reference_type
scores
url http://secunia.com/advisories/50635
9
reference_url http://secunia.com/advisories/50718
reference_id
reference_type
scores
url http://secunia.com/advisories/50718
10
reference_url http://secunia.com/advisories/50859
reference_id
reference_type
scores
url http://secunia.com/advisories/50859
11
reference_url http://secunia.com/advisories/50946
reference_id
reference_type
scores
url http://secunia.com/advisories/50946
12
reference_url https://www.postgresql.org/support/security/CVE-2012-3489/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2012-3489/
13
reference_url http://www.debian.org/security/2012/dsa-2534
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2534
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:139
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:139
15
reference_url http://www.postgresql.org/about/news/1407/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1407/
16
reference_url http://www.postgresql.org/docs/8.3/static/release-8-3-20.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/8.3/static/release-8-3-20.html
17
reference_url http://www.postgresql.org/docs/8.4/static/release-8-4-13.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/8.4/static/release-8-4-13.html
18
reference_url http://www.postgresql.org/docs/9.0/static/release-9-0-9.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.0/static/release-9-0-9.html
19
reference_url http://www.postgresql.org/docs/9.1/static/release-9-1-5.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.1/static/release-9-1-5.html
20
reference_url http://www.postgresql.org/support/security/
reference_id
reference_type
scores
url http://www.postgresql.org/support/security/
21
reference_url http://www.securityfocus.com/bid/55074
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55074
22
reference_url http://www.ubuntu.com/usn/USN-1542-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1542-1
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=849173
reference_id 849173
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=849173
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3489
reference_id CVE-2012-3489
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-3489
44
reference_url https://security.gentoo.org/glsa/201209-24
reference_id GLSA-201209-24
reference_type
scores
url https://security.gentoo.org/glsa/201209-24
45
reference_url https://access.redhat.com/errata/RHSA-2012:1263
reference_id RHSA-2012:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1263
46
reference_url https://usn.ubuntu.com/1542-1/
reference_id USN-1542-1
reference_type
scores
url https://usn.ubuntu.com/1542-1/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql-server@9.1.5
purl pkg:ebuild/dev-db/postgresql-server@9.1.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.1.5
aliases CVE-2012-3489
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7jb6-q4x1-cfbw
3
url VCID-811b-x31n-tfch
vulnerability_id VCID-811b-x31n-tfch
summary Permissions on a function called by a trigger are not properly checked.more details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0866.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0866.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0866
reference_id
reference_type
scores
0
value 0.00905
scoring_system epss
scoring_elements 0.75678
published_at 2026-04-01T12:55:00Z
1
value 0.00905
scoring_system epss
scoring_elements 0.75681
published_at 2026-04-02T12:55:00Z
2
value 0.00905
scoring_system epss
scoring_elements 0.75711
published_at 2026-04-04T12:55:00Z
3
value 0.01067
scoring_system epss
scoring_elements 0.77655
published_at 2026-04-07T12:55:00Z
4
value 0.01067
scoring_system epss
scoring_elements 0.77683
published_at 2026-04-08T12:55:00Z
5
value 0.01067
scoring_system epss
scoring_elements 0.77688
published_at 2026-04-09T12:55:00Z
6
value 0.01067
scoring_system epss
scoring_elements 0.77715
published_at 2026-04-11T12:55:00Z
7
value 0.01067
scoring_system epss
scoring_elements 0.77698
published_at 2026-04-12T12:55:00Z
8
value 0.01067
scoring_system epss
scoring_elements 0.77697
published_at 2026-04-13T12:55:00Z
9
value 0.01067
scoring_system epss
scoring_elements 0.77734
published_at 2026-04-16T12:55:00Z
10
value 0.01067
scoring_system epss
scoring_elements 0.77733
published_at 2026-04-18T12:55:00Z
11
value 0.01067
scoring_system epss
scoring_elements 0.77727
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0866
2
reference_url https://www.postgresql.org/support/security/CVE-2012-0866/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2012-0866/
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=797222
reference_id 797222
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=797222
4
reference_url https://security.gentoo.org/glsa/201209-24
reference_id GLSA-201209-24
reference_type
scores
url https://security.gentoo.org/glsa/201209-24
5
reference_url https://access.redhat.com/errata/RHSA-2012:0677
reference_id RHSA-2012:0677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0677
6
reference_url https://access.redhat.com/errata/RHSA-2012:0678
reference_id RHSA-2012:0678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0678
7
reference_url https://usn.ubuntu.com/1378-1/
reference_id USN-1378-1
reference_type
scores
url https://usn.ubuntu.com/1378-1/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql-server@9.1.5
purl pkg:ebuild/dev-db/postgresql-server@9.1.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.1.5
aliases CVE-2012-0866
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-811b-x31n-tfch
4
url VCID-bdq4-br3j-7kb8
vulnerability_id VCID-bdq4-br3j-7kb8
summary contrib/xml2's xslt_process() can be used to read and write arbitrary filesmore details
references
0
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
1
reference_url http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2012-1263.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1263.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2012-1264.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1264.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3488.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3488.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3488
reference_id
reference_type
scores
0
value 0.002
scoring_system epss
scoring_elements 0.42017
published_at 2026-04-21T12:55:00Z
1
value 0.002
scoring_system epss
scoring_elements 0.42014
published_at 2026-04-01T12:55:00Z
2
value 0.002
scoring_system epss
scoring_elements 0.42074
published_at 2026-04-02T12:55:00Z
3
value 0.002
scoring_system epss
scoring_elements 0.42102
published_at 2026-04-04T12:55:00Z
4
value 0.002
scoring_system epss
scoring_elements 0.42039
published_at 2026-04-07T12:55:00Z
5
value 0.002
scoring_system epss
scoring_elements 0.42091
published_at 2026-04-08T12:55:00Z
6
value 0.002
scoring_system epss
scoring_elements 0.42103
published_at 2026-04-09T12:55:00Z
7
value 0.002
scoring_system epss
scoring_elements 0.42126
published_at 2026-04-11T12:55:00Z
8
value 0.002
scoring_system epss
scoring_elements 0.42089
published_at 2026-04-12T12:55:00Z
9
value 0.002
scoring_system epss
scoring_elements 0.42064
published_at 2026-04-13T12:55:00Z
10
value 0.002
scoring_system epss
scoring_elements 0.42115
published_at 2026-04-16T12:55:00Z
11
value 0.002
scoring_system epss
scoring_elements 0.42088
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3488
9
reference_url https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_postgresql2
reference_id
reference_type
scores
url https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_postgresql2
10
reference_url http://secunia.com/advisories/50635
reference_id
reference_type
scores
url http://secunia.com/advisories/50635
11
reference_url http://secunia.com/advisories/50636
reference_id
reference_type
scores
url http://secunia.com/advisories/50636
12
reference_url http://secunia.com/advisories/50718
reference_id
reference_type
scores
url http://secunia.com/advisories/50718
13
reference_url http://secunia.com/advisories/50859
reference_id
reference_type
scores
url http://secunia.com/advisories/50859
14
reference_url http://secunia.com/advisories/50946
reference_id
reference_type
scores
url http://secunia.com/advisories/50946
15
reference_url https://www.postgresql.org/support/security/CVE-2012-3488/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2012-3488/
16
reference_url http://www.debian.org/security/2012/dsa-2534
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2534
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:139
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:139
18
reference_url http://www.postgresql.org/about/news/1407/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1407/
19
reference_url http://www.postgresql.org/docs/8.3/static/release-8-3-20.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/8.3/static/release-8-3-20.html
20
reference_url http://www.postgresql.org/docs/8.4/static/release-8-4-13.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/8.4/static/release-8-4-13.html
21
reference_url http://www.postgresql.org/docs/9.0/static/release-9-0-9.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.0/static/release-9-0-9.html
22
reference_url http://www.postgresql.org/docs/9.1/static/release-9-1-5.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.1/static/release-9-1-5.html
23
reference_url http://www.postgresql.org/support/security/
reference_id
reference_type
scores
url http://www.postgresql.org/support/security/
24
reference_url http://www.securityfocus.com/bid/55072
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55072
25
reference_url http://www.ubuntu.com/usn/USN-1542-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1542-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=849172
reference_id 849172
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=849172
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.11:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.12:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.13:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.14:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.15:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.16:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.17:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.18:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.19:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3488
reference_id CVE-2012-3488
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-3488
75
reference_url https://security.gentoo.org/glsa/201209-24
reference_id GLSA-201209-24
reference_type
scores
url https://security.gentoo.org/glsa/201209-24
76
reference_url https://access.redhat.com/errata/RHSA-2012:1263
reference_id RHSA-2012:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1263
77
reference_url https://access.redhat.com/errata/RHSA-2012:1264
reference_id RHSA-2012:1264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1264
78
reference_url https://usn.ubuntu.com/1542-1/
reference_id USN-1542-1
reference_type
scores
url https://usn.ubuntu.com/1542-1/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql-server@9.1.5
purl pkg:ebuild/dev-db/postgresql-server@9.1.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.1.5
aliases CVE-2012-3488
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdq4-br3j-7kb8
5
url VCID-quqr-bg9k-7yb5
vulnerability_id VCID-quqr-bg9k-7yb5
summary Line breaks in object names can be exploited to execute arbitrary SQL when reloading a pg_dump file.more details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0868.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0868.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0868
reference_id
reference_type
scores
0
value 0.04126
scoring_system epss
scoring_elements 0.88583
published_at 2026-04-01T12:55:00Z
1
value 0.04126
scoring_system epss
scoring_elements 0.88592
published_at 2026-04-02T12:55:00Z
2
value 0.04126
scoring_system epss
scoring_elements 0.88609
published_at 2026-04-04T12:55:00Z
3
value 0.04372
scoring_system epss
scoring_elements 0.88943
published_at 2026-04-07T12:55:00Z
4
value 0.04372
scoring_system epss
scoring_elements 0.88961
published_at 2026-04-08T12:55:00Z
5
value 0.04372
scoring_system epss
scoring_elements 0.88966
published_at 2026-04-09T12:55:00Z
6
value 0.04372
scoring_system epss
scoring_elements 0.88978
published_at 2026-04-21T12:55:00Z
7
value 0.04372
scoring_system epss
scoring_elements 0.88973
published_at 2026-04-12T12:55:00Z
8
value 0.04372
scoring_system epss
scoring_elements 0.88971
published_at 2026-04-13T12:55:00Z
9
value 0.04372
scoring_system epss
scoring_elements 0.88984
published_at 2026-04-16T12:55:00Z
10
value 0.04372
scoring_system epss
scoring_elements 0.88983
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0868
2
reference_url https://www.postgresql.org/support/security/CVE-2012-0868/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2012-0868/
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=797917
reference_id 797917
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=797917
4
reference_url https://security.gentoo.org/glsa/201209-24
reference_id GLSA-201209-24
reference_type
scores
url https://security.gentoo.org/glsa/201209-24
5
reference_url https://access.redhat.com/errata/RHSA-2012:0677
reference_id RHSA-2012:0677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0677
6
reference_url https://access.redhat.com/errata/RHSA-2012:0678
reference_id RHSA-2012:0678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0678
7
reference_url https://usn.ubuntu.com/1378-1/
reference_id USN-1378-1
reference_type
scores
url https://usn.ubuntu.com/1378-1/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql-server@9.1.5
purl pkg:ebuild/dev-db/postgresql-server@9.1.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.1.5
aliases CVE-2012-0868
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-quqr-bg9k-7yb5
6
url VCID-ux6m-dn6j-37dc
vulnerability_id VCID-ux6m-dn6j-37dc
summary SSL certificate name checks are truncated to 32 characters, allowing connection spoofing under some circumstances when using third party certificate authorities.more details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0867.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0867.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0867
reference_id
reference_type
scores
0
value 0.01866
scoring_system epss
scoring_elements 0.83116
published_at 2026-04-21T12:55:00Z
1
value 0.01866
scoring_system epss
scoring_elements 0.83074
published_at 2026-04-13T12:55:00Z
2
value 0.01866
scoring_system epss
scoring_elements 0.83112
published_at 2026-04-16T12:55:00Z
3
value 0.01866
scoring_system epss
scoring_elements 0.83113
published_at 2026-04-18T12:55:00Z
4
value 0.01866
scoring_system epss
scoring_elements 0.83036
published_at 2026-04-07T12:55:00Z
5
value 0.01866
scoring_system epss
scoring_elements 0.83061
published_at 2026-04-08T12:55:00Z
6
value 0.01866
scoring_system epss
scoring_elements 0.83069
published_at 2026-04-09T12:55:00Z
7
value 0.01866
scoring_system epss
scoring_elements 0.83084
published_at 2026-04-11T12:55:00Z
8
value 0.01866
scoring_system epss
scoring_elements 0.83078
published_at 2026-04-12T12:55:00Z
9
value 0.02051
scoring_system epss
scoring_elements 0.83813
published_at 2026-04-02T12:55:00Z
10
value 0.02051
scoring_system epss
scoring_elements 0.83828
published_at 2026-04-04T12:55:00Z
11
value 0.02051
scoring_system epss
scoring_elements 0.838
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0867
2
reference_url https://www.postgresql.org/support/security/CVE-2012-0867/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/CVE-2012-0867/
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=797915
reference_id 797915
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=797915
4
reference_url https://security.gentoo.org/glsa/201209-24
reference_id GLSA-201209-24
reference_type
scores
url https://security.gentoo.org/glsa/201209-24
5
reference_url https://access.redhat.com/errata/RHSA-2012:0678
reference_id RHSA-2012:0678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0678
6
reference_url https://usn.ubuntu.com/1378-1/
reference_id USN-1378-1
reference_type
scores
url https://usn.ubuntu.com/1378-1/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql-server@9.1.5
purl pkg:ebuild/dev-db/postgresql-server@9.1.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.1.5
aliases CVE-2012-0867
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ux6m-dn6j-37dc
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.1.5