Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-db/postgresql@9.3.14
Typeebuild
Namespacedev-db
Namepostgresql
Version9.3.14
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version9.3.18
Latest_non_vulnerable_version17.1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-8bu8-zpfv-8bgg
vulnerability_id VCID-8bu8-zpfv-8bgg
summary Exceptional database and role names could enable escalation to superusermore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5424.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5424.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5424
reference_id
reference_type
scores
0
value 0.01674
scoring_system epss
scoring_elements 0.82076
published_at 2026-04-01T12:55:00Z
1
value 0.01674
scoring_system epss
scoring_elements 0.82184
published_at 2026-04-21T12:55:00Z
2
value 0.01674
scoring_system epss
scoring_elements 0.82181
published_at 2026-04-16T12:55:00Z
3
value 0.01674
scoring_system epss
scoring_elements 0.82182
published_at 2026-04-18T12:55:00Z
4
value 0.01674
scoring_system epss
scoring_elements 0.82088
published_at 2026-04-02T12:55:00Z
5
value 0.01674
scoring_system epss
scoring_elements 0.82109
published_at 2026-04-04T12:55:00Z
6
value 0.01674
scoring_system epss
scoring_elements 0.82105
published_at 2026-04-07T12:55:00Z
7
value 0.01674
scoring_system epss
scoring_elements 0.82132
published_at 2026-04-08T12:55:00Z
8
value 0.01674
scoring_system epss
scoring_elements 0.82139
published_at 2026-04-09T12:55:00Z
9
value 0.01674
scoring_system epss
scoring_elements 0.82158
published_at 2026-04-11T12:55:00Z
10
value 0.01674
scoring_system epss
scoring_elements 0.82149
published_at 2026-04-12T12:55:00Z
11
value 0.01674
scoring_system epss
scoring_elements 0.82144
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5424
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.postgresql.org/about/news/2016-08-11-security-update-release-1688/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/2016-08-11-security-update-release-1688/
6
reference_url https://www.postgresql.org/support/security/CVE-2016-5424/
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2016-5424/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1364002
reference_id 1364002
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1364002
8
reference_url https://security.gentoo.org/glsa/201701-33
reference_id GLSA-201701-33
reference_type
scores
url https://security.gentoo.org/glsa/201701-33
9
reference_url https://access.redhat.com/errata/RHSA-2016:1781
reference_id RHSA-2016:1781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1781
10
reference_url https://access.redhat.com/errata/RHSA-2016:1820
reference_id RHSA-2016:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1820
11
reference_url https://access.redhat.com/errata/RHSA-2016:1821
reference_id RHSA-2016:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1821
12
reference_url https://access.redhat.com/errata/RHSA-2016:2606
reference_id RHSA-2016:2606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2606
13
reference_url https://access.redhat.com/errata/RHSA-2017:2425
reference_id RHSA-2017:2425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2425
14
reference_url https://usn.ubuntu.com/3066-1/
reference_id USN-3066-1
reference_type
scores
url https://usn.ubuntu.com/3066-1/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql@9.1.23
purl pkg:ebuild/dev-db/postgresql@9.1.23
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.1.23
1
url pkg:ebuild/dev-db/postgresql@9.2.18
purl pkg:ebuild/dev-db/postgresql@9.2.18
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.2.18
2
url pkg:ebuild/dev-db/postgresql@9.3.14
purl pkg:ebuild/dev-db/postgresql@9.3.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.3.14
3
url pkg:ebuild/dev-db/postgresql@9.4.9
purl pkg:ebuild/dev-db/postgresql@9.4.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.9
4
url pkg:ebuild/dev-db/postgresql@9.5.4
purl pkg:ebuild/dev-db/postgresql@9.5.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.5.4
aliases CVE-2016-5424
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8bu8-zpfv-8bgg
1
url VCID-9b6v-1bt1-dfgy
vulnerability_id VCID-9b6v-1bt1-dfgy
summary Certain nested CASE/WHEN expressions can crash servermore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5423.json
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5423.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5423
reference_id
reference_type
scores
0
value 0.034
scoring_system epss
scoring_elements 0.87365
published_at 2026-04-01T12:55:00Z
1
value 0.034
scoring_system epss
scoring_elements 0.87431
published_at 2026-04-21T12:55:00Z
2
value 0.034
scoring_system epss
scoring_elements 0.87433
published_at 2026-04-16T12:55:00Z
3
value 0.034
scoring_system epss
scoring_elements 0.87436
published_at 2026-04-18T12:55:00Z
4
value 0.034
scoring_system epss
scoring_elements 0.87374
published_at 2026-04-02T12:55:00Z
5
value 0.034
scoring_system epss
scoring_elements 0.8739
published_at 2026-04-04T12:55:00Z
6
value 0.034
scoring_system epss
scoring_elements 0.87389
published_at 2026-04-07T12:55:00Z
7
value 0.034
scoring_system epss
scoring_elements 0.87408
published_at 2026-04-08T12:55:00Z
8
value 0.034
scoring_system epss
scoring_elements 0.87415
published_at 2026-04-09T12:55:00Z
9
value 0.034
scoring_system epss
scoring_elements 0.87428
published_at 2026-04-11T12:55:00Z
10
value 0.034
scoring_system epss
scoring_elements 0.87423
published_at 2026-04-12T12:55:00Z
11
value 0.034
scoring_system epss
scoring_elements 0.87419
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5423
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.postgresql.org/about/news/2016-08-11-security-update-release-1688/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/2016-08-11-security-update-release-1688/
6
reference_url https://www.postgresql.org/support/security/CVE-2016-5423/
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2016-5423/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1364001
reference_id 1364001
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1364001
8
reference_url https://security.gentoo.org/glsa/201701-33
reference_id GLSA-201701-33
reference_type
scores
url https://security.gentoo.org/glsa/201701-33
9
reference_url https://access.redhat.com/errata/RHSA-2016:1781
reference_id RHSA-2016:1781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1781
10
reference_url https://access.redhat.com/errata/RHSA-2016:1820
reference_id RHSA-2016:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1820
11
reference_url https://access.redhat.com/errata/RHSA-2016:1821
reference_id RHSA-2016:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1821
12
reference_url https://access.redhat.com/errata/RHSA-2016:2606
reference_id RHSA-2016:2606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2606
13
reference_url https://access.redhat.com/errata/RHSA-2017:2425
reference_id RHSA-2017:2425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2425
14
reference_url https://usn.ubuntu.com/3066-1/
reference_id USN-3066-1
reference_type
scores
url https://usn.ubuntu.com/3066-1/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql@9.1.23
purl pkg:ebuild/dev-db/postgresql@9.1.23
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.1.23
1
url pkg:ebuild/dev-db/postgresql@9.2.18
purl pkg:ebuild/dev-db/postgresql@9.2.18
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.2.18
2
url pkg:ebuild/dev-db/postgresql@9.3.14
purl pkg:ebuild/dev-db/postgresql@9.3.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.3.14
3
url pkg:ebuild/dev-db/postgresql@9.4.9
purl pkg:ebuild/dev-db/postgresql@9.4.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.9
4
url pkg:ebuild/dev-db/postgresql@9.5.4
purl pkg:ebuild/dev-db/postgresql@9.5.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.5.4
aliases CVE-2016-5423
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9b6v-1bt1-dfgy
2
url VCID-esps-vak5-bqcp
vulnerability_id VCID-esps-vak5-bqcp
summary Unchecked JSON input can crash the servermore details
references
0
reference_url http://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commit%3Bh=08fa47c4850cea32c3116665975bca219fbf2fe6
reference_id
reference_type
scores
url http://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commit%3Bh=08fa47c4850cea32c3116665975bca219fbf2fe6
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5289.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5289.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5289
reference_id
reference_type
scores
0
value 0.09972
scoring_system epss
scoring_elements 0.93062
published_at 2026-04-21T12:55:00Z
1
value 0.09972
scoring_system epss
scoring_elements 0.93013
published_at 2026-04-01T12:55:00Z
2
value 0.09972
scoring_system epss
scoring_elements 0.93052
published_at 2026-04-16T12:55:00Z
3
value 0.09972
scoring_system epss
scoring_elements 0.93055
published_at 2026-04-18T12:55:00Z
4
value 0.09972
scoring_system epss
scoring_elements 0.93022
published_at 2026-04-02T12:55:00Z
5
value 0.09972
scoring_system epss
scoring_elements 0.93026
published_at 2026-04-04T12:55:00Z
6
value 0.09972
scoring_system epss
scoring_elements 0.93025
published_at 2026-04-07T12:55:00Z
7
value 0.09972
scoring_system epss
scoring_elements 0.93033
published_at 2026-04-08T12:55:00Z
8
value 0.09972
scoring_system epss
scoring_elements 0.93038
published_at 2026-04-09T12:55:00Z
9
value 0.09972
scoring_system epss
scoring_elements 0.93043
published_at 2026-04-11T12:55:00Z
10
value 0.09972
scoring_system epss
scoring_elements 0.9304
published_at 2026-04-12T12:55:00Z
11
value 0.09972
scoring_system epss
scoring_elements 0.93042
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5289
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5289
9
reference_url https://www.postgresql.org/about/news/2015-10-08-security-update-release-1615/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/2015-10-08-security-update-release-1615/
10
reference_url https://www.postgresql.org/support/security/CVE-2015-5289/
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H']
url https://www.postgresql.org/support/security/CVE-2015-5289/
11
reference_url http://www.debian.org/security/2015/dsa-3374
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3374
12
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
13
reference_url http://www.postgresql.org/about/news/1615/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1615/
14
reference_url http://www.postgresql.org/docs/9.3/static/release-9-3-10.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.3/static/release-9-3-10.html
15
reference_url http://www.postgresql.org/docs/9.4/static/release-9-4-5.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.4/static/release-9-4-5.html
16
reference_url http://www.securityfocus.com/bid/77048
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77048
17
reference_url http://www.securitytracker.com/id/1033775
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033775
18
reference_url http://www.ubuntu.com/usn/USN-2772-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2772-1
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1270312
reference_id 1270312
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1270312
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5289
reference_id CVE-2015-5289
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-5289
27
reference_url https://security.gentoo.org/glsa/201701-33
reference_id GLSA-201701-33
reference_type
scores
url https://security.gentoo.org/glsa/201701-33
28
reference_url https://access.redhat.com/errata/RHSA-2015:2077
reference_id RHSA-2015:2077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2077
29
reference_url https://access.redhat.com/errata/RHSA-2015:2078
reference_id RHSA-2015:2078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2078
30
reference_url https://access.redhat.com/errata/RHSA-2015:2083
reference_id RHSA-2015:2083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2083
31
reference_url https://usn.ubuntu.com/2772-1/
reference_id USN-2772-1
reference_type
scores
url https://usn.ubuntu.com/2772-1/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql@9.1.23
purl pkg:ebuild/dev-db/postgresql@9.1.23
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.1.23
1
url pkg:ebuild/dev-db/postgresql@9.2.18
purl pkg:ebuild/dev-db/postgresql@9.2.18
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.2.18
2
url pkg:ebuild/dev-db/postgresql@9.3.14
purl pkg:ebuild/dev-db/postgresql@9.3.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.3.14
3
url pkg:ebuild/dev-db/postgresql@9.4.9
purl pkg:ebuild/dev-db/postgresql@9.4.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.9
4
url pkg:ebuild/dev-db/postgresql@9.5.4
purl pkg:ebuild/dev-db/postgresql@9.5.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.5.4
aliases CVE-2015-5289
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-esps-vak5-bqcp
3
url VCID-fd5z-bj21-m3a5
vulnerability_id VCID-fd5z-bj21-m3a5
summary Memory leak in crypt() function.more details
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00040.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5288.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5288.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5288
reference_id
reference_type
scores
0
value 0.08949
scoring_system epss
scoring_elements 0.92611
published_at 2026-04-21T12:55:00Z
1
value 0.08949
scoring_system epss
scoring_elements 0.92558
published_at 2026-04-01T12:55:00Z
2
value 0.08949
scoring_system epss
scoring_elements 0.92596
published_at 2026-04-12T12:55:00Z
3
value 0.08949
scoring_system epss
scoring_elements 0.92608
published_at 2026-04-16T12:55:00Z
4
value 0.08949
scoring_system epss
scoring_elements 0.92607
published_at 2026-04-18T12:55:00Z
5
value 0.08949
scoring_system epss
scoring_elements 0.92564
published_at 2026-04-02T12:55:00Z
6
value 0.08949
scoring_system epss
scoring_elements 0.92571
published_at 2026-04-04T12:55:00Z
7
value 0.08949
scoring_system epss
scoring_elements 0.92573
published_at 2026-04-07T12:55:00Z
8
value 0.08949
scoring_system epss
scoring_elements 0.92585
published_at 2026-04-08T12:55:00Z
9
value 0.08949
scoring_system epss
scoring_elements 0.92589
published_at 2026-04-09T12:55:00Z
10
value 0.08949
scoring_system epss
scoring_elements 0.92595
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5288
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5289
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://www.postgresql.org/about/news/postgresql-95-beta-1-released-1614/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-95-beta-1-released-1614/
13
reference_url https://www.postgresql.org/support/security/CVE-2015-5288/
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2015-5288/
14
reference_url http://www.debian.org/security/2015/dsa-3374
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3374
15
reference_url http://www.debian.org/security/2016/dsa-3475
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3475
16
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
17
reference_url http://www.postgresql.org/about/news/1615/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1615/
18
reference_url http://www.postgresql.org/docs/9.0/static/release-9-0-23.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.0/static/release-9-0-23.html
19
reference_url http://www.postgresql.org/docs/9.1/static/release-9-1-19.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.1/static/release-9-1-19.html
20
reference_url http://www.postgresql.org/docs/9.2/static/release-9-2-14.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.2/static/release-9-2-14.html
21
reference_url http://www.postgresql.org/docs/9.3/static/release-9-3-10.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.3/static/release-9-3-10.html
22
reference_url http://www.postgresql.org/docs/9.4/static/release-9-4-5.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.4/static/release-9-4-5.html
23
reference_url http://www.securityfocus.com/bid/77049
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77049
24
reference_url http://www.securitytracker.com/id/1033775
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033775
25
reference_url http://www.ubuntu.com/usn/USN-2772-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2772-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1270306
reference_id 1270306
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1270306
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.11:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.12:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.13:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.14:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.15:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.16:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.17:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.18:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.9:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5288
reference_id CVE-2015-5288
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-5288
77
reference_url https://security.gentoo.org/glsa/201701-33
reference_id GLSA-201701-33
reference_type
scores
url https://security.gentoo.org/glsa/201701-33
78
reference_url https://access.redhat.com/errata/RHSA-2015:2077
reference_id RHSA-2015:2077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2077
79
reference_url https://access.redhat.com/errata/RHSA-2015:2078
reference_id RHSA-2015:2078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2078
80
reference_url https://access.redhat.com/errata/RHSA-2015:2081
reference_id RHSA-2015:2081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2081
81
reference_url https://access.redhat.com/errata/RHSA-2015:2083
reference_id RHSA-2015:2083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2083
82
reference_url https://usn.ubuntu.com/2772-1/
reference_id USN-2772-1
reference_type
scores
url https://usn.ubuntu.com/2772-1/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql@9.1.23
purl pkg:ebuild/dev-db/postgresql@9.1.23
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.1.23
1
url pkg:ebuild/dev-db/postgresql@9.2.18
purl pkg:ebuild/dev-db/postgresql@9.2.18
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.2.18
2
url pkg:ebuild/dev-db/postgresql@9.3.14
purl pkg:ebuild/dev-db/postgresql@9.3.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.3.14
3
url pkg:ebuild/dev-db/postgresql@9.4.9
purl pkg:ebuild/dev-db/postgresql@9.4.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.9
4
url pkg:ebuild/dev-db/postgresql@9.5.4
purl pkg:ebuild/dev-db/postgresql@9.5.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.5.4
aliases CVE-2015-5288
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fd5z-bj21-m3a5
4
url VCID-h58p-g575-bkg6
vulnerability_id VCID-h58p-g575-bkg6
summary
Multiple vulnerabilities have been found in PostgreSQL, the worst
    of which could result in execution of arbitrary code or privilege
    escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0766
reference_id
reference_type
scores
0
value 0.00372
scoring_system epss
scoring_elements 0.59026
published_at 2026-04-18T12:55:00Z
1
value 0.00372
scoring_system epss
scoring_elements 0.58988
published_at 2026-04-13T12:55:00Z
2
value 0.00372
scoring_system epss
scoring_elements 0.59022
published_at 2026-04-16T12:55:00Z
3
value 0.00372
scoring_system epss
scoring_elements 0.58884
published_at 2026-04-01T12:55:00Z
4
value 0.00372
scoring_system epss
scoring_elements 0.58959
published_at 2026-04-02T12:55:00Z
5
value 0.00372
scoring_system epss
scoring_elements 0.58981
published_at 2026-04-04T12:55:00Z
6
value 0.00372
scoring_system epss
scoring_elements 0.58947
published_at 2026-04-07T12:55:00Z
7
value 0.00372
scoring_system epss
scoring_elements 0.58999
published_at 2026-04-08T12:55:00Z
8
value 0.00372
scoring_system epss
scoring_elements 0.59006
published_at 2026-04-21T12:55:00Z
9
value 0.00372
scoring_system epss
scoring_elements 0.59025
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0766
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://www.debian.org/security/2016/dsa-3475
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3475
11
reference_url http://www.debian.org/security/2016/dsa-3476
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3476
12
reference_url http://www.postgresql.org/about/news/1644/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1644/
13
reference_url http://www.postgresql.org/docs/current/static/release-9-1-20.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-1-20.html
14
reference_url http://www.postgresql.org/docs/current/static/release-9-2-15.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-2-15.html
15
reference_url http://www.postgresql.org/docs/current/static/release-9-3-11.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-3-11.html
16
reference_url http://www.postgresql.org/docs/current/static/release-9-4-6.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-4-6.html
17
reference_url http://www.postgresql.org/docs/current/static/release-9-5-1.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-5-1.html
18
reference_url http://www.securityfocus.com/bid/83184
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/83184
19
reference_url http://www.securitytracker.com/id/1035005
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035005
20
reference_url http://www.ubuntu.com/usn/USN-2894-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2894-1
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0766
reference_id CVE-2016-0766
reference_type
scores
0
value 9.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0766
29
reference_url https://security.gentoo.org/glsa/201701-33
reference_id GLSA-201701-33
reference_type
scores
url https://security.gentoo.org/glsa/201701-33
30
reference_url https://usn.ubuntu.com/2894-1/
reference_id USN-2894-1
reference_type
scores
url https://usn.ubuntu.com/2894-1/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql@9.1.23
purl pkg:ebuild/dev-db/postgresql@9.1.23
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.1.23
1
url pkg:ebuild/dev-db/postgresql@9.2.18
purl pkg:ebuild/dev-db/postgresql@9.2.18
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.2.18
2
url pkg:ebuild/dev-db/postgresql@9.3.14
purl pkg:ebuild/dev-db/postgresql@9.3.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.3.14
3
url pkg:ebuild/dev-db/postgresql@9.4.9
purl pkg:ebuild/dev-db/postgresql@9.4.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.9
4
url pkg:ebuild/dev-db/postgresql@9.5.4
purl pkg:ebuild/dev-db/postgresql@9.5.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.5.4
aliases CVE-2016-0766
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h58p-g575-bkg6
5
url VCID-t864-ytjh-nyg1
vulnerability_id VCID-t864-ytjh-nyg1
summary Unchecked regex can crash the servermore details
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177820.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177820.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177878.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177878.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1060.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1060.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0773.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0773.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0773
reference_id
reference_type
scores
0
value 0.12452
scoring_system epss
scoring_elements 0.93935
published_at 2026-04-21T12:55:00Z
1
value 0.12452
scoring_system epss
scoring_elements 0.9387
published_at 2026-04-01T12:55:00Z
2
value 0.12452
scoring_system epss
scoring_elements 0.93907
published_at 2026-04-13T12:55:00Z
3
value 0.12452
scoring_system epss
scoring_elements 0.93908
published_at 2026-04-12T12:55:00Z
4
value 0.12452
scoring_system epss
scoring_elements 0.93929
published_at 2026-04-16T12:55:00Z
5
value 0.12452
scoring_system epss
scoring_elements 0.93934
published_at 2026-04-18T12:55:00Z
6
value 0.12452
scoring_system epss
scoring_elements 0.93879
published_at 2026-04-02T12:55:00Z
7
value 0.12452
scoring_system epss
scoring_elements 0.93888
published_at 2026-04-04T12:55:00Z
8
value 0.12452
scoring_system epss
scoring_elements 0.93891
published_at 2026-04-07T12:55:00Z
9
value 0.12452
scoring_system epss
scoring_elements 0.939
published_at 2026-04-08T12:55:00Z
10
value 0.12452
scoring_system epss
scoring_elements 0.93904
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0773
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10152
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10152
15
reference_url https://puppet.com/security/cve/CVE-2016-0773
reference_id
reference_type
scores
url https://puppet.com/security/cve/CVE-2016-0773
16
reference_url https://www.postgresql.org/about/news/2016-02-11-security-update-release-1644/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/2016-02-11-security-update-release-1644/
17
reference_url https://www.postgresql.org/support/security/CVE-2016-0773/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H']
url https://www.postgresql.org/support/security/CVE-2016-0773/
18
reference_url http://www.debian.org/security/2016/dsa-3475
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3475
19
reference_url http://www.debian.org/security/2016/dsa-3476
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3476
20
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
21
reference_url http://www.postgresql.org/about/news/1644/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1644/
22
reference_url http://www.postgresql.org/docs/current/static/release-9-1-20.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-1-20.html
23
reference_url http://www.postgresql.org/docs/current/static/release-9-2-15.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-2-15.html
24
reference_url http://www.postgresql.org/docs/current/static/release-9-3-11.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-3-11.html
25
reference_url http://www.postgresql.org/docs/current/static/release-9-4-6.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-4-6.html
26
reference_url http://www.postgresql.org/docs/current/static/release-9-5-1.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-5-1.html
27
reference_url http://www.securityfocus.com/bid/83184
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/83184
28
reference_url http://www.securitytracker.com/id/1035005
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035005
29
reference_url http://www.ubuntu.com/usn/USN-2894-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2894-1
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1303832
reference_id 1303832
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1303832
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0773
reference_id CVE-2016-0773
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0773
60
reference_url https://security.gentoo.org/glsa/201701-33
reference_id GLSA-201701-33
reference_type
scores
url https://security.gentoo.org/glsa/201701-33
61
reference_url https://access.redhat.com/errata/RHSA-2016:0346
reference_id RHSA-2016:0346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0346
62
reference_url https://access.redhat.com/errata/RHSA-2016:0347
reference_id RHSA-2016:0347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0347
63
reference_url https://access.redhat.com/errata/RHSA-2016:0348
reference_id RHSA-2016:0348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0348
64
reference_url https://access.redhat.com/errata/RHSA-2016:0349
reference_id RHSA-2016:0349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0349
65
reference_url https://access.redhat.com/errata/RHSA-2016:1060
reference_id RHSA-2016:1060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1060
66
reference_url https://usn.ubuntu.com/2894-1/
reference_id USN-2894-1
reference_type
scores
url https://usn.ubuntu.com/2894-1/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql@9.1.23
purl pkg:ebuild/dev-db/postgresql@9.1.23
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.1.23
1
url pkg:ebuild/dev-db/postgresql@9.2.18
purl pkg:ebuild/dev-db/postgresql@9.2.18
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.2.18
2
url pkg:ebuild/dev-db/postgresql@9.3.14
purl pkg:ebuild/dev-db/postgresql@9.3.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.3.14
3
url pkg:ebuild/dev-db/postgresql@9.4.9
purl pkg:ebuild/dev-db/postgresql@9.4.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.9
4
url pkg:ebuild/dev-db/postgresql@9.5.4
purl pkg:ebuild/dev-db/postgresql@9.5.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.5.4
aliases CVE-2016-0773
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t864-ytjh-nyg1
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.3.14