Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/76996?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/76996?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.4.26", "type": "ebuild", "namespace": "dev-db", "name": "postgresql", "version": "9.4.26", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "9.5.4", "latest_non_vulnerable_version": "17.1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3566?format=api", "vulnerability_id": "VCID-pg5v-ux6b-3qdn", "summary": "Selectivity estimators bypass row security policiesmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10130.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10130.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10130", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41713", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41723", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41779", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41808", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41736", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41786", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41795", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41818", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41785", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41821", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41772", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42278", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10130/", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2019-10130/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707109", "reference_id": "1707109", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707109" }, { "reference_url": "https://security.gentoo.org/glsa/202003-03", "reference_id": "GLSA-202003-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980", "reference_id": "RHSA-2020:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669", "reference_id": "RHSA-2020:3669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295", "reference_id": "RHSA-2020:4295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619", "reference_id": "RHSA-2020:5619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661", "reference_id": "RHSA-2020:5661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164", "reference_id": "RHSA-2021:0164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167", "reference_id": "RHSA-2021:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0167" }, { "reference_url": "https://usn.ubuntu.com/3972-1/", "reference_id": "USN-3972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76996?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.4.26", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.26" }, { "url": "http://public2.vulnerablecode.io/api/packages/76997?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.5.21", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.5.21" }, { "url": "http://public2.vulnerablecode.io/api/packages/76998?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.6.17", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.6.17" }, { "url": "http://public2.vulnerablecode.io/api/packages/76999?format=api", "purl": "pkg:ebuild/dev-db/postgresql@10.12", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@10.12" }, { "url": "http://public2.vulnerablecode.io/api/packages/77000?format=api", "purl": "pkg:ebuild/dev-db/postgresql@11.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@11.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/77001?format=api", "purl": "pkg:ebuild/dev-db/postgresql@12.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@12.2" } ], "aliases": [ "CVE-2019-10130" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pg5v-ux6b-3qdn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3564?format=api", "vulnerability_id": "VCID-wamn-1as1-qbfa", "summary": "ALTER ... DEPENDS ON EXTENSION is missing authorization checks.more details", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1720", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57428", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57502", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57561", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57539", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57567", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57563", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57543", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57512", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57533", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57509", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57562", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57566", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57581", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1720" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/2011/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/2011/" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2020-1720/", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2020-1720/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798852", "reference_id": "1798852", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798852" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1720", "reference_id": "CVE-2020-1720", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:P/A:N" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1720" }, { "reference_url": "https://security.gentoo.org/glsa/202003-03", "reference_id": "GLSA-202003-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980", "reference_id": "RHSA-2020:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669", "reference_id": "RHSA-2020:3669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295", "reference_id": "RHSA-2020:4295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5112", "reference_id": "RHSA-2020:5112", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5112" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619", "reference_id": "RHSA-2020:5619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620", "reference_id": "RHSA-2020:5620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661", "reference_id": "RHSA-2020:5661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163", "reference_id": "RHSA-2021:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164", "reference_id": "RHSA-2021:0164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167", "reference_id": "RHSA-2021:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0167" }, { "reference_url": "https://usn.ubuntu.com/4282-1/", "reference_id": "USN-4282-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4282-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76996?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.4.26", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.26" }, { "url": "http://public2.vulnerablecode.io/api/packages/76997?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.5.21", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.5.21" }, { "url": "http://public2.vulnerablecode.io/api/packages/76998?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.6.17", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.6.17" }, { "url": "http://public2.vulnerablecode.io/api/packages/76999?format=api", "purl": "pkg:ebuild/dev-db/postgresql@10.12", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@10.12" }, { "url": "http://public2.vulnerablecode.io/api/packages/77000?format=api", "purl": "pkg:ebuild/dev-db/postgresql@11.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@11.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/77001?format=api", "purl": "pkg:ebuild/dev-db/postgresql@12.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@12.2" } ], "aliases": [ "CVE-2020-1720" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wamn-1as1-qbfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3597?format=api", "vulnerability_id": "VCID-y23y-qvcc-4qh2", "summary": "Memory disclosure in partition routingmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10129.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10129.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10129", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63198", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63257", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63287", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63251", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63303", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.6332", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63338", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63321", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63322", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63329", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63309", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63328", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10129" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10129/", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2019-10129/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707106", "reference_id": "1707106", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707106" }, { "reference_url": "https://security.gentoo.org/glsa/202003-03", "reference_id": "GLSA-202003-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-03" }, { "reference_url": "https://usn.ubuntu.com/3972-1/", "reference_id": "USN-3972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76996?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.4.26", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.26" }, { "url": "http://public2.vulnerablecode.io/api/packages/76997?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.5.21", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.5.21" }, { "url": "http://public2.vulnerablecode.io/api/packages/76998?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.6.17", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.6.17" }, { "url": "http://public2.vulnerablecode.io/api/packages/76999?format=api", "purl": "pkg:ebuild/dev-db/postgresql@10.12", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@10.12" }, { "url": "http://public2.vulnerablecode.io/api/packages/77000?format=api", "purl": "pkg:ebuild/dev-db/postgresql@11.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@11.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/77001?format=api", "purl": "pkg:ebuild/dev-db/postgresql@12.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@12.2" } ], "aliases": [ "CVE-2019-10129" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y23y-qvcc-4qh2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3565?format=api", "vulnerability_id": "VCID-ybb6-2xrm-7fbk", "summary": "Stack-based buffer overflow via setting a passwordmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10164.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10164.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10164", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05798", "scoring_system": "epss", "scoring_elements": "0.90528", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05798", "scoring_system": "epss", "scoring_elements": "0.90516", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05798", "scoring_system": "epss", "scoring_elements": "0.9051", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.90571", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.90579", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.90591", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.90597", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.90556", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.9056", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13393", "scoring_system": "epss", "scoring_elements": "0.94214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.13393", "scoring_system": "epss", "scoring_elements": "0.94211", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10164" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-114-109-9614-9518-9423-and-12-beta-2-released-1949/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-114-109-9614-9518-9423-and-12-beta-2-released-1949/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10164/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2019-10164/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719698", "reference_id": "1719698", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719698" }, { "reference_url": "https://security.gentoo.org/glsa/202003-03", "reference_id": "GLSA-202003-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980", "reference_id": "RHSA-2020:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669", "reference_id": "RHSA-2020:3669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://usn.ubuntu.com/4027-1/", "reference_id": "USN-4027-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4027-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76996?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.4.26", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.26" }, { "url": "http://public2.vulnerablecode.io/api/packages/76997?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.5.21", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.5.21" }, { "url": "http://public2.vulnerablecode.io/api/packages/76998?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.6.17", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.6.17" }, { "url": "http://public2.vulnerablecode.io/api/packages/76999?format=api", "purl": "pkg:ebuild/dev-db/postgresql@10.12", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@10.12" }, { "url": "http://public2.vulnerablecode.io/api/packages/77000?format=api", "purl": "pkg:ebuild/dev-db/postgresql@11.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@11.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/77001?format=api", "purl": "pkg:ebuild/dev-db/postgresql@12.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@12.2" } ], "aliases": [ "CVE-2019-10164" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ybb6-2xrm-7fbk" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.26" }