Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-db/postgresql@12
Typeebuild
Namespacedev-db
Namepostgresql
Version12
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version12.2
Latest_non_vulnerable_version17.1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-621d-wrrx-n7ae
vulnerability_id VCID-621d-wrrx-n7ae
summary Restrict visibility of "pg_stats_ext" and "pg_stats_ext_exprs" entries to the table ownermore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4317.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4317.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4317
reference_id
reference_type
scores
0
value 0.00194
scoring_system epss
scoring_elements 0.4128
published_at 2026-04-21T12:55:00Z
1
value 0.00194
scoring_system epss
scoring_elements 0.41167
published_at 2026-04-24T12:55:00Z
2
value 0.00211
scoring_system epss
scoring_elements 0.43577
published_at 2026-04-08T12:55:00Z
3
value 0.00211
scoring_system epss
scoring_elements 0.4358
published_at 2026-04-12T12:55:00Z
4
value 0.00211
scoring_system epss
scoring_elements 0.43564
published_at 2026-04-13T12:55:00Z
5
value 0.00211
scoring_system epss
scoring_elements 0.43624
published_at 2026-04-16T12:55:00Z
6
value 0.00211
scoring_system epss
scoring_elements 0.43614
published_at 2026-04-18T12:55:00Z
7
value 0.00211
scoring_system epss
scoring_elements 0.43563
published_at 2026-04-02T12:55:00Z
8
value 0.00211
scoring_system epss
scoring_elements 0.4359
published_at 2026-04-04T12:55:00Z
9
value 0.00211
scoring_system epss
scoring_elements 0.43526
published_at 2026-04-07T12:55:00Z
10
value 0.00211
scoring_system epss
scoring_elements 0.43592
published_at 2026-04-09T12:55:00Z
11
value 0.00211
scoring_system epss
scoring_elements 0.4361
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4317
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.postgresql.org/about/news/postgresql-163-157-1412-1315-and-1219-released-2858/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-163-157-1412-1315-and-1219-released-2858/
4
reference_url https://www.postgresql.org/support/security/CVE-2024-4317/
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']
1
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T13:20:02Z/
url https://www.postgresql.org/support/security/CVE-2024-4317/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2279935
reference_id 2279935
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2279935
6
reference_url https://security.gentoo.org/glsa/202408-06
reference_id GLSA-202408-06
reference_type
scores
url https://security.gentoo.org/glsa/202408-06
7
reference_url https://access.redhat.com/errata/RHSA-2024:5927
reference_id RHSA-2024:5927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5927
8
reference_url https://access.redhat.com/errata/RHSA-2024:5929
reference_id RHSA-2024:5929
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5929
9
reference_url https://access.redhat.com/errata/RHSA-2024:6001
reference_id RHSA-2024:6001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6001
10
reference_url https://access.redhat.com/errata/RHSA-2024:6020
reference_id RHSA-2024:6020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6020
11
reference_url https://access.redhat.com/errata/RHSA-2024:6142
reference_id RHSA-2024:6142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6142
12
reference_url https://usn.ubuntu.com/6802-1/
reference_id USN-6802-1
reference_type
scores
url https://usn.ubuntu.com/6802-1/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql@12
purl pkg:ebuild/dev-db/postgresql@12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@12
1
url pkg:ebuild/dev-db/postgresql@12.19
purl pkg:ebuild/dev-db/postgresql@12.19
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@12.19
2
url pkg:ebuild/dev-db/postgresql@13.14
purl pkg:ebuild/dev-db/postgresql@13.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@13.14
3
url pkg:ebuild/dev-db/postgresql@14.12-r1
purl pkg:ebuild/dev-db/postgresql@14.12-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@14.12-r1
4
url pkg:ebuild/dev-db/postgresql@15.7-r1
purl pkg:ebuild/dev-db/postgresql@15.7-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@15.7-r1
5
url pkg:ebuild/dev-db/postgresql@16.3-r1
purl pkg:ebuild/dev-db/postgresql@16.3-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@16.3-r1
aliases CVE-2024-4317
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-621d-wrrx-n7ae
1
url VCID-dwqe-a6p3-tyf6
vulnerability_id VCID-dwqe-a6p3-tyf6
summary Buffer overrun from integer overflow in array modificationmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5869.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5869.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5869
reference_id
reference_type
scores
0
value 0.01608
scoring_system epss
scoring_elements 0.81784
published_at 2026-04-18T12:55:00Z
1
value 0.01608
scoring_system epss
scoring_elements 0.81692
published_at 2026-04-02T12:55:00Z
2
value 0.01608
scoring_system epss
scoring_elements 0.81716
published_at 2026-04-04T12:55:00Z
3
value 0.01608
scoring_system epss
scoring_elements 0.81713
published_at 2026-04-07T12:55:00Z
4
value 0.01608
scoring_system epss
scoring_elements 0.81739
published_at 2026-04-08T12:55:00Z
5
value 0.01608
scoring_system epss
scoring_elements 0.81744
published_at 2026-04-09T12:55:00Z
6
value 0.01608
scoring_system epss
scoring_elements 0.81763
published_at 2026-04-11T12:55:00Z
7
value 0.01608
scoring_system epss
scoring_elements 0.81751
published_at 2026-04-12T12:55:00Z
8
value 0.01608
scoring_system epss
scoring_elements 0.81783
published_at 2026-04-16T12:55:00Z
9
value 0.01608
scoring_system epss
scoring_elements 0.81745
published_at 2026-04-13T12:55:00Z
10
value 0.01652
scoring_system epss
scoring_elements 0.82078
published_at 2026-04-24T12:55:00Z
11
value 0.01652
scoring_system epss
scoring_elements 0.82055
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5869
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
8
reference_url https://www.postgresql.org/support/security/CVE-2023-5869/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2023-5869/
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
reference_id 1056283
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2247169
reference_id 2247169
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2247169
11
reference_url https://security.gentoo.org/glsa/202408-06
reference_id GLSA-202408-06
reference_type
scores
url https://security.gentoo.org/glsa/202408-06
12
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7545
13
reference_url https://access.redhat.com/errata/RHSA-2023:7579
reference_id RHSA-2023:7579
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7579
14
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7580
15
reference_url https://access.redhat.com/errata/RHSA-2023:7581
reference_id RHSA-2023:7581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7581
16
reference_url https://access.redhat.com/errata/RHSA-2023:7616
reference_id RHSA-2023:7616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7616
17
reference_url https://access.redhat.com/errata/RHSA-2023:7656
reference_id RHSA-2023:7656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7656
18
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7666
19
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7667
20
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7694
21
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7695
22
reference_url https://access.redhat.com/errata/RHSA-2023:7714
reference_id RHSA-2023:7714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7714
23
reference_url https://access.redhat.com/errata/RHSA-2023:7770
reference_id RHSA-2023:7770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7770
24
reference_url https://access.redhat.com/errata/RHSA-2023:7771
reference_id RHSA-2023:7771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7771
25
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7772
26
reference_url https://access.redhat.com/errata/RHSA-2023:7778
reference_id RHSA-2023:7778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7778
27
reference_url https://access.redhat.com/errata/RHSA-2023:7783
reference_id RHSA-2023:7783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7783
28
reference_url https://access.redhat.com/errata/RHSA-2023:7784
reference_id RHSA-2023:7784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7784
29
reference_url https://access.redhat.com/errata/RHSA-2023:7785
reference_id RHSA-2023:7785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7785
30
reference_url https://access.redhat.com/errata/RHSA-2023:7786
reference_id RHSA-2023:7786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7786
31
reference_url https://access.redhat.com/errata/RHSA-2023:7788
reference_id RHSA-2023:7788
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7788
32
reference_url https://access.redhat.com/errata/RHSA-2023:7789
reference_id RHSA-2023:7789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7789
33
reference_url https://access.redhat.com/errata/RHSA-2023:7790
reference_id RHSA-2023:7790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7790
34
reference_url https://access.redhat.com/errata/RHSA-2023:7878
reference_id RHSA-2023:7878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7878
35
reference_url https://access.redhat.com/errata/RHSA-2023:7883
reference_id RHSA-2023:7883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7883
36
reference_url https://access.redhat.com/errata/RHSA-2023:7884
reference_id RHSA-2023:7884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7884
37
reference_url https://access.redhat.com/errata/RHSA-2023:7885
reference_id RHSA-2023:7885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7885
38
reference_url https://access.redhat.com/errata/RHSA-2024:0304
reference_id RHSA-2024:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0304
39
reference_url https://access.redhat.com/errata/RHSA-2024:0332
reference_id RHSA-2024:0332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0332
40
reference_url https://access.redhat.com/errata/RHSA-2024:0337
reference_id RHSA-2024:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0337
41
reference_url https://usn.ubuntu.com/6538-1/
reference_id USN-6538-1
reference_type
scores
url https://usn.ubuntu.com/6538-1/
42
reference_url https://usn.ubuntu.com/6538-2/
reference_id USN-6538-2
reference_type
scores
url https://usn.ubuntu.com/6538-2/
43
reference_url https://usn.ubuntu.com/6570-1/
reference_id USN-6570-1
reference_type
scores
url https://usn.ubuntu.com/6570-1/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql@12
purl pkg:ebuild/dev-db/postgresql@12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@12
1
url pkg:ebuild/dev-db/postgresql@12.19
purl pkg:ebuild/dev-db/postgresql@12.19
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@12.19
2
url pkg:ebuild/dev-db/postgresql@13.14
purl pkg:ebuild/dev-db/postgresql@13.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@13.14
3
url pkg:ebuild/dev-db/postgresql@14.12-r1
purl pkg:ebuild/dev-db/postgresql@14.12-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@14.12-r1
4
url pkg:ebuild/dev-db/postgresql@15.7-r1
purl pkg:ebuild/dev-db/postgresql@15.7-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@15.7-r1
5
url pkg:ebuild/dev-db/postgresql@16.3-r1
purl pkg:ebuild/dev-db/postgresql@16.3-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@16.3-r1
aliases CVE-2023-5869
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dwqe-a6p3-tyf6
2
url VCID-j4cc-p1t3-tydy
vulnerability_id VCID-j4cc-p1t3-tydy
summary PostgreSQL non-owner REFRESH MATERIALIZED VIEW CONCURRENTLY executes arbitrary SQLmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0985.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0985.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0985
reference_id
reference_type
scores
0
value 0.00753
scoring_system epss
scoring_elements 0.73264
published_at 2026-04-18T12:55:00Z
1
value 0.00753
scoring_system epss
scoring_elements 0.73255
published_at 2026-04-16T12:55:00Z
2
value 0.00753
scoring_system epss
scoring_elements 0.73218
published_at 2026-04-12T12:55:00Z
3
value 0.00753
scoring_system epss
scoring_elements 0.73237
published_at 2026-04-11T12:55:00Z
4
value 0.00753
scoring_system epss
scoring_elements 0.73212
published_at 2026-04-13T12:55:00Z
5
value 0.00753
scoring_system epss
scoring_elements 0.73199
published_at 2026-04-08T12:55:00Z
6
value 0.00753
scoring_system epss
scoring_elements 0.73163
published_at 2026-04-07T12:55:00Z
7
value 0.00753
scoring_system epss
scoring_elements 0.73188
published_at 2026-04-04T12:55:00Z
8
value 0.00753
scoring_system epss
scoring_elements 0.73167
published_at 2026-04-02T12:55:00Z
9
value 0.00774
scoring_system epss
scoring_elements 0.73667
published_at 2026-04-24T12:55:00Z
10
value 0.00774
scoring_system epss
scoring_elements 0.73634
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0985
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-162-156-1411-1314-and-1218-released-2807/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-162-156-1411-1314-and-1218-released-2807/
5
reference_url https://www.postgresql.org/support/security/CVE-2024-0985/
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H']
1
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-16T05:00:50Z/
url https://www.postgresql.org/support/security/CVE-2024-0985/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2263384
reference_id 2263384
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2263384
7
reference_url https://security.gentoo.org/glsa/202408-06
reference_id GLSA-202408-06
reference_type
scores
url https://security.gentoo.org/glsa/202408-06
8
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-16T05:00:50Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00017.html
9
reference_url https://saites.dev/projects/personal/postgres-cve-2024-0985/
reference_id postgres-cve-2024-0985
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-16T05:00:50Z/
url https://saites.dev/projects/personal/postgres-cve-2024-0985/
10
reference_url https://access.redhat.com/errata/RHSA-2024:0950
reference_id RHSA-2024:0950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0950
11
reference_url https://access.redhat.com/errata/RHSA-2024:0951
reference_id RHSA-2024:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0951
12
reference_url https://access.redhat.com/errata/RHSA-2024:0956
reference_id RHSA-2024:0956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0956
13
reference_url https://access.redhat.com/errata/RHSA-2024:0973
reference_id RHSA-2024:0973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0973
14
reference_url https://access.redhat.com/errata/RHSA-2024:0974
reference_id RHSA-2024:0974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0974
15
reference_url https://access.redhat.com/errata/RHSA-2024:0975
reference_id RHSA-2024:0975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0975
16
reference_url https://access.redhat.com/errata/RHSA-2024:0988
reference_id RHSA-2024:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0988
17
reference_url https://access.redhat.com/errata/RHSA-2024:0990
reference_id RHSA-2024:0990
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0990
18
reference_url https://access.redhat.com/errata/RHSA-2024:0992
reference_id RHSA-2024:0992
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0992
19
reference_url https://access.redhat.com/errata/RHSA-2024:1017
reference_id RHSA-2024:1017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1017
20
reference_url https://access.redhat.com/errata/RHSA-2024:1069
reference_id RHSA-2024:1069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1069
21
reference_url https://access.redhat.com/errata/RHSA-2024:1070
reference_id RHSA-2024:1070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1070
22
reference_url https://access.redhat.com/errata/RHSA-2024:1071
reference_id RHSA-2024:1071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1071
23
reference_url https://access.redhat.com/errata/RHSA-2024:1195
reference_id RHSA-2024:1195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1195
24
reference_url https://access.redhat.com/errata/RHSA-2024:1240
reference_id RHSA-2024:1240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1240
25
reference_url https://access.redhat.com/errata/RHSA-2024:1241
reference_id RHSA-2024:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1241
26
reference_url https://access.redhat.com/errata/RHSA-2024:1314
reference_id RHSA-2024:1314
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1314
27
reference_url https://access.redhat.com/errata/RHSA-2024:1315
reference_id RHSA-2024:1315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1315
28
reference_url https://access.redhat.com/errata/RHSA-2024:1348
reference_id RHSA-2024:1348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1348
29
reference_url https://access.redhat.com/errata/RHSA-2024:1422
reference_id RHSA-2024:1422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1422
30
reference_url https://access.redhat.com/errata/RHSA-2024:1426
reference_id RHSA-2024:1426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1426
31
reference_url https://access.redhat.com/errata/RHSA-2024:1428
reference_id RHSA-2024:1428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1428
32
reference_url https://access.redhat.com/errata/RHSA-2024:1429
reference_id RHSA-2024:1429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1429
33
reference_url https://access.redhat.com/errata/RHSA-2024:1437
reference_id RHSA-2024:1437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1437
34
reference_url https://usn.ubuntu.com/6656-1/
reference_id USN-6656-1
reference_type
scores
url https://usn.ubuntu.com/6656-1/
35
reference_url https://usn.ubuntu.com/6656-2/
reference_id USN-6656-2
reference_type
scores
url https://usn.ubuntu.com/6656-2/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql@12
purl pkg:ebuild/dev-db/postgresql@12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@12
1
url pkg:ebuild/dev-db/postgresql@12.19
purl pkg:ebuild/dev-db/postgresql@12.19
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@12.19
2
url pkg:ebuild/dev-db/postgresql@13.14
purl pkg:ebuild/dev-db/postgresql@13.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@13.14
3
url pkg:ebuild/dev-db/postgresql@14.12-r1
purl pkg:ebuild/dev-db/postgresql@14.12-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@14.12-r1
4
url pkg:ebuild/dev-db/postgresql@15.7-r1
purl pkg:ebuild/dev-db/postgresql@15.7-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@15.7-r1
5
url pkg:ebuild/dev-db/postgresql@16.3-r1
purl pkg:ebuild/dev-db/postgresql@16.3-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@16.3-r1
aliases CVE-2024-0985
risk_score 3.6
exploitability 0.5
weighted_severity 7.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j4cc-p1t3-tydy
3
url VCID-nwfr-t7xn-zuae
vulnerability_id VCID-nwfr-t7xn-zuae
summary Role "pg_signal_backend" can signal certain superuser processesmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5870.json
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5870.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5870
reference_id
reference_type
scores
0
value 0.00621
scoring_system epss
scoring_elements 0.70153
published_at 2026-04-24T12:55:00Z
1
value 0.00621
scoring_system epss
scoring_elements 0.70075
published_at 2026-04-09T12:55:00Z
2
value 0.00621
scoring_system epss
scoring_elements 0.70098
published_at 2026-04-11T12:55:00Z
3
value 0.00621
scoring_system epss
scoring_elements 0.70083
published_at 2026-04-12T12:55:00Z
4
value 0.00621
scoring_system epss
scoring_elements 0.7007
published_at 2026-04-13T12:55:00Z
5
value 0.00621
scoring_system epss
scoring_elements 0.70113
published_at 2026-04-16T12:55:00Z
6
value 0.00621
scoring_system epss
scoring_elements 0.70123
published_at 2026-04-18T12:55:00Z
7
value 0.00621
scoring_system epss
scoring_elements 0.70102
published_at 2026-04-21T12:55:00Z
8
value 0.00621
scoring_system epss
scoring_elements 0.7002
published_at 2026-04-02T12:55:00Z
9
value 0.00621
scoring_system epss
scoring_elements 0.70035
published_at 2026-04-04T12:55:00Z
10
value 0.00621
scoring_system epss
scoring_elements 0.70011
published_at 2026-04-07T12:55:00Z
11
value 0.00621
scoring_system epss
scoring_elements 0.70059
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5870
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
8
reference_url https://www.postgresql.org/support/security/CVE-2023-5870/
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L']
1
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://www.postgresql.org/support/security/CVE-2023-5870/
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
reference_id 1056283
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2247170
reference_id 2247170
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2247170
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8
reference_id cpe:/a:redhat:advanced_cluster_security:3.74::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8
reference_id cpe:/a:redhat:advanced_cluster_security:4.1::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8
reference_id cpe:/a:redhat:advanced_cluster_security:4.2::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
reference_id cpe:/a:redhat:rhel_eus:9.0::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3
reference_id cpe:/a:redhat:rhel_software_collections:3
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7
reference_id cpe:/a:redhat:rhel_software_collections:3::el7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
35
reference_url https://access.redhat.com/security/cve/CVE-2023-5870
reference_id CVE-2023-5870
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/security/cve/CVE-2023-5870
36
reference_url https://security.gentoo.org/glsa/202408-06
reference_id GLSA-202408-06
reference_type
scores
url https://security.gentoo.org/glsa/202408-06
37
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7545
38
reference_url https://access.redhat.com/errata/RHSA-2023:7579
reference_id RHSA-2023:7579
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7579
39
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7580
40
reference_url https://access.redhat.com/errata/RHSA-2023:7581
reference_id RHSA-2023:7581
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7581
41
reference_url https://access.redhat.com/errata/RHSA-2023:7616
reference_id RHSA-2023:7616
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7616
42
reference_url https://access.redhat.com/errata/RHSA-2023:7656
reference_id RHSA-2023:7656
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7656
43
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7666
44
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7667
45
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7694
46
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7695
47
reference_url https://access.redhat.com/errata/RHSA-2023:7714
reference_id RHSA-2023:7714
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7714
48
reference_url https://access.redhat.com/errata/RHSA-2023:7770
reference_id RHSA-2023:7770
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7770
49
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7772
50
reference_url https://access.redhat.com/errata/RHSA-2023:7784
reference_id RHSA-2023:7784
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7784
51
reference_url https://access.redhat.com/errata/RHSA-2023:7785
reference_id RHSA-2023:7785
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7785
52
reference_url https://access.redhat.com/errata/RHSA-2023:7883
reference_id RHSA-2023:7883
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7883
53
reference_url https://access.redhat.com/errata/RHSA-2023:7884
reference_id RHSA-2023:7884
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7884
54
reference_url https://access.redhat.com/errata/RHSA-2023:7885
reference_id RHSA-2023:7885
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7885
55
reference_url https://access.redhat.com/errata/RHSA-2024:0304
reference_id RHSA-2024:0304
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2024:0304
56
reference_url https://access.redhat.com/errata/RHSA-2024:0332
reference_id RHSA-2024:0332
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2024:0332
57
reference_url https://access.redhat.com/errata/RHSA-2024:0337
reference_id RHSA-2024:0337
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2024:0337
58
reference_url https://usn.ubuntu.com/6538-1/
reference_id USN-6538-1
reference_type
scores
url https://usn.ubuntu.com/6538-1/
59
reference_url https://usn.ubuntu.com/6538-2/
reference_id USN-6538-2
reference_type
scores
url https://usn.ubuntu.com/6538-2/
60
reference_url https://usn.ubuntu.com/6570-1/
reference_id USN-6570-1
reference_type
scores
url https://usn.ubuntu.com/6570-1/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql@12
purl pkg:ebuild/dev-db/postgresql@12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@12
1
url pkg:ebuild/dev-db/postgresql@12.19
purl pkg:ebuild/dev-db/postgresql@12.19
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@12.19
2
url pkg:ebuild/dev-db/postgresql@13.14
purl pkg:ebuild/dev-db/postgresql@13.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@13.14
3
url pkg:ebuild/dev-db/postgresql@14.12-r1
purl pkg:ebuild/dev-db/postgresql@14.12-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@14.12-r1
4
url pkg:ebuild/dev-db/postgresql@15.7-r1
purl pkg:ebuild/dev-db/postgresql@15.7-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@15.7-r1
5
url pkg:ebuild/dev-db/postgresql@16.3-r1
purl pkg:ebuild/dev-db/postgresql@16.3-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@16.3-r1
aliases CVE-2023-5870
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nwfr-t7xn-zuae
4
url VCID-q5z4-wv12-1fh7
vulnerability_id VCID-q5z4-wv12-1fh7
summary Memory disclosure in aggregate function callsmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5868.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5868.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5868
reference_id
reference_type
scores
0
value 0.02718
scoring_system epss
scoring_elements 0.85963
published_at 2026-04-24T12:55:00Z
1
value 0.02718
scoring_system epss
scoring_elements 0.85952
published_at 2026-04-18T12:55:00Z
2
value 0.02718
scoring_system epss
scoring_elements 0.85943
published_at 2026-04-21T12:55:00Z
3
value 0.02718
scoring_system epss
scoring_elements 0.85874
published_at 2026-04-02T12:55:00Z
4
value 0.02718
scoring_system epss
scoring_elements 0.85891
published_at 2026-04-04T12:55:00Z
5
value 0.02718
scoring_system epss
scoring_elements 0.85894
published_at 2026-04-07T12:55:00Z
6
value 0.02718
scoring_system epss
scoring_elements 0.85913
published_at 2026-04-08T12:55:00Z
7
value 0.02718
scoring_system epss
scoring_elements 0.85923
published_at 2026-04-09T12:55:00Z
8
value 0.02718
scoring_system epss
scoring_elements 0.85937
published_at 2026-04-11T12:55:00Z
9
value 0.02718
scoring_system epss
scoring_elements 0.85935
published_at 2026-04-12T12:55:00Z
10
value 0.02718
scoring_system epss
scoring_elements 0.8593
published_at 2026-04-13T12:55:00Z
11
value 0.02718
scoring_system epss
scoring_elements 0.85949
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5868
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
8
reference_url https://www.postgresql.org/support/security/CVE-2023-5868/
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2023-5868/
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
reference_id 1056283
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2247168
reference_id 2247168
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2247168
11
reference_url https://security.gentoo.org/glsa/202408-06
reference_id GLSA-202408-06
reference_type
scores
url https://security.gentoo.org/glsa/202408-06
12
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7545
13
reference_url https://access.redhat.com/errata/RHSA-2023:7579
reference_id RHSA-2023:7579
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7579
14
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7580
15
reference_url https://access.redhat.com/errata/RHSA-2023:7581
reference_id RHSA-2023:7581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7581
16
reference_url https://access.redhat.com/errata/RHSA-2023:7616
reference_id RHSA-2023:7616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7616
17
reference_url https://access.redhat.com/errata/RHSA-2023:7656
reference_id RHSA-2023:7656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7656
18
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7666
19
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7667
20
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7694
21
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7695
22
reference_url https://access.redhat.com/errata/RHSA-2023:7714
reference_id RHSA-2023:7714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7714
23
reference_url https://access.redhat.com/errata/RHSA-2023:7770
reference_id RHSA-2023:7770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7770
24
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7772
25
reference_url https://access.redhat.com/errata/RHSA-2023:7784
reference_id RHSA-2023:7784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7784
26
reference_url https://access.redhat.com/errata/RHSA-2023:7785
reference_id RHSA-2023:7785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7785
27
reference_url https://access.redhat.com/errata/RHSA-2023:7883
reference_id RHSA-2023:7883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7883
28
reference_url https://access.redhat.com/errata/RHSA-2023:7884
reference_id RHSA-2023:7884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7884
29
reference_url https://access.redhat.com/errata/RHSA-2023:7885
reference_id RHSA-2023:7885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7885
30
reference_url https://access.redhat.com/errata/RHSA-2024:0304
reference_id RHSA-2024:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0304
31
reference_url https://access.redhat.com/errata/RHSA-2024:0332
reference_id RHSA-2024:0332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0332
32
reference_url https://access.redhat.com/errata/RHSA-2024:0337
reference_id RHSA-2024:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0337
33
reference_url https://usn.ubuntu.com/6538-1/
reference_id USN-6538-1
reference_type
scores
url https://usn.ubuntu.com/6538-1/
34
reference_url https://usn.ubuntu.com/6538-2/
reference_id USN-6538-2
reference_type
scores
url https://usn.ubuntu.com/6538-2/
fixed_packages
0
url pkg:ebuild/dev-db/postgresql@12
purl pkg:ebuild/dev-db/postgresql@12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@12
1
url pkg:ebuild/dev-db/postgresql@12.19
purl pkg:ebuild/dev-db/postgresql@12.19
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@12.19
2
url pkg:ebuild/dev-db/postgresql@13.14
purl pkg:ebuild/dev-db/postgresql@13.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@13.14
3
url pkg:ebuild/dev-db/postgresql@14.12-r1
purl pkg:ebuild/dev-db/postgresql@14.12-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@14.12-r1
4
url pkg:ebuild/dev-db/postgresql@15.7-r1
purl pkg:ebuild/dev-db/postgresql@15.7-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@15.7-r1
5
url pkg:ebuild/dev-db/postgresql@16.3-r1
purl pkg:ebuild/dev-db/postgresql@16.3-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@16.3-r1
aliases CVE-2023-5868
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5z4-wv12-1fh7
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@12