Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/postgresql@13.13-1?arch=el9_0
Typerpm
Namespaceredhat
Namepostgresql
Version13.13-1
Qualifiers
arch el9_0
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3kph-5gzq-ryhu
vulnerability_id VCID-3kph-5gzq-ryhu
summary Row security policies disregard user ID changes after inliningmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2455.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2455.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2455
reference_id
reference_type
scores
0
value 0.00212
scoring_system epss
scoring_elements 0.4378
published_at 2026-04-04T12:55:00Z
1
value 0.00212
scoring_system epss
scoring_elements 0.43756
published_at 2026-04-02T12:55:00Z
2
value 0.00226
scoring_system epss
scoring_elements 0.45331
published_at 2026-04-24T12:55:00Z
3
value 0.00226
scoring_system epss
scoring_elements 0.45447
published_at 2026-04-11T12:55:00Z
4
value 0.00226
scoring_system epss
scoring_elements 0.45417
published_at 2026-04-12T12:55:00Z
5
value 0.00226
scoring_system epss
scoring_elements 0.45418
published_at 2026-04-13T12:55:00Z
6
value 0.00226
scoring_system epss
scoring_elements 0.45469
published_at 2026-04-16T12:55:00Z
7
value 0.00226
scoring_system epss
scoring_elements 0.45464
published_at 2026-04-18T12:55:00Z
8
value 0.00226
scoring_system epss
scoring_elements 0.45414
published_at 2026-04-21T12:55:00Z
9
value 0.00226
scoring_system epss
scoring_elements 0.45369
published_at 2026-04-07T12:55:00Z
10
value 0.00226
scoring_system epss
scoring_elements 0.45424
published_at 2026-04-08T12:55:00Z
11
value 0.00226
scoring_system epss
scoring_elements 0.45425
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2455
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/
6
reference_url https://www.postgresql.org/support/security/CVE-2023-2455/
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N']
1
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T17:13:19Z/
url https://www.postgresql.org/support/security/CVE-2023-2455/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2207569
reference_id 2207569
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2207569
8
reference_url https://access.redhat.com/security/cve/CVE-2023-2455
reference_id CVE-2023-2455
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T17:13:19Z/
url https://access.redhat.com/security/cve/CVE-2023-2455
9
reference_url https://security.netapp.com/advisory/ntap-20230706-0006/
reference_id ntap-20230706-0006
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T17:13:19Z/
url https://security.netapp.com/advisory/ntap-20230706-0006/
10
reference_url https://access.redhat.com/errata/RHSA-2023:3714
reference_id RHSA-2023:3714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3714
11
reference_url https://access.redhat.com/errata/RHSA-2023:4313
reference_id RHSA-2023:4313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4313
12
reference_url https://access.redhat.com/errata/RHSA-2023:4327
reference_id RHSA-2023:4327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4327
13
reference_url https://access.redhat.com/errata/RHSA-2023:4527
reference_id RHSA-2023:4527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4527
14
reference_url https://access.redhat.com/errata/RHSA-2023:4535
reference_id RHSA-2023:4535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4535
15
reference_url https://access.redhat.com/errata/RHSA-2023:4539
reference_id RHSA-2023:4539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4539
16
reference_url https://access.redhat.com/errata/RHSA-2023:5269
reference_id RHSA-2023:5269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5269
17
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7545
18
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7580
19
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7666
20
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7667
21
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7694
22
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7695
23
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7772
24
reference_url https://usn.ubuntu.com/6104-1/
reference_id USN-6104-1
reference_type
scores
url https://usn.ubuntu.com/6104-1/
fixed_packages
aliases CVE-2023-2455
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3kph-5gzq-ryhu
1
url VCID-5py6-fe2j-d3f4
vulnerability_id VCID-5py6-fe2j-d3f4
summary CREATE SCHEMA ... schema_element defeats protective search_path changesmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2454.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2454.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2454
reference_id
reference_type
scores
0
value 0.00228
scoring_system epss
scoring_elements 0.45609
published_at 2026-04-04T12:55:00Z
1
value 0.00228
scoring_system epss
scoring_elements 0.45587
published_at 2026-04-02T12:55:00Z
2
value 0.00234
scoring_system epss
scoring_elements 0.46288
published_at 2026-04-24T12:55:00Z
3
value 0.00234
scoring_system epss
scoring_elements 0.46307
published_at 2026-04-21T12:55:00Z
4
value 0.00244
scoring_system epss
scoring_elements 0.47686
published_at 2026-04-18T12:55:00Z
5
value 0.00244
scoring_system epss
scoring_elements 0.47627
published_at 2026-04-12T12:55:00Z
6
value 0.00244
scoring_system epss
scoring_elements 0.47651
published_at 2026-04-11T12:55:00Z
7
value 0.00244
scoring_system epss
scoring_elements 0.47636
published_at 2026-04-13T12:55:00Z
8
value 0.00244
scoring_system epss
scoring_elements 0.47694
published_at 2026-04-16T12:55:00Z
9
value 0.00244
scoring_system epss
scoring_elements 0.47576
published_at 2026-04-07T12:55:00Z
10
value 0.00244
scoring_system epss
scoring_elements 0.47631
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2454
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/
6
reference_url https://www.postgresql.org/support/security/CVE-2023-2454/
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H']
1
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/
url https://www.postgresql.org/support/security/CVE-2023-2454/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2207568
reference_id 2207568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2207568
8
reference_url https://access.redhat.com/security/cve/CVE-2023-2454
reference_id CVE-2023-2454
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/
url https://access.redhat.com/security/cve/CVE-2023-2454
9
reference_url https://security.netapp.com/advisory/ntap-20230706-0006/
reference_id ntap-20230706-0006
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/
url https://security.netapp.com/advisory/ntap-20230706-0006/
10
reference_url https://access.redhat.com/errata/RHSA-2023:3714
reference_id RHSA-2023:3714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3714
11
reference_url https://access.redhat.com/errata/RHSA-2023:4313
reference_id RHSA-2023:4313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4313
12
reference_url https://access.redhat.com/errata/RHSA-2023:4327
reference_id RHSA-2023:4327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4327
13
reference_url https://access.redhat.com/errata/RHSA-2023:4527
reference_id RHSA-2023:4527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4527
14
reference_url https://access.redhat.com/errata/RHSA-2023:4535
reference_id RHSA-2023:4535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4535
15
reference_url https://access.redhat.com/errata/RHSA-2023:4539
reference_id RHSA-2023:4539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4539
16
reference_url https://access.redhat.com/errata/RHSA-2023:5269
reference_id RHSA-2023:5269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5269
17
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7545
18
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7580
19
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7666
20
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7667
21
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7694
22
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7695
23
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7772
24
reference_url https://usn.ubuntu.com/6104-1/
reference_id USN-6104-1
reference_type
scores
url https://usn.ubuntu.com/6104-1/
25
reference_url https://usn.ubuntu.com/6230-1/
reference_id USN-6230-1
reference_type
scores
url https://usn.ubuntu.com/6230-1/
fixed_packages
aliases CVE-2023-2454
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5py6-fe2j-d3f4
2
url VCID-dwqe-a6p3-tyf6
vulnerability_id VCID-dwqe-a6p3-tyf6
summary Buffer overrun from integer overflow in array modificationmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5869.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5869.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5869
reference_id
reference_type
scores
0
value 0.01608
scoring_system epss
scoring_elements 0.81784
published_at 2026-04-18T12:55:00Z
1
value 0.01608
scoring_system epss
scoring_elements 0.81692
published_at 2026-04-02T12:55:00Z
2
value 0.01608
scoring_system epss
scoring_elements 0.81716
published_at 2026-04-04T12:55:00Z
3
value 0.01608
scoring_system epss
scoring_elements 0.81713
published_at 2026-04-07T12:55:00Z
4
value 0.01608
scoring_system epss
scoring_elements 0.81739
published_at 2026-04-08T12:55:00Z
5
value 0.01608
scoring_system epss
scoring_elements 0.81744
published_at 2026-04-09T12:55:00Z
6
value 0.01608
scoring_system epss
scoring_elements 0.81763
published_at 2026-04-11T12:55:00Z
7
value 0.01608
scoring_system epss
scoring_elements 0.81751
published_at 2026-04-12T12:55:00Z
8
value 0.01608
scoring_system epss
scoring_elements 0.81783
published_at 2026-04-16T12:55:00Z
9
value 0.01608
scoring_system epss
scoring_elements 0.81745
published_at 2026-04-13T12:55:00Z
10
value 0.01652
scoring_system epss
scoring_elements 0.82078
published_at 2026-04-24T12:55:00Z
11
value 0.01652
scoring_system epss
scoring_elements 0.82055
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5869
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
8
reference_url https://www.postgresql.org/support/security/CVE-2023-5869/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2023-5869/
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
reference_id 1056283
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2247169
reference_id 2247169
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2247169
11
reference_url https://security.gentoo.org/glsa/202408-06
reference_id GLSA-202408-06
reference_type
scores
url https://security.gentoo.org/glsa/202408-06
12
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7545
13
reference_url https://access.redhat.com/errata/RHSA-2023:7579
reference_id RHSA-2023:7579
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7579
14
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7580
15
reference_url https://access.redhat.com/errata/RHSA-2023:7581
reference_id RHSA-2023:7581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7581
16
reference_url https://access.redhat.com/errata/RHSA-2023:7616
reference_id RHSA-2023:7616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7616
17
reference_url https://access.redhat.com/errata/RHSA-2023:7656
reference_id RHSA-2023:7656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7656
18
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7666
19
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7667
20
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7694
21
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7695
22
reference_url https://access.redhat.com/errata/RHSA-2023:7714
reference_id RHSA-2023:7714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7714
23
reference_url https://access.redhat.com/errata/RHSA-2023:7770
reference_id RHSA-2023:7770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7770
24
reference_url https://access.redhat.com/errata/RHSA-2023:7771
reference_id RHSA-2023:7771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7771
25
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7772
26
reference_url https://access.redhat.com/errata/RHSA-2023:7778
reference_id RHSA-2023:7778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7778
27
reference_url https://access.redhat.com/errata/RHSA-2023:7783
reference_id RHSA-2023:7783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7783
28
reference_url https://access.redhat.com/errata/RHSA-2023:7784
reference_id RHSA-2023:7784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7784
29
reference_url https://access.redhat.com/errata/RHSA-2023:7785
reference_id RHSA-2023:7785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7785
30
reference_url https://access.redhat.com/errata/RHSA-2023:7786
reference_id RHSA-2023:7786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7786
31
reference_url https://access.redhat.com/errata/RHSA-2023:7788
reference_id RHSA-2023:7788
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7788
32
reference_url https://access.redhat.com/errata/RHSA-2023:7789
reference_id RHSA-2023:7789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7789
33
reference_url https://access.redhat.com/errata/RHSA-2023:7790
reference_id RHSA-2023:7790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7790
34
reference_url https://access.redhat.com/errata/RHSA-2023:7878
reference_id RHSA-2023:7878
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7878
35
reference_url https://access.redhat.com/errata/RHSA-2023:7883
reference_id RHSA-2023:7883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7883
36
reference_url https://access.redhat.com/errata/RHSA-2023:7884
reference_id RHSA-2023:7884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7884
37
reference_url https://access.redhat.com/errata/RHSA-2023:7885
reference_id RHSA-2023:7885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7885
38
reference_url https://access.redhat.com/errata/RHSA-2024:0304
reference_id RHSA-2024:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0304
39
reference_url https://access.redhat.com/errata/RHSA-2024:0332
reference_id RHSA-2024:0332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0332
40
reference_url https://access.redhat.com/errata/RHSA-2024:0337
reference_id RHSA-2024:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0337
41
reference_url https://usn.ubuntu.com/6538-1/
reference_id USN-6538-1
reference_type
scores
url https://usn.ubuntu.com/6538-1/
42
reference_url https://usn.ubuntu.com/6538-2/
reference_id USN-6538-2
reference_type
scores
url https://usn.ubuntu.com/6538-2/
43
reference_url https://usn.ubuntu.com/6570-1/
reference_id USN-6570-1
reference_type
scores
url https://usn.ubuntu.com/6570-1/
fixed_packages
aliases CVE-2023-5869
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dwqe-a6p3-tyf6
3
url VCID-nuek-ypyh-b3dm
vulnerability_id VCID-nuek-ypyh-b3dm
summary Extension scripts replace objects not belonging to the extensionmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2625
reference_id
reference_type
scores
0
value 0.00973
scoring_system epss
scoring_elements 0.76737
published_at 2026-04-24T12:55:00Z
1
value 0.00973
scoring_system epss
scoring_elements 0.76717
published_at 2026-04-18T12:55:00Z
2
value 0.00973
scoring_system epss
scoring_elements 0.76706
published_at 2026-04-21T12:55:00Z
3
value 0.00973
scoring_system epss
scoring_elements 0.76616
published_at 2026-04-02T12:55:00Z
4
value 0.00973
scoring_system epss
scoring_elements 0.76645
published_at 2026-04-04T12:55:00Z
5
value 0.00973
scoring_system epss
scoring_elements 0.76627
published_at 2026-04-07T12:55:00Z
6
value 0.00973
scoring_system epss
scoring_elements 0.7666
published_at 2026-04-08T12:55:00Z
7
value 0.00973
scoring_system epss
scoring_elements 0.76671
published_at 2026-04-09T12:55:00Z
8
value 0.00973
scoring_system epss
scoring_elements 0.76698
published_at 2026-04-11T12:55:00Z
9
value 0.00973
scoring_system epss
scoring_elements 0.76678
published_at 2026-04-12T12:55:00Z
10
value 0.00973
scoring_system epss
scoring_elements 0.7667
published_at 2026-04-13T12:55:00Z
11
value 0.00973
scoring_system epss
scoring_elements 0.76712
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2625
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/
5
reference_url https://www.postgresql.org/support/security/CVE-2022-2625/
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2022-2625/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2113825
reference_id 2113825
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2113825
7
reference_url https://security.gentoo.org/glsa/202211-04
reference_id GLSA-202211-04
reference_type
scores
url https://security.gentoo.org/glsa/202211-04
8
reference_url https://access.redhat.com/errata/RHSA-2022:7128
reference_id RHSA-2022:7128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7128
9
reference_url https://access.redhat.com/errata/RHSA-2023:0113
reference_id RHSA-2023:0113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0113
10
reference_url https://access.redhat.com/errata/RHSA-2023:0160
reference_id RHSA-2023:0160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0160
11
reference_url https://access.redhat.com/errata/RHSA-2023:1576
reference_id RHSA-2023:1576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1576
12
reference_url https://access.redhat.com/errata/RHSA-2023:1693
reference_id RHSA-2023:1693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1693
13
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7545
14
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7580
15
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7667
16
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7694
17
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7695
18
reference_url https://usn.ubuntu.com/5571-1/
reference_id USN-5571-1
reference_type
scores
url https://usn.ubuntu.com/5571-1/
fixed_packages
aliases CVE-2022-2625
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nuek-ypyh-b3dm
4
url VCID-nwfr-t7xn-zuae
vulnerability_id VCID-nwfr-t7xn-zuae
summary Role "pg_signal_backend" can signal certain superuser processesmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5870.json
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5870.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5870
reference_id
reference_type
scores
0
value 0.00621
scoring_system epss
scoring_elements 0.70153
published_at 2026-04-24T12:55:00Z
1
value 0.00621
scoring_system epss
scoring_elements 0.70075
published_at 2026-04-09T12:55:00Z
2
value 0.00621
scoring_system epss
scoring_elements 0.70098
published_at 2026-04-11T12:55:00Z
3
value 0.00621
scoring_system epss
scoring_elements 0.70083
published_at 2026-04-12T12:55:00Z
4
value 0.00621
scoring_system epss
scoring_elements 0.7007
published_at 2026-04-13T12:55:00Z
5
value 0.00621
scoring_system epss
scoring_elements 0.70113
published_at 2026-04-16T12:55:00Z
6
value 0.00621
scoring_system epss
scoring_elements 0.70123
published_at 2026-04-18T12:55:00Z
7
value 0.00621
scoring_system epss
scoring_elements 0.70102
published_at 2026-04-21T12:55:00Z
8
value 0.00621
scoring_system epss
scoring_elements 0.7002
published_at 2026-04-02T12:55:00Z
9
value 0.00621
scoring_system epss
scoring_elements 0.70035
published_at 2026-04-04T12:55:00Z
10
value 0.00621
scoring_system epss
scoring_elements 0.70011
published_at 2026-04-07T12:55:00Z
11
value 0.00621
scoring_system epss
scoring_elements 0.70059
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5870
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
8
reference_url https://www.postgresql.org/support/security/CVE-2023-5870/
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L']
1
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://www.postgresql.org/support/security/CVE-2023-5870/
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
reference_id 1056283
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2247170
reference_id 2247170
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2247170
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8
reference_id cpe:/a:redhat:advanced_cluster_security:3.74::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8
reference_id cpe:/a:redhat:advanced_cluster_security:4.1::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8
reference_id cpe:/a:redhat:advanced_cluster_security:4.2::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
reference_id cpe:/a:redhat:rhel_eus:9.0::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3
reference_id cpe:/a:redhat:rhel_software_collections:3
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7
reference_id cpe:/a:redhat:rhel_software_collections:3::el7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
35
reference_url https://access.redhat.com/security/cve/CVE-2023-5870
reference_id CVE-2023-5870
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/security/cve/CVE-2023-5870
36
reference_url https://security.gentoo.org/glsa/202408-06
reference_id GLSA-202408-06
reference_type
scores
url https://security.gentoo.org/glsa/202408-06
37
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7545
38
reference_url https://access.redhat.com/errata/RHSA-2023:7579
reference_id RHSA-2023:7579
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7579
39
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7580
40
reference_url https://access.redhat.com/errata/RHSA-2023:7581
reference_id RHSA-2023:7581
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7581
41
reference_url https://access.redhat.com/errata/RHSA-2023:7616
reference_id RHSA-2023:7616
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7616
42
reference_url https://access.redhat.com/errata/RHSA-2023:7656
reference_id RHSA-2023:7656
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7656
43
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7666
44
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7667
45
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7694
46
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7695
47
reference_url https://access.redhat.com/errata/RHSA-2023:7714
reference_id RHSA-2023:7714
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7714
48
reference_url https://access.redhat.com/errata/RHSA-2023:7770
reference_id RHSA-2023:7770
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7770
49
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7772
50
reference_url https://access.redhat.com/errata/RHSA-2023:7784
reference_id RHSA-2023:7784
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7784
51
reference_url https://access.redhat.com/errata/RHSA-2023:7785
reference_id RHSA-2023:7785
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7785
52
reference_url https://access.redhat.com/errata/RHSA-2023:7883
reference_id RHSA-2023:7883
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7883
53
reference_url https://access.redhat.com/errata/RHSA-2023:7884
reference_id RHSA-2023:7884
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7884
54
reference_url https://access.redhat.com/errata/RHSA-2023:7885
reference_id RHSA-2023:7885
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2023:7885
55
reference_url https://access.redhat.com/errata/RHSA-2024:0304
reference_id RHSA-2024:0304
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2024:0304
56
reference_url https://access.redhat.com/errata/RHSA-2024:0332
reference_id RHSA-2024:0332
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2024:0332
57
reference_url https://access.redhat.com/errata/RHSA-2024:0337
reference_id RHSA-2024:0337
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/
url https://access.redhat.com/errata/RHSA-2024:0337
58
reference_url https://usn.ubuntu.com/6538-1/
reference_id USN-6538-1
reference_type
scores
url https://usn.ubuntu.com/6538-1/
59
reference_url https://usn.ubuntu.com/6538-2/
reference_id USN-6538-2
reference_type
scores
url https://usn.ubuntu.com/6538-2/
60
reference_url https://usn.ubuntu.com/6570-1/
reference_id USN-6570-1
reference_type
scores
url https://usn.ubuntu.com/6570-1/
fixed_packages
aliases CVE-2023-5870
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nwfr-t7xn-zuae
5
url VCID-q5z4-wv12-1fh7
vulnerability_id VCID-q5z4-wv12-1fh7
summary Memory disclosure in aggregate function callsmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5868.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5868.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5868
reference_id
reference_type
scores
0
value 0.02718
scoring_system epss
scoring_elements 0.85963
published_at 2026-04-24T12:55:00Z
1
value 0.02718
scoring_system epss
scoring_elements 0.85952
published_at 2026-04-18T12:55:00Z
2
value 0.02718
scoring_system epss
scoring_elements 0.85943
published_at 2026-04-21T12:55:00Z
3
value 0.02718
scoring_system epss
scoring_elements 0.85874
published_at 2026-04-02T12:55:00Z
4
value 0.02718
scoring_system epss
scoring_elements 0.85891
published_at 2026-04-04T12:55:00Z
5
value 0.02718
scoring_system epss
scoring_elements 0.85894
published_at 2026-04-07T12:55:00Z
6
value 0.02718
scoring_system epss
scoring_elements 0.85913
published_at 2026-04-08T12:55:00Z
7
value 0.02718
scoring_system epss
scoring_elements 0.85923
published_at 2026-04-09T12:55:00Z
8
value 0.02718
scoring_system epss
scoring_elements 0.85937
published_at 2026-04-11T12:55:00Z
9
value 0.02718
scoring_system epss
scoring_elements 0.85935
published_at 2026-04-12T12:55:00Z
10
value 0.02718
scoring_system epss
scoring_elements 0.8593
published_at 2026-04-13T12:55:00Z
11
value 0.02718
scoring_system epss
scoring_elements 0.85949
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5868
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
8
reference_url https://www.postgresql.org/support/security/CVE-2023-5868/
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2023-5868/
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
reference_id 1056283
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2247168
reference_id 2247168
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2247168
11
reference_url https://security.gentoo.org/glsa/202408-06
reference_id GLSA-202408-06
reference_type
scores
url https://security.gentoo.org/glsa/202408-06
12
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7545
13
reference_url https://access.redhat.com/errata/RHSA-2023:7579
reference_id RHSA-2023:7579
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7579
14
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7580
15
reference_url https://access.redhat.com/errata/RHSA-2023:7581
reference_id RHSA-2023:7581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7581
16
reference_url https://access.redhat.com/errata/RHSA-2023:7616
reference_id RHSA-2023:7616
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7616
17
reference_url https://access.redhat.com/errata/RHSA-2023:7656
reference_id RHSA-2023:7656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7656
18
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7666
19
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7667
20
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7694
21
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7695
22
reference_url https://access.redhat.com/errata/RHSA-2023:7714
reference_id RHSA-2023:7714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7714
23
reference_url https://access.redhat.com/errata/RHSA-2023:7770
reference_id RHSA-2023:7770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7770
24
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7772
25
reference_url https://access.redhat.com/errata/RHSA-2023:7784
reference_id RHSA-2023:7784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7784
26
reference_url https://access.redhat.com/errata/RHSA-2023:7785
reference_id RHSA-2023:7785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7785
27
reference_url https://access.redhat.com/errata/RHSA-2023:7883
reference_id RHSA-2023:7883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7883
28
reference_url https://access.redhat.com/errata/RHSA-2023:7884
reference_id RHSA-2023:7884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7884
29
reference_url https://access.redhat.com/errata/RHSA-2023:7885
reference_id RHSA-2023:7885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7885
30
reference_url https://access.redhat.com/errata/RHSA-2024:0304
reference_id RHSA-2024:0304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0304
31
reference_url https://access.redhat.com/errata/RHSA-2024:0332
reference_id RHSA-2024:0332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0332
32
reference_url https://access.redhat.com/errata/RHSA-2024:0337
reference_id RHSA-2024:0337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0337
33
reference_url https://usn.ubuntu.com/6538-1/
reference_id USN-6538-1
reference_type
scores
url https://usn.ubuntu.com/6538-1/
34
reference_url https://usn.ubuntu.com/6538-2/
reference_id USN-6538-2
reference_type
scores
url https://usn.ubuntu.com/6538-2/
fixed_packages
aliases CVE-2023-5868
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5z4-wv12-1fh7
6
url VCID-u751-gq61-fbge
vulnerability_id VCID-u751-gq61-fbge
summary Client memory disclosure when connecting, with Kerberos, to modified servermore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41862.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41862.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41862
reference_id
reference_type
scores
0
value 0.0032
scoring_system epss
scoring_elements 0.55036
published_at 2026-04-24T12:55:00Z
1
value 0.0032
scoring_system epss
scoring_elements 0.55107
published_at 2026-04-08T12:55:00Z
2
value 0.0032
scoring_system epss
scoring_elements 0.55106
published_at 2026-04-09T12:55:00Z
3
value 0.0032
scoring_system epss
scoring_elements 0.55118
published_at 2026-04-11T12:55:00Z
4
value 0.0032
scoring_system epss
scoring_elements 0.55098
published_at 2026-04-12T12:55:00Z
5
value 0.0032
scoring_system epss
scoring_elements 0.55081
published_at 2026-04-13T12:55:00Z
6
value 0.0032
scoring_system epss
scoring_elements 0.55119
published_at 2026-04-16T12:55:00Z
7
value 0.0032
scoring_system epss
scoring_elements 0.55122
published_at 2026-04-18T12:55:00Z
8
value 0.0032
scoring_system epss
scoring_elements 0.55102
published_at 2026-04-21T12:55:00Z
9
value 0.0032
scoring_system epss
scoring_elements 0.55056
published_at 2026-04-02T12:55:00Z
10
value 0.0032
scoring_system epss
scoring_elements 0.55082
published_at 2026-04-04T12:55:00Z
11
value 0.0032
scoring_system epss
scoring_elements 0.55057
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41862
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41862
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.postgresql.org/about/news/postgresql-152-147-1310-1214-and-1119-released-2592/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-152-147-1310-1214-and-1119-released-2592/
5
reference_url https://www.postgresql.org/support/security/CVE-2022-41862/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N']
1
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T16:02:06Z/
url https://www.postgresql.org/support/security/CVE-2022-41862/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165722
reference_id 2165722
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T16:02:06Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2165722
7
reference_url https://security.netapp.com/advisory/ntap-20230427-0002/
reference_id ntap-20230427-0002
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T16:02:06Z/
url https://security.netapp.com/advisory/ntap-20230427-0002/
8
reference_url https://access.redhat.com/errata/RHSA-2023:1576
reference_id RHSA-2023:1576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1576
9
reference_url https://access.redhat.com/errata/RHSA-2023:1693
reference_id RHSA-2023:1693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1693
10
reference_url https://access.redhat.com/errata/RHSA-2023:4535
reference_id RHSA-2023:4535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4535
11
reference_url https://access.redhat.com/errata/RHSA-2023:6429
reference_id RHSA-2023:6429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6429
12
reference_url https://access.redhat.com/errata/RHSA-2023:7016
reference_id RHSA-2023:7016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7016
13
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7545
14
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7580
15
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7666
16
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7667
17
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7694
18
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7695
19
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7772
20
reference_url https://usn.ubuntu.com/5906-1/
reference_id USN-5906-1
reference_type
scores
url https://usn.ubuntu.com/5906-1/
fixed_packages
aliases CVE-2022-41862
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u751-gq61-fbge
7
url VCID-y871-sfhf-a7by
vulnerability_id VCID-y871-sfhf-a7by
summary Extension script @substitutions@ within quoting allow SQL injectionmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39417.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39417
reference_id
reference_type
scores
0
value 0.00659
scoring_system epss
scoring_elements 0.71012
published_at 2026-04-02T12:55:00Z
1
value 0.00659
scoring_system epss
scoring_elements 0.71005
published_at 2026-04-07T12:55:00Z
2
value 0.00659
scoring_system epss
scoring_elements 0.71047
published_at 2026-04-08T12:55:00Z
3
value 0.00659
scoring_system epss
scoring_elements 0.71062
published_at 2026-04-09T12:55:00Z
4
value 0.00659
scoring_system epss
scoring_elements 0.71085
published_at 2026-04-11T12:55:00Z
5
value 0.00659
scoring_system epss
scoring_elements 0.7107
published_at 2026-04-12T12:55:00Z
6
value 0.00659
scoring_system epss
scoring_elements 0.71053
published_at 2026-04-13T12:55:00Z
7
value 0.00659
scoring_system epss
scoring_elements 0.711
published_at 2026-04-16T12:55:00Z
8
value 0.00659
scoring_system epss
scoring_elements 0.71107
published_at 2026-04-18T12:55:00Z
9
value 0.00659
scoring_system epss
scoring_elements 0.7103
published_at 2026-04-04T12:55:00Z
10
value 0.00677
scoring_system epss
scoring_elements 0.71572
published_at 2026-04-24T12:55:00Z
11
value 0.00677
scoring_system epss
scoring_elements 0.71521
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39417
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.postgresql.org/about/news/postgresql-154-149-1312-1216-1121-and-postgresql-16-beta-3-released-2689/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-154-149-1312-1216-1121-and-postgresql-16-beta-3-released-2689/
8
reference_url https://www.postgresql.org/support/security/CVE-2023-39417/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2023-39417/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228111
reference_id 2228111
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2228111
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8
reference_id cpe:/a:redhat:advanced_cluster_security:3.74::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8
reference_id cpe:/a:redhat:advanced_cluster_security:4.1::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8
reference_id cpe:/a:redhat:advanced_cluster_security:4.2::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
reference_id cpe:/a:redhat:rhel_eus:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
reference_id cpe:/a:redhat:rhel_eus:9.0::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
reference_id cpe:/a:redhat:rhel_eus:9.2::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3
reference_id cpe:/a:redhat:rhel_software_collections:3
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7
reference_id cpe:/a:redhat:rhel_software_collections:3::el7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
reference_id cpe:/a:redhat:rhel_tus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
reference_id cpe:/a:redhat:rhel_tus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
33
reference_url https://access.redhat.com/security/cve/CVE-2023-39417
reference_id CVE-2023-39417
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/security/cve/CVE-2023-39417
34
reference_url https://www.postgresql.org/support/security/CVE-2023-39417
reference_id CVE-2023-39417
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://www.postgresql.org/support/security/CVE-2023-39417
35
reference_url https://access.redhat.com/errata/RHSA-2023:7545
reference_id RHSA-2023:7545
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7545
36
reference_url https://access.redhat.com/errata/RHSA-2023:7579
reference_id RHSA-2023:7579
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7579
37
reference_url https://access.redhat.com/errata/RHSA-2023:7580
reference_id RHSA-2023:7580
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7580
38
reference_url https://access.redhat.com/errata/RHSA-2023:7581
reference_id RHSA-2023:7581
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7581
39
reference_url https://access.redhat.com/errata/RHSA-2023:7616
reference_id RHSA-2023:7616
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7616
40
reference_url https://access.redhat.com/errata/RHSA-2023:7656
reference_id RHSA-2023:7656
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7656
41
reference_url https://access.redhat.com/errata/RHSA-2023:7666
reference_id RHSA-2023:7666
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7666
42
reference_url https://access.redhat.com/errata/RHSA-2023:7667
reference_id RHSA-2023:7667
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7667
43
reference_url https://access.redhat.com/errata/RHSA-2023:7694
reference_id RHSA-2023:7694
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7694
44
reference_url https://access.redhat.com/errata/RHSA-2023:7695
reference_id RHSA-2023:7695
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7695
45
reference_url https://access.redhat.com/errata/RHSA-2023:7714
reference_id RHSA-2023:7714
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7714
46
reference_url https://access.redhat.com/errata/RHSA-2023:7770
reference_id RHSA-2023:7770
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7770
47
reference_url https://access.redhat.com/errata/RHSA-2023:7772
reference_id RHSA-2023:7772
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7772
48
reference_url https://access.redhat.com/errata/RHSA-2023:7784
reference_id RHSA-2023:7784
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7784
49
reference_url https://access.redhat.com/errata/RHSA-2023:7785
reference_id RHSA-2023:7785
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7785
50
reference_url https://access.redhat.com/errata/RHSA-2023:7883
reference_id RHSA-2023:7883
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7883
51
reference_url https://access.redhat.com/errata/RHSA-2023:7884
reference_id RHSA-2023:7884
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7884
52
reference_url https://access.redhat.com/errata/RHSA-2023:7885
reference_id RHSA-2023:7885
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2023:7885
53
reference_url https://access.redhat.com/errata/RHSA-2024:0304
reference_id RHSA-2024:0304
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2024:0304
54
reference_url https://access.redhat.com/errata/RHSA-2024:0332
reference_id RHSA-2024:0332
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2024:0332
55
reference_url https://access.redhat.com/errata/RHSA-2024:0337
reference_id RHSA-2024:0337
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/
url https://access.redhat.com/errata/RHSA-2024:0337
56
reference_url https://usn.ubuntu.com/6296-1/
reference_id USN-6296-1
reference_type
scores
url https://usn.ubuntu.com/6296-1/
57
reference_url https://usn.ubuntu.com/6366-1/
reference_id USN-6366-1
reference_type
scores
url https://usn.ubuntu.com/6366-1/
fixed_packages
aliases CVE-2023-39417
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y871-sfhf-a7by
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/postgresql@13.13-1%3Farch=el9_0