Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1035789?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1035789?format=api", "purl": "pkg:deb/debian/postgresql-9.4@9.4.12-0%2Bdeb8u1~bpo7%2B1", "type": "deb", "namespace": "debian", "name": "postgresql-9.4", "version": "9.4.12-0+deb8u1~bpo7+1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "9.4.18-0+deb8u1", "latest_non_vulnerable_version": "9.4.18-0+deb8u1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3537?format=api", "vulnerability_id": "VCID-3qrq-rc38-13ep", "summary": "empty password accepted in some authentication methodsmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7546.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7546.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7546", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.96868", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.96935", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.96916", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.96921", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.96924", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.96928", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.96875", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.9688", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.96884", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.96893", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.96894", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.96897", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.96898", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.96899", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.96907", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.96911", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.96913", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.33122", "scoring_system": "epss", "scoring_elements": "0.96914", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/2017-08-10-security-update-release-1772/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/2017-08-10-security-update-release-1772/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2017-7546/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2017-7546/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477184", "reference_id": "1477184", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477184" }, { "reference_url": "https://security.archlinux.org/ASA-201709-2", "reference_id": "ASA-201709-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201709-2" }, { "reference_url": "https://security.archlinux.org/AVG-381", "reference_id": "AVG-381", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-381" }, { "reference_url": "https://security.gentoo.org/glsa/201710-06", "reference_id": "GLSA-201710-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2677", "reference_id": "RHSA-2017:2677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2678", "reference_id": "RHSA-2017:2678", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2678" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2728", "reference_id": "RHSA-2017:2728", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2728" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2860", "reference_id": "RHSA-2017:2860", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2860" }, { "reference_url": "https://usn.ubuntu.com/3390-1/", "reference_id": "USN-3390-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3390-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035790?format=api", "purl": "pkg:deb/debian/postgresql-9.4@9.4.18-0%2Bdeb8u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/postgresql-9.4@9.4.18-0%252Bdeb8u1" } ], "aliases": [ "CVE-2017-7546" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3qrq-rc38-13ep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3539?format=api", "vulnerability_id": "VCID-45vk-2xsq-cffk", "summary": "libpq ignores PGREQUIRESSL environment variablemore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7485.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7485.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7485", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72177", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72329", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72301", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72182", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72203", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72178", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72215", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72227", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.7225", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72234", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.7222", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72263", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72273", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.7226", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72305", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72311", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0071", "scoring_system": "epss", "scoring_elements": "0.72314", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00926", "scoring_system": "epss", "scoring_elements": "0.76187", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2017-7485/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2017-7485/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1448086", "reference_id": "1448086", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1448086" }, { "reference_url": "https://security.archlinux.org/ASA-201705-24", "reference_id": "ASA-201705-24", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-24" }, { "reference_url": "https://security.archlinux.org/AVG-280", "reference_id": "AVG-280", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-280" }, { "reference_url": "https://security.gentoo.org/glsa/201710-06", "reference_id": "GLSA-201710-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1677", "reference_id": "RHSA-2017:1677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1678", "reference_id": "RHSA-2017:1678", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1678" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1838", "reference_id": "RHSA-2017:1838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2425", "reference_id": "RHSA-2017:2425", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2425" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035790?format=api", "purl": "pkg:deb/debian/postgresql-9.4@9.4.18-0%2Bdeb8u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/postgresql-9.4@9.4.18-0%252Bdeb8u1" } ], "aliases": [ "CVE-2017-7485" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45vk-2xsq-cffk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3540?format=api", "vulnerability_id": "VCID-723y-bsbd-6kfd", "summary": "selectivity estimators bypass SELECT privilege checksmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7484.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7484.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7484", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01111", "scoring_system": "epss", "scoring_elements": "0.78171", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.79796", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.79608", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.79651", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.79659", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.7968", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.79664", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.79656", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.79685", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.7978", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.79614", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.79637", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.79623", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01325", "scoring_system": "epss", "scoring_elements": "0.79976", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01325", "scoring_system": "epss", "scoring_elements": "0.79992", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01325", "scoring_system": "epss", "scoring_elements": "0.80004", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01325", "scoring_system": "epss", "scoring_elements": "0.7997", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2017-7484/", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2017-7484/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1448078", "reference_id": "1448078", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1448078" }, { "reference_url": "https://security.archlinux.org/ASA-201705-23", "reference_id": "ASA-201705-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-23" }, { "reference_url": "https://security.archlinux.org/AVG-272", "reference_id": "AVG-272", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-272" }, { "reference_url": "https://security.gentoo.org/glsa/201710-06", "reference_id": "GLSA-201710-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1677", "reference_id": "RHSA-2017:1677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1678", "reference_id": "RHSA-2017:1678", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1678" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1838", "reference_id": "RHSA-2017:1838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1983", "reference_id": "RHSA-2017:1983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2425", "reference_id": "RHSA-2017:2425", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2425" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035790?format=api", "purl": "pkg:deb/debian/postgresql-9.4@9.4.18-0%2Bdeb8u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/postgresql-9.4@9.4.18-0%252Bdeb8u1" } ], "aliases": [ "CVE-2017-7484" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-723y-bsbd-6kfd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3536?format=api", "vulnerability_id": "VCID-csfh-831q-rqfv", "summary": "pg_user_mappings view discloses passwords to users lacking server privilegesmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7547.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7547.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7547", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00991", "scoring_system": "epss", "scoring_elements": "0.76978", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00991", "scoring_system": "epss", "scoring_elements": "0.76965", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00991", "scoring_system": "epss", "scoring_elements": "0.76958", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01025", "scoring_system": "epss", "scoring_elements": "0.77391", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01025", "scoring_system": "epss", "scoring_elements": "0.77413", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01025", "scoring_system": "epss", "scoring_elements": "0.77364", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.7813", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78126", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.7816", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78148", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.7807", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78079", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78108", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78091", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78117", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01109", "scoring_system": "epss", "scoring_elements": "0.78122", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01444", "scoring_system": "epss", "scoring_elements": "0.80778", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01444", "scoring_system": "epss", "scoring_elements": "0.80777", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:N" }, { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/2017-08-10-security-update-release-1772/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/2017-08-10-security-update-release-1772/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2017-7547/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2017-7547/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477185", "reference_id": "1477185", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477185" }, { "reference_url": "https://security.archlinux.org/ASA-201709-2", "reference_id": "ASA-201709-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201709-2" }, { "reference_url": "https://security.archlinux.org/AVG-381", "reference_id": "AVG-381", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-381" }, { "reference_url": "https://security.gentoo.org/glsa/201710-06", "reference_id": "GLSA-201710-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2677", "reference_id": "RHSA-2017:2677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2678", "reference_id": "RHSA-2017:2678", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2678" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2728", "reference_id": "RHSA-2017:2728", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2728" }, { "reference_url": "https://usn.ubuntu.com/3390-1/", "reference_id": "USN-3390-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3390-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035790?format=api", "purl": "pkg:deb/debian/postgresql-9.4@9.4.18-0%2Bdeb8u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/postgresql-9.4@9.4.18-0%252Bdeb8u1" } ], "aliases": [ "CVE-2017-7547" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-csfh-831q-rqfv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3533?format=api", "vulnerability_id": "VCID-d362-bmcf-3kdz", "summary": "Memory disclosure in JSON functionsmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15098.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15098.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15098", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75049", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75236", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75139", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75128", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75167", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75171", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75174", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75184", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75212", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75052", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75082", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75058", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75092", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75103", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75125", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75104", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75094", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75132", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15098" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:P" }, { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.debian.org/security/2017/dsa-4027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-4027" }, { "reference_url": "https://www.debian.org/security/2017/dsa-4028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-4028" }, { "reference_url": "https://www.postgresql.org/about/news/1801/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/1801/" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/" }, { "reference_url": "https://www.postgresql.org/support/security/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/support/security/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2017-15098/", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2017-15098/" }, { "reference_url": "http://www.securityfocus.com/bid/101781", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101781" }, { "reference_url": "http://www.securitytracker.com/id/1039752", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1039752" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508820", "reference_id": "1508820", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508820" }, { "reference_url": "https://security.archlinux.org/ASA-201711-17", "reference_id": "ASA-201711-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201711-17" }, { "reference_url": "https://security.archlinux.org/ASA-201711-18", "reference_id": "ASA-201711-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201711-18" }, { "reference_url": "https://security.archlinux.org/AVG-485", "reference_id": "AVG-485", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-485" }, { "reference_url": "https://security.archlinux.org/AVG-486", "reference_id": "AVG-486", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-486" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15098", "reference_id": "CVE-2017-15098", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15098" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2511", "reference_id": "RHSA-2018:2511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2566", "reference_id": "RHSA-2018:2566", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2566" }, { "reference_url": "https://usn.ubuntu.com/3479-1/", "reference_id": "USN-3479-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3479-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035790?format=api", "purl": "pkg:deb/debian/postgresql-9.4@9.4.18-0%2Bdeb8u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/postgresql-9.4@9.4.18-0%252Bdeb8u1" } ], "aliases": [ "CVE-2017-15098" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d362-bmcf-3kdz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3538?format=api", "vulnerability_id": "VCID-qn5k-y64c-7ffc", "summary": "pg_user_mappings view discloses foreign server passwordsmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7486.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7486.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7486", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04182", "scoring_system": "epss", "scoring_elements": "0.88653", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04182", "scoring_system": "epss", "scoring_elements": "0.88777", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04182", "scoring_system": "epss", "scoring_elements": "0.88738", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04182", "scoring_system": "epss", "scoring_elements": "0.88749", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04182", "scoring_system": "epss", "scoring_elements": "0.88765", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04182", "scoring_system": "epss", "scoring_elements": "0.88662", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04182", "scoring_system": "epss", "scoring_elements": "0.88679", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04182", "scoring_system": "epss", "scoring_elements": "0.8868", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04182", "scoring_system": "epss", "scoring_elements": "0.88697", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04182", "scoring_system": "epss", "scoring_elements": "0.88703", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04182", "scoring_system": "epss", "scoring_elements": "0.88715", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04182", "scoring_system": "epss", "scoring_elements": "0.88709", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04182", "scoring_system": "epss", "scoring_elements": "0.88722", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04182", "scoring_system": "epss", "scoring_elements": "0.8872", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04182", "scoring_system": "epss", "scoring_elements": "0.88718", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04182", "scoring_system": "epss", "scoring_elements": "0.88733", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04182", "scoring_system": "epss", "scoring_elements": "0.88739", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2017-7486/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2017-7486/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1448089", "reference_id": "1448089", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1448089" }, { "reference_url": "https://security.archlinux.org/ASA-201705-23", "reference_id": "ASA-201705-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-23" }, { "reference_url": "https://security.archlinux.org/AVG-272", "reference_id": "AVG-272", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-272" }, { "reference_url": "https://security.gentoo.org/glsa/201710-06", "reference_id": "GLSA-201710-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1677", "reference_id": "RHSA-2017:1677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1678", "reference_id": "RHSA-2017:1678", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1678" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1838", "reference_id": "RHSA-2017:1838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1983", "reference_id": "RHSA-2017:1983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2425", "reference_id": "RHSA-2017:2425", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2425" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035790?format=api", "purl": "pkg:deb/debian/postgresql-9.4@9.4.18-0%2Bdeb8u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/postgresql-9.4@9.4.18-0%252Bdeb8u1" } ], "aliases": [ "CVE-2017-7486" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qn5k-y64c-7ffc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3535?format=api", "vulnerability_id": "VCID-um7d-pzhb-n3c9", "summary": "lo_put() function ignores ACLsmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7548.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7548.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7548", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73074", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.7317", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73178", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73168", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73083", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73104", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73078", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73114", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73127", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73152", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73125", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00749", "scoring_system": "epss", "scoring_elements": "0.73132", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01125", "scoring_system": "epss", "scoring_elements": "0.78408", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01125", "scoring_system": "epss", "scoring_elements": "0.78366", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01125", "scoring_system": "epss", "scoring_elements": "0.78391", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0137", "scoring_system": "epss", "scoring_elements": "0.80293", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0137", "scoring_system": "epss", "scoring_elements": "0.80271", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0137", "scoring_system": "epss", "scoring_elements": "0.80277", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:C/I:C/A:N" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2017-7548/", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2017-7548/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477187", "reference_id": "1477187", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477187" }, { "reference_url": "https://security.archlinux.org/ASA-201709-2", "reference_id": "ASA-201709-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201709-2" }, { "reference_url": "https://security.archlinux.org/AVG-381", "reference_id": "AVG-381", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-381" }, { "reference_url": "https://security.gentoo.org/glsa/201710-06", "reference_id": "GLSA-201710-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2677", "reference_id": "RHSA-2017:2677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2678", "reference_id": "RHSA-2017:2678", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2678" }, { "reference_url": "https://usn.ubuntu.com/3390-1/", "reference_id": "USN-3390-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3390-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035790?format=api", "purl": "pkg:deb/debian/postgresql-9.4@9.4.18-0%2Bdeb8u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/postgresql-9.4@9.4.18-0%252Bdeb8u1" } ], "aliases": [ "CVE-2017-7548" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-um7d-pzhb-n3c9" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3542?format=api", "vulnerability_id": "VCID-8bu8-zpfv-8bgg", "summary": "Exceptional database and role names could enable escalation to superusermore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5424.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5424.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5424", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82076", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82281", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82236", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82258", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82088", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82105", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82132", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82139", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82158", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82149", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82181", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82182", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82184", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82207", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82218", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82221", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5424" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/2016-08-11-security-update-release-1688/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/2016-08-11-security-update-release-1688/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2016-5424/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2016-5424/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1364002", "reference_id": "1364002", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1364002" }, { "reference_url": "https://security.gentoo.org/glsa/201701-33", "reference_id": "GLSA-201701-33", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-33" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1781", "reference_id": "RHSA-2016:1781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1820", "reference_id": "RHSA-2016:1820", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1820" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1821", "reference_id": "RHSA-2016:1821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2606", "reference_id": "RHSA-2016:2606", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2606" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2425", "reference_id": "RHSA-2017:2425", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2425" }, { "reference_url": "https://usn.ubuntu.com/3066-1/", "reference_id": "USN-3066-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3066-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035789?format=api", "purl": "pkg:deb/debian/postgresql-9.4@9.4.12-0%2Bdeb8u1~bpo7%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3qrq-rc38-13ep" }, { "vulnerability": "VCID-45vk-2xsq-cffk" }, { "vulnerability": "VCID-723y-bsbd-6kfd" }, { "vulnerability": "VCID-csfh-831q-rqfv" }, { "vulnerability": "VCID-d362-bmcf-3kdz" }, { "vulnerability": "VCID-qn5k-y64c-7ffc" }, { "vulnerability": "VCID-um7d-pzhb-n3c9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/postgresql-9.4@9.4.12-0%252Bdeb8u1~bpo7%252B1" } ], "aliases": [ "CVE-2016-5424" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8bu8-zpfv-8bgg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3543?format=api", "vulnerability_id": "VCID-9b6v-1bt1-dfgy", "summary": "Certain nested CASE/WHEN expressions can crash servermore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5423.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5423.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5423", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.034", "scoring_system": "epss", "scoring_elements": "0.87365", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.034", "scoring_system": "epss", "scoring_elements": "0.875", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.034", "scoring_system": "epss", "scoring_elements": "0.87468", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.034", "scoring_system": "epss", "scoring_elements": "0.87482", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.034", "scoring_system": "epss", "scoring_elements": "0.87374", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.034", "scoring_system": "epss", "scoring_elements": "0.8739", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.034", "scoring_system": "epss", "scoring_elements": "0.87389", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.034", "scoring_system": "epss", "scoring_elements": "0.87408", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.034", "scoring_system": "epss", "scoring_elements": "0.87415", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.034", "scoring_system": "epss", "scoring_elements": "0.87428", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.034", "scoring_system": "epss", "scoring_elements": "0.87423", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.034", "scoring_system": "epss", "scoring_elements": "0.87419", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.034", "scoring_system": "epss", "scoring_elements": "0.87433", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.034", "scoring_system": "epss", "scoring_elements": "0.87436", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.034", "scoring_system": "epss", "scoring_elements": "0.87431", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.034", "scoring_system": "epss", "scoring_elements": "0.87447", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.034", "scoring_system": "epss", "scoring_elements": "0.87454", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/2016-08-11-security-update-release-1688/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/2016-08-11-security-update-release-1688/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2016-5423/", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2016-5423/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1364001", "reference_id": "1364001", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1364001" }, { "reference_url": "https://security.gentoo.org/glsa/201701-33", "reference_id": "GLSA-201701-33", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-33" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1781", "reference_id": "RHSA-2016:1781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1820", "reference_id": "RHSA-2016:1820", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1820" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1821", "reference_id": "RHSA-2016:1821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2606", "reference_id": "RHSA-2016:2606", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2606" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2425", "reference_id": "RHSA-2017:2425", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2425" }, { "reference_url": "https://usn.ubuntu.com/3066-1/", "reference_id": "USN-3066-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3066-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035789?format=api", "purl": "pkg:deb/debian/postgresql-9.4@9.4.12-0%2Bdeb8u1~bpo7%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3qrq-rc38-13ep" }, { "vulnerability": "VCID-45vk-2xsq-cffk" }, { "vulnerability": "VCID-723y-bsbd-6kfd" }, { "vulnerability": "VCID-csfh-831q-rqfv" }, { "vulnerability": "VCID-d362-bmcf-3kdz" }, { "vulnerability": "VCID-qn5k-y64c-7ffc" }, { "vulnerability": "VCID-um7d-pzhb-n3c9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/postgresql-9.4@9.4.12-0%252Bdeb8u1~bpo7%252B1" } ], "aliases": [ "CVE-2016-5423" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9b6v-1bt1-dfgy" } ], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/postgresql-9.4@9.4.12-0%252Bdeb8u1~bpo7%252B1" }