{"url":"http://public2.vulnerablecode.io/api/packages/122576?format=json","purl":"pkg:rpm/redhat/postgresql92-postgresql@9.2.7-1.1?arch=el6","type":"rpm","namespace":"redhat","name":"postgresql92-postgresql","version":"9.2.7-1.1","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34402?format=json","vulnerability_id":"VCID-6wud-ngbu-rqch","summary":"Multiple vulnerabilities have been found in PostgreSQL, the worst\n    of which may allow remote Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2669.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2669.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2669","reference_id":"","reference_type":"","scores":[{"value":"0.01207","scoring_system":"epss","scoring_elements":"0.79143","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01207","scoring_system":"epss","scoring_elements":"0.79094","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01207","scoring_system":"epss","scoring_elements":"0.79092","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01207","scoring_system":"epss","scoring_elements":"0.79107","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01207","scoring_system":"epss","scoring_elements":"0.78935","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01207","scoring_system":"epss","scoring_elements":"0.7896","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01207","scoring_system":"epss","scoring_elements":"0.78966","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01207","scoring_system":"epss","scoring_elements":"0.7899","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01207","scoring_system":"epss","scoring_elements":"0.78975","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01207","scoring_system":"epss","scoring_elements":"0.78965","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01207","scoring_system":"epss","scoring_elements":"0.78993","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01207","scoring_system":"epss","scoring_elements":"0.78989","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01207","scoring_system":"epss","scoring_elements":"0.7902","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01207","scoring_system":"epss","scoring_elements":"0.79026","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01207","scoring_system":"epss","scoring_elements":"0.79042","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01207","scoring_system":"epss","scoring_elements":"0.79057","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01207","scoring_system":"epss","scoring_elements":"0.79078","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01707","scoring_system":"epss","scoring_elements":"0.82262","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01707","scoring_system":"epss","scoring_elements":"0.82281","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01707","scoring_system":"epss","scoring_elements":"0.82249","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1082154","reference_id":"1082154","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1082154"},{"reference_url":"https://security.gentoo.org/glsa/201408-15","reference_id":"GLSA-201408-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0221","reference_id":"RHSA-2014:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0469","reference_id":"RHSA-2014:0469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0469"}],"fixed_packages":[],"aliases":["CVE-2014-2669"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6wud-ngbu-rqch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3609?format=json","vulnerability_id":"VCID-8cbh-gwwy-n3eq","summary":"Potential buffer overruns due to integer overflow in size calculations.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0064.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0064.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0064","reference_id":"","reference_type":"","scores":[{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91322","published_at":"2026-05-14T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91177","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91182","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91191","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91198","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91211","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91218","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91224","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91228","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91252","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91251","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91253","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91263","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91262","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91277","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91294","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91305","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91303","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06674","scoring_system":"epss","scoring_elements":"0.91313","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2014-0064/","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2014-0064/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065230","reference_id":"1065230","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065230"},{"reference_url":"https://security.gentoo.org/glsa/201408-15","reference_id":"GLSA-201408-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0211","reference_id":"RHSA-2014:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0221","reference_id":"RHSA-2014:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0249","reference_id":"RHSA-2014:0249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0469","reference_id":"RHSA-2014:0469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0469"},{"reference_url":"https://usn.ubuntu.com/2120-1/","reference_id":"USN-2120-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2120-1/"}],"fixed_packages":[],"aliases":["CVE-2014-0064"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8cbh-gwwy-n3eq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3612?format=json","vulnerability_id":"VCID-8j4f-u2tq-1qev","summary":"Privilege escalation via calls to validator functions.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0061.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0061.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0061","reference_id":"","reference_type":"","scores":[{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73688","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73698","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73722","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74431","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74452","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74432","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74423","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.7446","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74469","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74494","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74502","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.745","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74529","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74555","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74522","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74544","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74598","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74381","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74413","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2014-0061/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2014-0061/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065220","reference_id":"1065220","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065220"},{"reference_url":"https://security.gentoo.org/glsa/201408-15","reference_id":"GLSA-201408-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0211","reference_id":"RHSA-2014:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0221","reference_id":"RHSA-2014:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0249","reference_id":"RHSA-2014:0249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0469","reference_id":"RHSA-2014:0469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0469"},{"reference_url":"https://usn.ubuntu.com/2120-1/","reference_id":"USN-2120-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2120-1/"}],"fixed_packages":[],"aliases":["CVE-2014-0061"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8j4f-u2tq-1qev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86285?format=json","vulnerability_id":"VCID-g4zx-p5dt-cba8","summary":"CFME: multiple authorization bypass vulnerabilities in CatalogController","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0078.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0078.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0078","reference_id":"","reference_type":"","scores":[{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.6992","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.69932","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.69946","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.69924","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.69971","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.69988","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70011","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.69996","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.69983","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70026","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70035","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70017","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70068","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70076","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70075","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70051","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70093","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70124","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70092","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.7012","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00619","scoring_system":"epss","scoring_elements":"0.70169","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0078"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1064556","reference_id":"1064556","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1064556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0469","reference_id":"RHSA-2014:0469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0469"}],"fixed_packages":[],"aliases":["CVE-2014-0078"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g4zx-p5dt-cba8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3611?format=json","vulnerability_id":"VCID-kbgc-w2jw-auh8","summary":"Race condition in CREATE INDEX allows for privilege escalation.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0062.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0062.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0062","reference_id":"","reference_type":"","scores":[{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59724","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59489","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59562","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59607","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.5962","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59639","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59622","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59603","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59636","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59643","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59626","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59596","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59616","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59563","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59611","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.5967","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59627","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00382","scoring_system":"epss","scoring_elements":"0.59654","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2014-0062/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2014-0062/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065222","reference_id":"1065222","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065222"},{"reference_url":"https://security.gentoo.org/glsa/201408-15","reference_id":"GLSA-201408-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0211","reference_id":"RHSA-2014:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0221","reference_id":"RHSA-2014:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0249","reference_id":"RHSA-2014:0249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0469","reference_id":"RHSA-2014:0469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0469"},{"reference_url":"https://usn.ubuntu.com/2120-1/","reference_id":"USN-2120-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2120-1/"}],"fixed_packages":[],"aliases":["CVE-2014-0062"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kbgc-w2jw-auh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6869?format=json","vulnerability_id":"VCID-nf8s-2aaa-17fw","summary":"Incomplete fix to CVE-2013-0155 (Unsafe Query Generation Risk)\nDue to the way that `Rack::Request` and `Rails::Request` interact, it is possible for a 3rd party or custom rack middleware to parse the parameters insecurely and store them in the same key that Rails uses for its own parameters. In the event that happens the application will receive unsafe parameters and could be vulnerable to the earlier vulnerability: it would be possible for an attacker to issue unexpected database queries with `IS NULL` or empty where clauses.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1794.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2013-1794.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0008.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0008.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0469.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0469.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6417.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6417","reference_id":"","reference_type":"","scores":[{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66673","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66512","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.6653","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66515","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66539","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66556","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66574","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66618","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66592","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66611","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66402","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66441","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66468","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66439","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66487","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66501","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.6652","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66508","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00512","scoring_system":"epss","scoring_elements":"0.66477","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4491"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6417"},{"reference_url":"http://seclists.org/oss-sec/2013/q4/403","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/oss-sec/2013/q4/403"},{"reference_url":"https://github.com/rails/rails","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rails/rails"},{"reference_url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-6417.yml","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-6417.yml"},{"reference_url":"https://groups.google.com/forum/message/raw?msg=ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://groups.google.com/forum/message/raw?msg=ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ"},{"reference_url":"https://groups.google.com/forum/#!topic/ruby-security-ann/niK4drpSHT4","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://groups.google.com/forum/#!topic/ruby-security-ann/niK4drpSHT4"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-6417","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-6417"},{"reference_url":"https://puppet.com/security/cve/cve-2013-6417","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://puppet.com/security/cve/cve-2013-6417"},{"reference_url":"https://web.archive.org/web/20160806051251/https://puppet.com/security/cve/cve-2013-6417","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20160806051251/https://puppet.com/security/cve/cve-2013-6417"},{"reference_url":"http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released"},{"reference_url":"http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/","reference_id":"","reference_type":"","scores":[],"url":"http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/"},{"reference_url":"http://www.debian.org/security/2014/dsa-2888","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2014/dsa-2888"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1036409","reference_id":"1036409","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1036409"},{"reference_url":"https://github.com/advisories/GHSA-wpw7-wxjm-cw8r","reference_id":"GHSA-wpw7-wxjm-cw8r","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-wpw7-wxjm-cw8r"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1794","reference_id":"RHSA-2013:1794","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1794"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0008","reference_id":"RHSA-2014:0008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0469","reference_id":"RHSA-2014:0469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0469"}],"fixed_packages":[],"aliases":["CVE-2013-6417","GHSA-wpw7-wxjm-cw8r","OSV-100527"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nf8s-2aaa-17fw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86286?format=json","vulnerability_id":"VCID-nrjc-ndqj-wkak","summary":"CFME: ReportController SQL injection","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0137.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0137.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0137","reference_id":"","reference_type":"","scores":[{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.59923","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.59999","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60024","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.59994","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60044","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60058","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60079","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60063","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60046","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60092","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60078","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60048","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60065","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60012","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60059","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60117","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60076","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60104","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0039","scoring_system":"epss","scoring_elements":"0.60166","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0137"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1076688","reference_id":"1076688","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1076688"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0469","reference_id":"RHSA-2014:0469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0469"}],"fixed_packages":[],"aliases":["CVE-2014-0137"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nrjc-ndqj-wkak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3608?format=json","vulnerability_id":"VCID-nz16-gzhk-h3c1","summary":"Potential buffer overruns of fixed-size buffers.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0065.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0065.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0065","reference_id":"","reference_type":"","scores":[{"value":"0.03867","scoring_system":"epss","scoring_elements":"0.88174","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03867","scoring_system":"epss","scoring_elements":"0.8819","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03867","scoring_system":"epss","scoring_elements":"0.88166","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04053","scoring_system":"epss","scoring_elements":"0.88515","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04053","scoring_system":"epss","scoring_elements":"0.88526","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04053","scoring_system":"epss","scoring_elements":"0.88518","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04053","scoring_system":"epss","scoring_elements":"0.88532","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04053","scoring_system":"epss","scoring_elements":"0.88528","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04053","scoring_system":"epss","scoring_elements":"0.88525","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04053","scoring_system":"epss","scoring_elements":"0.88542","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04053","scoring_system":"epss","scoring_elements":"0.88547","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04053","scoring_system":"epss","scoring_elements":"0.88546","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04053","scoring_system":"epss","scoring_elements":"0.88558","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04053","scoring_system":"epss","scoring_elements":"0.88574","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04053","scoring_system":"epss","scoring_elements":"0.88588","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04053","scoring_system":"epss","scoring_elements":"0.88586","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04053","scoring_system":"epss","scoring_elements":"0.88599","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04053","scoring_system":"epss","scoring_elements":"0.88627","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04053","scoring_system":"epss","scoring_elements":"0.8849","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04053","scoring_system":"epss","scoring_elements":"0.88508","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2014-0065/","reference_id":"","reference_type":"","scores":[{"value":"0.0","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2014-0065/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065235","reference_id":"1065235","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065235"},{"reference_url":"https://security.gentoo.org/glsa/201408-15","reference_id":"GLSA-201408-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0211","reference_id":"RHSA-2014:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0221","reference_id":"RHSA-2014:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0249","reference_id":"RHSA-2014:0249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0469","reference_id":"RHSA-2014:0469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0469"},{"reference_url":"https://usn.ubuntu.com/2120-1/","reference_id":"USN-2120-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2120-1/"}],"fixed_packages":[],"aliases":["CVE-2014-0065"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nz16-gzhk-h3c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3607?format=json","vulnerability_id":"VCID-pvxg-byvu-pbec","summary":"Potential null pointer dereference crash when crypt(3) returns NULL.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0066.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0066.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0066","reference_id":"","reference_type":"","scores":[{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80401","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80375","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80381","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.8094","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80956","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80942","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80933","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80969","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.8097","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80972","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80993","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.81001","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.81013","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.81026","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.81048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.8107","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.81065","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.81084","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.81125","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80903","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80931","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2014-0066/","reference_id":"","reference_type":"","scores":[{"value":"0.0","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2014-0066/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065236","reference_id":"1065236","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065236"},{"reference_url":"https://security.gentoo.org/glsa/201408-15","reference_id":"GLSA-201408-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0211","reference_id":"RHSA-2014:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0221","reference_id":"RHSA-2014:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0249","reference_id":"RHSA-2014:0249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0469","reference_id":"RHSA-2014:0469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0469"},{"reference_url":"https://usn.ubuntu.com/2120-1/","reference_id":"USN-2120-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2120-1/"}],"fixed_packages":[],"aliases":["CVE-2014-0066"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pvxg-byvu-pbec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3610?format=json","vulnerability_id":"VCID-reab-s9cu-yudn","summary":"Potential buffer overruns in datetime input/output.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0063.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0063.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0063","reference_id":"","reference_type":"","scores":[{"value":"0.05777","scoring_system":"epss","scoring_elements":"0.90442","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05777","scoring_system":"epss","scoring_elements":"0.90446","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05777","scoring_system":"epss","scoring_elements":"0.90458","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06047","scoring_system":"epss","scoring_elements":"0.90732","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06047","scoring_system":"epss","scoring_elements":"0.90741","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06047","scoring_system":"epss","scoring_elements":"0.90738","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06047","scoring_system":"epss","scoring_elements":"0.90757","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06047","scoring_system":"epss","scoring_elements":"0.90754","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06047","scoring_system":"epss","scoring_elements":"0.90752","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06047","scoring_system":"epss","scoring_elements":"0.90764","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06047","scoring_system":"epss","scoring_elements":"0.90758","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06047","scoring_system":"epss","scoring_elements":"0.90776","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06047","scoring_system":"epss","scoring_elements":"0.90794","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06047","scoring_system":"epss","scoring_elements":"0.90806","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06047","scoring_system":"epss","scoring_elements":"0.90804","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06047","scoring_system":"epss","scoring_elements":"0.90814","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06047","scoring_system":"epss","scoring_elements":"0.90826","published_at":"2026-05-14T12:55:00Z"},{"value":"0.06047","scoring_system":"epss","scoring_elements":"0.90715","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06047","scoring_system":"epss","scoring_elements":"0.90726","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2014-0063/","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2014-0063/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065226","reference_id":"1065226","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065226"},{"reference_url":"https://security.gentoo.org/glsa/201408-15","reference_id":"GLSA-201408-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0211","reference_id":"RHSA-2014:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0221","reference_id":"RHSA-2014:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0249","reference_id":"RHSA-2014:0249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0469","reference_id":"RHSA-2014:0469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0469"},{"reference_url":"https://usn.ubuntu.com/2120-1/","reference_id":"USN-2120-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2120-1/"}],"fixed_packages":[],"aliases":["CVE-2014-0063"],"risk_score":1.3,"exploitability":"0.5","weighted_severity":"2.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-reab-s9cu-yudn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3613?format=json","vulnerability_id":"VCID-w518-wkek-97ag","summary":"SET ROLE bypasses lack of ADMIN OPTION.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0060.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0060.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0060","reference_id":"","reference_type":"","scores":[{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66718","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66744","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66678","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67794","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67817","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67803","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67769","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67805","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.678","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.6782","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.6783","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67834","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.6781","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67853","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67892","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67861","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67886","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67943","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67728","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67779","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2014-0060/","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L']"}],"url":"https://www.postgresql.org/support/security/CVE-2014-0060/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065219","reference_id":"1065219","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1065219"},{"reference_url":"https://security.gentoo.org/glsa/201408-15","reference_id":"GLSA-201408-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0211","reference_id":"RHSA-2014:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0221","reference_id":"RHSA-2014:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0249","reference_id":"RHSA-2014:0249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0469","reference_id":"RHSA-2014:0469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0469"},{"reference_url":"https://usn.ubuntu.com/2120-1/","reference_id":"USN-2120-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2120-1/"}],"fixed_packages":[],"aliases":["CVE-2014-0060"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w518-wkek-97ag"}],"fixing_vulnerabilities":[],"risk_score":"3.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/postgresql92-postgresql@9.2.7-1.1%3Farch=el6"}