{"url":"http://public2.vulnerablecode.io/api/packages/129487?format=json","purl":"pkg:rpm/redhat/postgresql@7.4.19-1.el4_6?arch=1","type":"rpm","namespace":"redhat","name":"postgresql","version":"7.4.19-1.el4_6","qualifiers":{"arch":"1"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3580?format=json","vulnerability_id":"VCID-5zj2-a3y7-zueh","summary":"DBLink functions combined with local trust or ident access control could be used by a malicious user togain superuser privileges. A valid login is required to exploit this vulnerability.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6601.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6601","reference_id":"","reference_type":"","scores":[{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75128","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75131","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75162","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75138","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75173","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75206","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75172","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.7521","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75216","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75205","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75247","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.7525","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.7526","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75287","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6601"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2007-6601/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2007-6601/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=427128","reference_id":"427128","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=427128"},{"reference_url":"https://security.gentoo.org/glsa/200801-15","reference_id":"GLSA-200801-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0038","reference_id":"RHSA-2008:0038","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0039","reference_id":"RHSA-2008:0039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0040","reference_id":"RHSA-2008:0040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0040"},{"reference_url":"https://usn.ubuntu.com/568-1/","reference_id":"USN-568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/568-1/"}],"fixed_packages":[],"aliases":["CVE-2007-6601"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5zj2-a3y7-zueh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31496?format=json","vulnerability_id":"VCID-667z-t53e-h3ac","summary":"PostgreSQL contains multiple vulnerabilities that could result in privilege\n    escalation or a Denial of Service.","references":[{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154"},{"reference_url":"http://osvdb.org/40899","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/40899"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3278.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3278.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3278","reference_id":"","reference_type":"","scores":[{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70558","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70391","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70403","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70421","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70399","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70445","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.7046","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70484","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.7047","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70456","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70497","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70506","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70485","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70537","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70546","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70545","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70518","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3278"},{"reference_url":"http://secunia.com/advisories/28376","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28376"},{"reference_url":"http://secunia.com/advisories/28437","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28437"},{"reference_url":"http://secunia.com/advisories/28438","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28438"},{"reference_url":"http://secunia.com/advisories/28445","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28445"},{"reference_url":"http://secunia.com/advisories/28454","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28454"},{"reference_url":"http://secunia.com/advisories/28477","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28477"},{"reference_url":"http://secunia.com/advisories/28479","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28479"},{"reference_url":"http://secunia.com/advisories/28679","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28679"},{"reference_url":"http://secunia.com/advisories/29638","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29638"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200801-15.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200801-15.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35142","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35142"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10334","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10334"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1"},{"reference_url":"http://www.debian.org/security/2008/dsa-1460","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1460"},{"reference_url":"http://www.debian.org/security/2008/dsa-1463","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1463"},{"reference_url":"http://www.leidecker.info/pgshell/Having_Fun_With_PostgreSQL.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.leidecker.info/pgshell/Having_Fun_With_PostgreSQL.txt"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:188","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:188"},{"reference_url":"http://www.portcullis.co.uk/uplds/whitepapers/Having_Fun_With_PostgreSQL.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://www.portcullis.co.uk/uplds/whitepapers/Having_Fun_With_PostgreSQL.pdf"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0038.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0038.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0039.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0039.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0040.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0040.html"},{"reference_url":"http://www.securityfocus.com/archive/1/471541/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/471541/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/471644/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/471644/100/0/threaded"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0109","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0109"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1071/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1071/references"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=309141","reference_id":"309141","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=309141"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3278","reference_id":"CVE-2007-3278","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3278"},{"reference_url":"https://security.gentoo.org/glsa/200801-15","reference_id":"GLSA-200801-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0038","reference_id":"RHSA-2008:0038","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0039","reference_id":"RHSA-2008:0039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0040","reference_id":"RHSA-2008:0040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0040"},{"reference_url":"https://usn.ubuntu.com/568-1/","reference_id":"USN-568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/568-1/"}],"fixed_packages":[],"aliases":["CVE-2007-3278"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-667z-t53e-h3ac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31498?format=json","vulnerability_id":"VCID-8crf-v5y3-93c4","summary":"PostgreSQL contains multiple vulnerabilities that could result in privilege\n    escalation or a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6067.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6067.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6067","reference_id":"","reference_type":"","scores":[{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58478","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58563","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58583","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58554","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58606","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58612","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58628","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67394","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67359","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67393","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67405","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67383","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67402","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67413","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67388","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67433","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6067"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=400931","reference_id":"400931","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=400931"},{"reference_url":"https://security.gentoo.org/glsa/200801-15","reference_id":"GLSA-200801-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0038","reference_id":"RHSA-2008:0038","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0040","reference_id":"RHSA-2008:0040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0122","reference_id":"RHSA-2013:0122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0122"},{"reference_url":"https://usn.ubuntu.com/568-1/","reference_id":"USN-568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/568-1/"}],"fixed_packages":[],"aliases":["CVE-2007-6067"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8crf-v5y3-93c4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31497?format=json","vulnerability_id":"VCID-8yqk-fsmx-wbg1","summary":"PostgreSQL contains multiple vulnerabilities that could result in privilege\n    escalation or a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4772.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4772.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4772","reference_id":"","reference_type":"","scores":[{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50576","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50512","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50558","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.5055","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50601","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50623","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50618","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50591","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51135","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51083","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51608","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51612","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51597","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51571","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.5152","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51657","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4772"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=316511","reference_id":"316511","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=316511"},{"reference_url":"https://security.gentoo.org/glsa/200801-15","reference_id":"GLSA-200801-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0038","reference_id":"RHSA-2008:0038","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0040","reference_id":"RHSA-2008:0040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0134","reference_id":"RHSA-2008:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0122","reference_id":"RHSA-2013:0122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0122"},{"reference_url":"https://usn.ubuntu.com/568-1/","reference_id":"USN-568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/568-1/"}],"fixed_packages":[],"aliases":["CVE-2007-4772"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8yqk-fsmx-wbg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3581?format=json","vulnerability_id":"VCID-f89t-37f7-hbau","summary":"Two vulnerabilities in how ANALYZE executes user defined functions that are part of expression indexes allows users to gain superuser privileges. A valid login that has permissions to create functions and tables is required to exploit this vulnearbility.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6600.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6600","reference_id":"","reference_type":"","scores":[{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74165","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.7417","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74196","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74169","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74202","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74217","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.7422","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74213","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74251","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.7426","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74286","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74294","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74288","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74316","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6600"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2007-6600/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2007-6600/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=427127","reference_id":"427127","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=427127"},{"reference_url":"https://security.gentoo.org/glsa/200801-15","reference_id":"GLSA-200801-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0038","reference_id":"RHSA-2008:0038","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0039","reference_id":"RHSA-2008:0039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0040","reference_id":"RHSA-2008:0040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0040"},{"reference_url":"https://usn.ubuntu.com/568-1/","reference_id":"USN-568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/568-1/"}],"fixed_packages":[],"aliases":["CVE-2007-6600"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f89t-37f7-hbau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3582?format=json","vulnerability_id":"VCID-h86x-6j3b-eqfh","summary":"Three vulnearbilities in the regular expression handling libraries can be exploited to cause a backend crash, infinite loops or memory exhaustion. This vulnearbility can be exploited through frontend applications that allow unfiltered regular expressions to be passed in queries.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4769.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4769.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4769","reference_id":"","reference_type":"","scores":[{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78808","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78814","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78844","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78827","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78853","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78882","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78866","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78885","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78879","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78908","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78916","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78933","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78949","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78971","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4769"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2007-4769/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2007-4769/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=315231","reference_id":"315231","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=315231"},{"reference_url":"https://security.gentoo.org/glsa/200801-15","reference_id":"GLSA-200801-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0038","reference_id":"RHSA-2008:0038","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0040","reference_id":"RHSA-2008:0040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0040"},{"reference_url":"https://usn.ubuntu.com/568-1/","reference_id":"USN-568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/568-1/"}],"fixed_packages":[],"aliases":["CVE-2007-4769"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h86x-6j3b-eqfh"}],"fixing_vulnerabilities":[],"risk_score":"3.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/postgresql@7.4.19-1.el4_6%3Farch=1"}