{"url":"http://public2.vulnerablecode.io/api/packages/130380?format=json","purl":"pkg:rpm/redhat/postgresql@7.4.7-2.RHEL4?arch=1","type":"rpm","namespace":"redhat","name":"postgresql","version":"7.4.7-2.RHEL4","qualifiers":{"arch":"1"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3604?format=json","vulnerability_id":"VCID-8753-jd2h-8yhw","summary":"EXECUTE permissions are not properly checked when creating aggregates. A valid login is required to exploit this vulnerability.more details","references":[{"reference_url":"http://archives.postgresql.org/pgsql-hackers/2005-01/msg00922.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-hackers/2005-01/msg00922.php"},{"reference_url":"http://marc.info/?l=bugtraq&m=110806034116082&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=110806034116082&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0244.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0244.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0244","reference_id":"","reference_type":"","scores":[{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74722","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74596","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.746","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74627","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74601","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74633","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74647","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.7467","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.7465","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74642","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74679","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74687","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74714","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.7472","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0244"},{"reference_url":"http://secunia.com/advisories/12948","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/12948"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19184","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19184"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10927","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10927"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2005-0244/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2005-0244/"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-138.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-138.html"},{"reference_url":"http://www.securityfocus.com/bid/12417","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617505","reference_id":"1617505","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617505"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0244","reference_id":"CVE-2005-0244","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0244"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:138","reference_id":"RHSA-2005:138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:141","reference_id":"RHSA-2005:141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:141"},{"reference_url":"https://usn.ubuntu.com/79-1/","reference_id":"USN-79-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/79-1/"}],"fixed_packages":[],"aliases":["CVE-2005-0244"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8753-jd2h-8yhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3602?format=json","vulnerability_id":"VCID-hase-39jj-6khk","summary":"The intagg contrib module allows attackers to cause a denial of service. A valid login is required to exploit this vulnerability.more details","references":[{"reference_url":"http://archives.postgresql.org/pgsql-committers/2005-01/msg00401.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-committers/2005-01/msg00401.php"},{"reference_url":"http://marc.info/?l=bugtraq&m=110806034116082&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=110806034116082&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0246.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0246.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0246","reference_id":"","reference_type":"","scores":[{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83348","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83204","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83221","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83235","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83234","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83258","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83283","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83277","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83273","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83309","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.8331","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83312","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83335","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83342","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0246"},{"reference_url":"http://secunia.com/advisories/12948","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/12948"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19185","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19185"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10148","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10148"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2005-0246/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2005-0246/"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-138.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-138.html"},{"reference_url":"http://www.securityfocus.com/bid/12417","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617507","reference_id":"1617507","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617507"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0246","reference_id":"CVE-2005-0246","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:138","reference_id":"RHSA-2005:138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:141","reference_id":"RHSA-2005:141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:141"},{"reference_url":"https://usn.ubuntu.com/79-1/","reference_id":"USN-79-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/79-1/"}],"fixed_packages":[],"aliases":["CVE-2005-0246"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hase-39jj-6khk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3603?format=json","vulnerability_id":"VCID-s1hd-1asy-q3dd","summary":"Multiple buffer overflows in the PL/PGSQL parser may allow attackers to execute arbitrary code. A valid login is required to exploit this vulnerability.more details","references":[{"reference_url":"http://archives.postgresql.org/pgsql-committers/2005-01/msg00298.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-committers/2005-01/msg00298.php"},{"reference_url":"http://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php"},{"reference_url":"http://archives.postgresql.org/pgsql-patches/2005-01/msg00216.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-patches/2005-01/msg00216.php"},{"reference_url":"http://marc.info/?l=bugtraq&m=110806034116082&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=110806034116082&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0245.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0245.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0245","reference_id":"","reference_type":"","scores":[{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95945","published_at":"2026-04-29T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95889","published_at":"2026-04-01T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95897","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95906","published_at":"2026-04-04T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.9591","published_at":"2026-04-07T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95918","published_at":"2026-04-08T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95921","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95925","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95926","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95938","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95943","published_at":"2026-04-18T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95944","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0245"},{"reference_url":"http://secunia.com/advisories/12948","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/12948"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19188","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19188"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10175","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10175"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2005-0245/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2005-0245/"},{"reference_url":"http://www.debian.org/security/2005/dsa-683","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-683"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-138.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-138.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-150.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-150.html"},{"reference_url":"http://www.securityfocus.com/bid/12417","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617506","reference_id":"1617506","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617506"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0245","reference_id":"CVE-2005-0245","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0245"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/25076.c","reference_id":"CVE-2005-0245;OSVDB-13774","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/25076.c"},{"reference_url":"https://www.securityfocus.com/bid/12417/info","reference_id":"CVE-2005-0245;OSVDB-13774","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/12417/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:138","reference_id":"RHSA-2005:138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:141","reference_id":"RHSA-2005:141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:150","reference_id":"RHSA-2005:150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:150"},{"reference_url":"https://usn.ubuntu.com/79-1/","reference_id":"USN-79-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/79-1/"}],"fixed_packages":[],"aliases":["CVE-2005-0245"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s1hd-1asy-q3dd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3605?format=json","vulnerability_id":"VCID-swbt-7zch-sbcp","summary":"Any database user is permitted to load arbitrary shared libraries using the LOAD command. A valid login is required to exploit this vulnerability.more details","references":[{"reference_url":"http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php"},{"reference_url":"http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php"},{"reference_url":"http://marc.info/?l=bugtraq&m=110726899107148&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=110726899107148&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0227.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0227.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0227","reference_id":"","reference_type":"","scores":[{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29929","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30335","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30365","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30413","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30228","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30288","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30322","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30326","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30281","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30235","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.3025","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30232","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30186","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30122","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30007","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0227"},{"reference_url":"http://secunia.com/advisories/12948","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/12948"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200502-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200502-08.xml"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10234","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10234"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2005-0227/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2005-0227/"},{"reference_url":"http://www.debian.org/security/2005/dsa-668","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-668"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-138.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-138.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-150.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-150.html"},{"reference_url":"http://www.securityfocus.com/bid/12411","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12411"},{"reference_url":"http://www.trustix.org/errata/2005/0003/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2005/0003/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617499","reference_id":"1617499","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617499"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0227","reference_id":"CVE-2005-0227","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0227"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:138","reference_id":"RHSA-2005:138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:141","reference_id":"RHSA-2005:141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:150","reference_id":"RHSA-2005:150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:150"}],"fixed_packages":[],"aliases":["CVE-2005-0227"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-swbt-7zch-sbcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3601?format=json","vulnerability_id":"VCID-wesb-d296-4ba8","summary":"Multiple buffer overflows in the PL/PGSQL parser may allow attackers to execute arbitrary code. A valid login is required to exploit this vulnerability.more details","references":[{"reference_url":"http://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php"},{"reference_url":"http://marc.info/?l=bugtraq&m=110806034116082&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=110806034116082&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0247.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0247.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0247","reference_id":"","reference_type":"","scores":[{"value":"0.0195","scoring_system":"epss","scoring_elements":"0.83528","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0195","scoring_system":"epss","scoring_elements":"0.83394","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0195","scoring_system":"epss","scoring_elements":"0.83407","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0195","scoring_system":"epss","scoring_elements":"0.83421","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0195","scoring_system":"epss","scoring_elements":"0.8342","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0195","scoring_system":"epss","scoring_elements":"0.83444","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0195","scoring_system":"epss","scoring_elements":"0.83454","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0195","scoring_system":"epss","scoring_elements":"0.83469","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0195","scoring_system":"epss","scoring_elements":"0.83463","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0195","scoring_system":"epss","scoring_elements":"0.83458","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0195","scoring_system":"epss","scoring_elements":"0.83493","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0195","scoring_system":"epss","scoring_elements":"0.83494","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0195","scoring_system":"epss","scoring_elements":"0.83496","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0195","scoring_system":"epss","scoring_elements":"0.83519","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0195","scoring_system":"epss","scoring_elements":"0.83525","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0247"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19375","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19375"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19376","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19376"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19377","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19377"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19378","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19378"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9345","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9345"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2005-0247/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2005-0247/"},{"reference_url":"http://www.debian.org/security/2005/dsa-683","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-683"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200502-19.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200502-19.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_27_postgresql.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_27_postgresql.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-138.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-138.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-150.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-150.html"},{"reference_url":"http://www.securityfocus.com/bid/12417","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617508","reference_id":"1617508","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617508"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0247","reference_id":"CVE-2005-0247","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0247"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:138","reference_id":"RHSA-2005:138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:141","reference_id":"RHSA-2005:141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:150","reference_id":"RHSA-2005:150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:150"},{"reference_url":"https://usn.ubuntu.com/79-1/","reference_id":"USN-79-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/79-1/"}],"fixed_packages":[],"aliases":["CVE-2005-0247"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wesb-d296-4ba8"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/postgresql@7.4.7-2.RHEL4%3Farch=1"}