{"url":"http://public2.vulnerablecode.io/api/packages/167?format=json","purl":"pkg:generic/postgresql@12.0.0","type":"generic","namespace":"","name":"postgresql","version":"12.0.0","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"12.1.0","latest_non_vulnerable_version":"18.2.0","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3560?format=json","vulnerability_id":"VCID-36gv-m96w-47db","summary":"Reconnection can downgrade connection security settingsmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25694","reference_id":"","reference_type":"","scores":[{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58007","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.5809","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58149","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58124","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58104","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58091","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58087","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58142","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58145","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.5816","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58137","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58118","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58148","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2020-25694/","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2020-25694/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894423","reference_id":"1894423","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894423"},{"reference_url":"https://security.archlinux.org/ASA-202011-14","reference_id":"ASA-202011-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-14"},{"reference_url":"https://security.archlinux.org/AVG-1276","reference_id":"AVG-1276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1276"},{"reference_url":"https://security.gentoo.org/glsa/202012-07","reference_id":"GLSA-202012-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5316","reference_id":"RHSA-2020:5316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5317","reference_id":"RHSA-2020:5317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5401","reference_id":"RHSA-2020:5401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5401"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5567","reference_id":"RHSA-2020:5567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5620","reference_id":"RHSA-2020:5620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5638","reference_id":"RHSA-2020:5638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0057","reference_id":"RHSA-2021:0057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0161","reference_id":"RHSA-2021:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0163","reference_id":"RHSA-2021:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0165","reference_id":"RHSA-2021:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1512","reference_id":"RHSA-2021:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1512"},{"reference_url":"https://usn.ubuntu.com/4633-1/","reference_id":"USN-4633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4633-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/300?format=json","purl":"pkg:generic/postgresql@12.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/299?format=json","purl":"pkg:generic/postgresql@13.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0"}],"aliases":["CVE-2020-25694"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-36gv-m96w-47db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3517?format=json","vulnerability_id":"VCID-3kph-5gzq-ryhu","summary":"Row security policies disregard user ID changes after inliningmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2455.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2455.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2455","reference_id":"","reference_type":"","scores":[{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.4378","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43756","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45277","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45418","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45469","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45464","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45414","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45331","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45338","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45369","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45424","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45425","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45447","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45417","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2455"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2023-2455/","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N']"},{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T17:13:19Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2023-2455/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207569","reference_id":"2207569","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207569"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-2455","reference_id":"CVE-2023-2455","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T17:13:19Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-2455"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230706-0006/","reference_id":"ntap-20230706-0006","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T17:13:19Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230706-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3714","reference_id":"RHSA-2023:3714","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3714"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4313","reference_id":"RHSA-2023:4313","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4313"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4327","reference_id":"RHSA-2023:4327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4527","reference_id":"RHSA-2023:4527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4535","reference_id":"RHSA-2023:4535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4539","reference_id":"RHSA-2023:4539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5269","reference_id":"RHSA-2023:5269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7545","reference_id":"RHSA-2023:7545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7580","reference_id":"RHSA-2023:7580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7666","reference_id":"RHSA-2023:7666","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7666"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7667","reference_id":"RHSA-2023:7667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7694","reference_id":"RHSA-2023:7694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7694"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7695","reference_id":"RHSA-2023:7695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7772","reference_id":"RHSA-2023:7772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7772"},{"reference_url":"https://usn.ubuntu.com/6104-1/","reference_id":"USN-6104-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6104-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/182?format=json","purl":"pkg:generic/postgresql@12.15.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.15.0"},{"url":"http://public2.vulnerablecode.io/api/packages/181?format=json","purl":"pkg:generic/postgresql@13.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.11.0"},{"url":"http://public2.vulnerablecode.io/api/packages/156?format=json","purl":"pkg:generic/postgresql@14.8.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.8.0"},{"url":"http://public2.vulnerablecode.io/api/packages/155?format=json","purl":"pkg:generic/postgresql@15.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.3.0"}],"aliases":["CVE-2023-2455"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3kph-5gzq-ryhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3557?format=json","vulnerability_id":"VCID-4jdp-3xqp-ufap","summary":"Buffer overrun from integer overflow in array subscripting calculationsmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32027","reference_id":"","reference_type":"","scores":[{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65502","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65644","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65619","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65634","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65645","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.6555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.6558","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65599","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65611","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.6563","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65616","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65587","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65623","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65635","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32027"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2021-32027/","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2021-32027/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1956876","reference_id":"1956876","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1956876"},{"reference_url":"https://security.archlinux.org/ASA-202106-15","reference_id":"ASA-202106-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-15"},{"reference_url":"https://security.archlinux.org/AVG-1956","reference_id":"AVG-1956","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1956"},{"reference_url":"https://security.gentoo.org/glsa/202211-04","reference_id":"GLSA-202211-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2360","reference_id":"RHSA-2021:2360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2361","reference_id":"RHSA-2021:2361","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2361"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2372","reference_id":"RHSA-2021:2372","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2372"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2375","reference_id":"RHSA-2021:2375","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2389","reference_id":"RHSA-2021:2389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2390","reference_id":"RHSA-2021:2390","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2390"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2391","reference_id":"RHSA-2021:2391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2392","reference_id":"RHSA-2021:2392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2393","reference_id":"RHSA-2021:2393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2394","reference_id":"RHSA-2021:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2395","reference_id":"RHSA-2021:2395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2396","reference_id":"RHSA-2021:2396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2397","reference_id":"RHSA-2021:2397","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2397"},{"reference_url":"https://usn.ubuntu.com/4972-1/","reference_id":"USN-4972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4972-1/"},{"reference_url":"https://usn.ubuntu.com/5645-1/","reference_id":"USN-5645-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5645-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/290?format=json","purl":"pkg:generic/postgresql@12.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0"},{"url":"http://public2.vulnerablecode.io/api/packages/289?format=json","purl":"pkg:generic/postgresql@13.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0"}],"aliases":["CVE-2021-32027"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4jdp-3xqp-ufap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3518?format=json","vulnerability_id":"VCID-5py6-fe2j-d3f4","summary":"CREATE SCHEMA ... schema_element defeats protective search_path changesmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2454.json","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2454.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2454","reference_id":"","reference_type":"","scores":[{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45609","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45587","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46244","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46299","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46288","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46307","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47576","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47631","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47627","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47651","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47636","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47694","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47686","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2023-2454/","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H']"},{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2023-2454/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207568","reference_id":"2207568","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207568"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-2454","reference_id":"CVE-2023-2454","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-2454"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230706-0006/","reference_id":"ntap-20230706-0006","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230706-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3714","reference_id":"RHSA-2023:3714","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3714"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4313","reference_id":"RHSA-2023:4313","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4313"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4327","reference_id":"RHSA-2023:4327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4527","reference_id":"RHSA-2023:4527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4535","reference_id":"RHSA-2023:4535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4539","reference_id":"RHSA-2023:4539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5269","reference_id":"RHSA-2023:5269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7545","reference_id":"RHSA-2023:7545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7580","reference_id":"RHSA-2023:7580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7666","reference_id":"RHSA-2023:7666","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7666"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7667","reference_id":"RHSA-2023:7667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7694","reference_id":"RHSA-2023:7694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7694"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7695","reference_id":"RHSA-2023:7695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7772","reference_id":"RHSA-2023:7772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7772"},{"reference_url":"https://usn.ubuntu.com/6104-1/","reference_id":"USN-6104-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6104-1/"},{"reference_url":"https://usn.ubuntu.com/6230-1/","reference_id":"USN-6230-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6230-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/182?format=json","purl":"pkg:generic/postgresql@12.15.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.15.0"},{"url":"http://public2.vulnerablecode.io/api/packages/181?format=json","purl":"pkg:generic/postgresql@13.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.11.0"},{"url":"http://public2.vulnerablecode.io/api/packages/156?format=json","purl":"pkg:generic/postgresql@14.8.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.8.0"},{"url":"http://public2.vulnerablecode.io/api/packages/155?format=json","purl":"pkg:generic/postgresql@15.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.3.0"}],"aliases":["CVE-2023-2454"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5py6-fe2j-d3f4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3507?format=json","vulnerability_id":"VCID-66hr-98m2-a3gc","summary":"PostgreSQL libpq retains an error message from man-in-the-middlemore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10977.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10977.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10977","reference_id":"","reference_type":"","scores":[{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57034","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57102","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57033","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57052","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57077","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.571","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57127","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57129","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57141","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.5712","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57128","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10977"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2024-10977/","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N']"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-14T18:53:39Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2024-10977/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2326258","reference_id":"2326258","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2326258"},{"reference_url":"https://security.gentoo.org/glsa/202412-12","reference_id":"GLSA-202412-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-12"},{"reference_url":"https://usn.ubuntu.com/7132-1/","reference_id":"USN-7132-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7132-1/"},{"reference_url":"https://usn.ubuntu.com/7358-1/","reference_id":"USN-7358-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7358-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/169?format=json","purl":"pkg:generic/postgresql@12.21.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.21.0"},{"url":"http://public2.vulnerablecode.io/api/packages/168?format=json","purl":"pkg:generic/postgresql@13.17.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.17.0"},{"url":"http://public2.vulnerablecode.io/api/packages/140?format=json","purl":"pkg:generic/postgresql@14.14.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.14.0"},{"url":"http://public2.vulnerablecode.io/api/packages/139?format=json","purl":"pkg:generic/postgresql@15.9.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.9.0"},{"url":"http://public2.vulnerablecode.io/api/packages/138?format=json","purl":"pkg:generic/postgresql@16.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/137?format=json","purl":"pkg:generic/postgresql@17.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@17.1.0"}],"aliases":["CVE-2024-10977"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-66hr-98m2-a3gc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3506?format=json","vulnerability_id":"VCID-8da2-zhsq-j7c4","summary":"PostgreSQL SET ROLE, SET SESSION AUTHORIZATION reset to wrong user IDmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10978.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10978.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10978","reference_id":"","reference_type":"","scores":[{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.6993","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69867","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69918","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69927","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69786","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69841","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69865","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.6985","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69836","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69877","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10978"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2024-10978/","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N']"},{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-14T18:53:38Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2024-10978/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2326251","reference_id":"2326251","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2326251"},{"reference_url":"https://security.gentoo.org/glsa/202412-12","reference_id":"GLSA-202412-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10785","reference_id":"RHSA-2024:10785","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10787","reference_id":"RHSA-2024:10787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10788","reference_id":"RHSA-2024:10788","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10788"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10791","reference_id":"RHSA-2024:10791","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10791"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10830","reference_id":"RHSA-2024:10830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10831","reference_id":"RHSA-2024:10831","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10831"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10832","reference_id":"RHSA-2024:10832","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10832"},{"reference_url":"https://usn.ubuntu.com/7132-1/","reference_id":"USN-7132-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7132-1/"},{"reference_url":"https://usn.ubuntu.com/7358-1/","reference_id":"USN-7358-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7358-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/169?format=json","purl":"pkg:generic/postgresql@12.21.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.21.0"},{"url":"http://public2.vulnerablecode.io/api/packages/168?format=json","purl":"pkg:generic/postgresql@13.17.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.17.0"},{"url":"http://public2.vulnerablecode.io/api/packages/140?format=json","purl":"pkg:generic/postgresql@14.14.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.14.0"},{"url":"http://public2.vulnerablecode.io/api/packages/139?format=json","purl":"pkg:generic/postgresql@15.9.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.9.0"},{"url":"http://public2.vulnerablecode.io/api/packages/138?format=json","purl":"pkg:generic/postgresql@16.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/137?format=json","purl":"pkg:generic/postgresql@17.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@17.1.0"}],"aliases":["CVE-2024-10978"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8da2-zhsq-j7c4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3556?format=json","vulnerability_id":"VCID-8p8h-jdyq-vfek","summary":"Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATEmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32028","reference_id":"","reference_type":"","scores":[{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64362","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64512","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64479","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.645","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64445","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64405","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64453","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64481","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64441","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64475","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64487","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2021-32028/","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2021-32028/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1956877","reference_id":"1956877","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1956877"},{"reference_url":"https://security.archlinux.org/ASA-202106-15","reference_id":"ASA-202106-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-15"},{"reference_url":"https://security.archlinux.org/AVG-1956","reference_id":"AVG-1956","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1956"},{"reference_url":"https://security.gentoo.org/glsa/202211-04","reference_id":"GLSA-202211-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2360","reference_id":"RHSA-2021:2360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2361","reference_id":"RHSA-2021:2361","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2361"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2372","reference_id":"RHSA-2021:2372","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2372"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2375","reference_id":"RHSA-2021:2375","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2389","reference_id":"RHSA-2021:2389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2390","reference_id":"RHSA-2021:2390","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2390"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2391","reference_id":"RHSA-2021:2391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2392","reference_id":"RHSA-2021:2392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2393","reference_id":"RHSA-2021:2393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2394","reference_id":"RHSA-2021:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2395","reference_id":"RHSA-2021:2395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2396","reference_id":"RHSA-2021:2396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2396"},{"reference_url":"https://usn.ubuntu.com/4972-1/","reference_id":"USN-4972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4972-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/290?format=json","purl":"pkg:generic/postgresql@12.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0"},{"url":"http://public2.vulnerablecode.io/api/packages/289?format=json","purl":"pkg:generic/postgresql@13.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0"}],"aliases":["CVE-2021-32028"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8p8h-jdyq-vfek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3509?format=json","vulnerability_id":"VCID-ah54-w11h-eqef","summary":"PostgreSQL relation replacement during pg_dump executes arbitrary SQLmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7348.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7348.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7348","reference_id":"","reference_type":"","scores":[{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73057","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73047","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73006","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72962","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72982","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72958","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72995","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73009","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73012","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73033","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73501","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73459","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73492","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73504","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7348"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7348","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7348"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-164-158-1413-1316-1220-and-17-beta-3-released-2910/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-164-158-1413-1316-1220-and-17-beta-3-released-2910/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2024-7348/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-09T18:15:41Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2024-7348/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303682","reference_id":"2303682","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303682"},{"reference_url":"https://security.gentoo.org/glsa/202409-02","reference_id":"GLSA-202409-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5927","reference_id":"RHSA-2024:5927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5929","reference_id":"RHSA-2024:5929","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5929"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5999","reference_id":"RHSA-2024:5999","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6000","reference_id":"RHSA-2024:6000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6001","reference_id":"RHSA-2024:6001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6018","reference_id":"RHSA-2024:6018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6020","reference_id":"RHSA-2024:6020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6137","reference_id":"RHSA-2024:6137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6138","reference_id":"RHSA-2024:6138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6139","reference_id":"RHSA-2024:6139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6140","reference_id":"RHSA-2024:6140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6141","reference_id":"RHSA-2024:6141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6142","reference_id":"RHSA-2024:6142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6142"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6144","reference_id":"RHSA-2024:6144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6145","reference_id":"RHSA-2024:6145","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6145"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6557","reference_id":"RHSA-2024:6557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6558","reference_id":"RHSA-2024:6558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6559","reference_id":"RHSA-2024:6559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8495","reference_id":"RHSA-2024:8495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8495"},{"reference_url":"https://usn.ubuntu.com/6968-1/","reference_id":"USN-6968-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6968-1/"},{"reference_url":"https://usn.ubuntu.com/6968-2/","reference_id":"USN-6968-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6968-2/"},{"reference_url":"https://usn.ubuntu.com/6968-3/","reference_id":"USN-6968-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6968-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/171?format=json","purl":"pkg:generic/postgresql@12.20.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.20.0"},{"url":"http://public2.vulnerablecode.io/api/packages/170?format=json","purl":"pkg:generic/postgresql@13.16.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.16.0"},{"url":"http://public2.vulnerablecode.io/api/packages/143?format=json","purl":"pkg:generic/postgresql@14.13.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.13.0"},{"url":"http://public2.vulnerablecode.io/api/packages/142?format=json","purl":"pkg:generic/postgresql@15.8.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.8.0"},{"url":"http://public2.vulnerablecode.io/api/packages/141?format=json","purl":"pkg:generic/postgresql@16.4.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.4.0"}],"aliases":["CVE-2024-7348"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ah54-w11h-eqef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3559?format=json","vulnerability_id":"VCID-bdw5-v87c-zyfj","summary":"Multiple features escape \"security restricted operation\" sandboxmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25695","reference_id":"","reference_type":"","scores":[{"value":"0.22672","scoring_system":"epss","scoring_elements":"0.95843","published_at":"2026-04-04T12:55:00Z"},{"value":"0.22672","scoring_system":"epss","scoring_elements":"0.95826","published_at":"2026-04-01T12:55:00Z"},{"value":"0.22672","scoring_system":"epss","scoring_elements":"0.95854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.22672","scoring_system":"epss","scoring_elements":"0.95845","published_at":"2026-04-07T12:55:00Z"},{"value":"0.22672","scoring_system":"epss","scoring_elements":"0.95835","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96021","published_at":"2026-04-29T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96015","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.9602","published_at":"2026-04-18T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96022","published_at":"2026-04-26T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.95999","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96005","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2020-25695/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2020-25695/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894425","reference_id":"1894425","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894425"},{"reference_url":"https://security.archlinux.org/ASA-202011-14","reference_id":"ASA-202011-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-14"},{"reference_url":"https://security.archlinux.org/AVG-1276","reference_id":"AVG-1276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1276"},{"reference_url":"https://security.gentoo.org/glsa/202012-07","reference_id":"GLSA-202012-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5316","reference_id":"RHSA-2020:5316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5317","reference_id":"RHSA-2020:5317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5567","reference_id":"RHSA-2020:5567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5620","reference_id":"RHSA-2020:5620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0161","reference_id":"RHSA-2021:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0163","reference_id":"RHSA-2021:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1512","reference_id":"RHSA-2021:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1512"},{"reference_url":"https://usn.ubuntu.com/4633-1/","reference_id":"USN-4633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4633-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/300?format=json","purl":"pkg:generic/postgresql@12.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/299?format=json","purl":"pkg:generic/postgresql@13.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0"}],"aliases":["CVE-2020-25695"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bdw5-v87c-zyfj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3595?format=json","vulnerability_id":"VCID-brqx-ae92-83ep","summary":"Partition constraint violation errors leak values of denied columnsmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3393.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3393.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3393","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28432","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2839","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28526","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28568","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28371","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28436","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28479","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28439","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28482","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28876","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.2918","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.2906","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28949","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29224","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3393"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-132-126-1111-1016-9621-and-9525-released-2165/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-132-126-1111-1016-9621-and-9525-released-2165/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2021-3393/","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2021-3393/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1924005","reference_id":"1924005","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1924005"},{"reference_url":"https://security.archlinux.org/ASA-202102-31","reference_id":"ASA-202102-31","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-31"},{"reference_url":"https://security.archlinux.org/AVG-1567","reference_id":"AVG-1567","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1567"},{"reference_url":"https://security.gentoo.org/glsa/202105-32","reference_id":"GLSA-202105-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2372","reference_id":"RHSA-2021:2372","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2372"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2389","reference_id":"RHSA-2021:2389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2394","reference_id":"RHSA-2021:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2394"},{"reference_url":"https://usn.ubuntu.com/4735-1/","reference_id":"USN-4735-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4735-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/398?format=json","purl":"pkg:generic/postgresql@12.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/397?format=json","purl":"pkg:generic/postgresql@13.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.2.0"}],"aliases":["CVE-2021-3393"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-brqx-ae92-83ep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3562?format=json","vulnerability_id":"VCID-cegf-gbkv-aqab","summary":"Uncontrolled search path element in logical replicationmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14349.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14349.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14349","reference_id":"","reference_type":"","scores":[{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81342","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81478","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81466","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81373","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81371","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81399","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81404","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81425","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81413","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81442","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81443","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81445","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14349"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2020-14349/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2020-14349/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1865744","reference_id":"1865744","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1865744"},{"reference_url":"https://security.gentoo.org/glsa/202008-13","reference_id":"GLSA-202008-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3669","reference_id":"RHSA-2020:3669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5110","reference_id":"RHSA-2020:5110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5112","reference_id":"RHSA-2020:5112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5620","reference_id":"RHSA-2020:5620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0163","reference_id":"RHSA-2021:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0988","reference_id":"RHSA-2021:0988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0988"},{"reference_url":"https://usn.ubuntu.com/4472-1/","reference_id":"USN-4472-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4472-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/305?format=json","purl":"pkg:generic/postgresql@12.4.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.4.0"}],"aliases":["CVE-2020-14349"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cegf-gbkv-aqab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3593?format=json","vulnerability_id":"VCID-dv4x-n7v8-vyfh","summary":"Memory disclosure in partitioned-table UPDATE ... RETURNINGmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32029.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32029.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32029","reference_id":"","reference_type":"","scores":[{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37703","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37769","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37831","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37885","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37909","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37788","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37838","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37851","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37866","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37804","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38647","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38759","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38735","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2021-32029/","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2021-32029/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1956883","reference_id":"1956883","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1956883"},{"reference_url":"https://security.archlinux.org/ASA-202106-15","reference_id":"ASA-202106-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-15"},{"reference_url":"https://security.archlinux.org/AVG-1956","reference_id":"AVG-1956","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1956"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2372","reference_id":"RHSA-2021:2372","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2372"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2375","reference_id":"RHSA-2021:2375","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2389","reference_id":"RHSA-2021:2389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2394","reference_id":"RHSA-2021:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2396","reference_id":"RHSA-2021:2396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2396"},{"reference_url":"https://usn.ubuntu.com/4972-1/","reference_id":"USN-4972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4972-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/290?format=json","purl":"pkg:generic/postgresql@12.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0"},{"url":"http://public2.vulnerablecode.io/api/packages/289?format=json","purl":"pkg:generic/postgresql@13.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0"}],"aliases":["CVE-2021-32029"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dv4x-n7v8-vyfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3515?format=json","vulnerability_id":"VCID-dwqe-a6p3-tyf6","summary":"Buffer overrun from integer overflow in array modificationmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5869.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5869.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5869","reference_id":"","reference_type":"","scores":[{"value":"0.01608","scoring_system":"epss","scoring_elements":"0.81784","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01608","scoring_system":"epss","scoring_elements":"0.81692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01608","scoring_system":"epss","scoring_elements":"0.81716","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01608","scoring_system":"epss","scoring_elements":"0.81713","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01608","scoring_system":"epss","scoring_elements":"0.81739","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01608","scoring_system":"epss","scoring_elements":"0.81744","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01608","scoring_system":"epss","scoring_elements":"0.81763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01608","scoring_system":"epss","scoring_elements":"0.81751","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01608","scoring_system":"epss","scoring_elements":"0.81783","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01608","scoring_system":"epss","scoring_elements":"0.81745","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82093","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82078","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82089","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82055","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2023-5869/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2023-5869/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283","reference_id":"1056283","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2247169","reference_id":"2247169","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2247169"},{"reference_url":"https://security.gentoo.org/glsa/202408-06","reference_id":"GLSA-202408-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7545","reference_id":"RHSA-2023:7545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7579","reference_id":"RHSA-2023:7579","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7580","reference_id":"RHSA-2023:7580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7581","reference_id":"RHSA-2023:7581","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7581"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7616","reference_id":"RHSA-2023:7616","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7656","reference_id":"RHSA-2023:7656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7666","reference_id":"RHSA-2023:7666","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7666"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7667","reference_id":"RHSA-2023:7667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7694","reference_id":"RHSA-2023:7694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7694"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7695","reference_id":"RHSA-2023:7695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7714","reference_id":"RHSA-2023:7714","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7714"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7770","reference_id":"RHSA-2023:7770","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7771","reference_id":"RHSA-2023:7771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7772","reference_id":"RHSA-2023:7772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7778","reference_id":"RHSA-2023:7778","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7778"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7783","reference_id":"RHSA-2023:7783","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7783"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7784","reference_id":"RHSA-2023:7784","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7785","reference_id":"RHSA-2023:7785","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7786","reference_id":"RHSA-2023:7786","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7788","reference_id":"RHSA-2023:7788","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7788"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7789","reference_id":"RHSA-2023:7789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7790","reference_id":"RHSA-2023:7790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7878","reference_id":"RHSA-2023:7878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7878"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7883","reference_id":"RHSA-2023:7883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7884","reference_id":"RHSA-2023:7884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7885","reference_id":"RHSA-2023:7885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0304","reference_id":"RHSA-2024:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0332","reference_id":"RHSA-2024:0332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0337","reference_id":"RHSA-2024:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0337"},{"reference_url":"https://usn.ubuntu.com/6538-1/","reference_id":"USN-6538-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6538-1/"},{"reference_url":"https://usn.ubuntu.com/6538-2/","reference_id":"USN-6538-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6538-2/"},{"reference_url":"https://usn.ubuntu.com/6570-1/","reference_id":"USN-6570-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6570-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/179?format=json","purl":"pkg:generic/postgresql@12.17.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.17.0"},{"url":"http://public2.vulnerablecode.io/api/packages/178?format=json","purl":"pkg:generic/postgresql@13.13.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.13.0"},{"url":"http://public2.vulnerablecode.io/api/packages/154?format=json","purl":"pkg:generic/postgresql@14.10.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.10.0"},{"url":"http://public2.vulnerablecode.io/api/packages/153?format=json","purl":"pkg:generic/postgresql@15.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/152?format=json","purl":"pkg:generic/postgresql@16.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.1.0"}],"aliases":["CVE-2023-5869"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dwqe-a6p3-tyf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3511?format=json","vulnerability_id":"VCID-j4cc-p1t3-tydy","summary":"PostgreSQL non-owner REFRESH MATERIALIZED VIEW CONCURRENTLY executes arbitrary SQLmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0985.json","reference_id":"","reference_type":"","scores":[{"value":"8.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0985.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0985","reference_id":"","reference_type":"","scores":[{"value":"0.00753","scoring_system":"epss","scoring_elements":"0.73264","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00753","scoring_system":"epss","scoring_elements":"0.73255","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00753","scoring_system":"epss","scoring_elements":"0.73218","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00753","scoring_system":"epss","scoring_elements":"0.73237","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00753","scoring_system":"epss","scoring_elements":"0.73212","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00753","scoring_system":"epss","scoring_elements":"0.73199","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00753","scoring_system":"epss","scoring_elements":"0.73163","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00753","scoring_system":"epss","scoring_elements":"0.73188","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00753","scoring_system":"epss","scoring_elements":"0.73167","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73675","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73634","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73667","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73676","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0985"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-162-156-1411-1314-and-1218-released-2807/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-162-156-1411-1314-and-1218-released-2807/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2024-0985/","reference_id":"","reference_type":"","scores":[{"value":"8.0","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H']"},{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-16T05:00:50Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2024-0985/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2263384","reference_id":"2263384","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2263384"},{"reference_url":"https://security.gentoo.org/glsa/202408-06","reference_id":"GLSA-202408-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-06"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-16T05:00:50Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00017.html"},{"reference_url":"https://saites.dev/projects/personal/postgres-cve-2024-0985/","reference_id":"postgres-cve-2024-0985","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-16T05:00:50Z/"}],"url":"https://saites.dev/projects/personal/postgres-cve-2024-0985/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0950","reference_id":"RHSA-2024:0950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0951","reference_id":"RHSA-2024:0951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0956","reference_id":"RHSA-2024:0956","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0956"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0973","reference_id":"RHSA-2024:0973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0974","reference_id":"RHSA-2024:0974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0975","reference_id":"RHSA-2024:0975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0975"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0988","reference_id":"RHSA-2024:0988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0990","reference_id":"RHSA-2024:0990","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0990"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0992","reference_id":"RHSA-2024:0992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0992"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1017","reference_id":"RHSA-2024:1017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1069","reference_id":"RHSA-2024:1069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1070","reference_id":"RHSA-2024:1070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1071","reference_id":"RHSA-2024:1071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1195","reference_id":"RHSA-2024:1195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1240","reference_id":"RHSA-2024:1240","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1240"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1241","reference_id":"RHSA-2024:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1314","reference_id":"RHSA-2024:1314","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1314"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1315","reference_id":"RHSA-2024:1315","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1315"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1348","reference_id":"RHSA-2024:1348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1422","reference_id":"RHSA-2024:1422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1426","reference_id":"RHSA-2024:1426","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1426"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1428","reference_id":"RHSA-2024:1428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1429","reference_id":"RHSA-2024:1429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1437","reference_id":"RHSA-2024:1437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1437"},{"reference_url":"https://usn.ubuntu.com/6656-1/","reference_id":"USN-6656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6656-1/"},{"reference_url":"https://usn.ubuntu.com/6656-2/","reference_id":"USN-6656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6656-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/173?format=json","purl":"pkg:generic/postgresql@12.18.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.18.0"},{"url":"http://public2.vulnerablecode.io/api/packages/172?format=json","purl":"pkg:generic/postgresql@13.14.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.14.0"},{"url":"http://public2.vulnerablecode.io/api/packages/149?format=json","purl":"pkg:generic/postgresql@14.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.11.0"},{"url":"http://public2.vulnerablecode.io/api/packages/148?format=json","purl":"pkg:generic/postgresql@15.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/147?format=json","purl":"pkg:generic/postgresql@16.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.2.0"}],"aliases":["CVE-2024-0985"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j4cc-p1t3-tydy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3520?format=json","vulnerability_id":"VCID-nuek-ypyh-b3dm","summary":"Extension scripts replace objects not belonging to the extensionmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2625","reference_id":"","reference_type":"","scores":[{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76755","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76737","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76743","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76616","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76645","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.7666","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76671","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76698","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76678","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.7667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76712","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76717","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76706","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2022-2625/","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2022-2625/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2113825","reference_id":"2113825","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2113825"},{"reference_url":"https://security.gentoo.org/glsa/202211-04","reference_id":"GLSA-202211-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7128","reference_id":"RHSA-2022:7128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0113","reference_id":"RHSA-2023:0113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0160","reference_id":"RHSA-2023:0160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0160"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1576","reference_id":"RHSA-2023:1576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1693","reference_id":"RHSA-2023:1693","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1693"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7545","reference_id":"RHSA-2023:7545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7580","reference_id":"RHSA-2023:7580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7667","reference_id":"RHSA-2023:7667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7694","reference_id":"RHSA-2023:7694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7694"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7695","reference_id":"RHSA-2023:7695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7695"},{"reference_url":"https://usn.ubuntu.com/5571-1/","reference_id":"USN-5571-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5571-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/282?format=json","purl":"pkg:generic/postgresql@12.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/281?format=json","purl":"pkg:generic/postgresql@13.8.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.8.0"},{"url":"http://public2.vulnerablecode.io/api/packages/159?format=json","purl":"pkg:generic/postgresql@14.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.5.0"}],"aliases":["CVE-2022-2625"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nuek-ypyh-b3dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3514?format=json","vulnerability_id":"VCID-nwfr-t7xn-zuae","summary":"Role \"pg_signal_backend\" can signal certain superuser processesmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5870.json","reference_id":"","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5870.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5870","reference_id":"","reference_type":"","scores":[{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.7002","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.7007","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70113","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70102","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70153","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.7016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70161","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70035","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70011","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70059","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70075","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70098","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/","reference_id":"","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2023-5870/","reference_id":"","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L']"},{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2023-5870/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283","reference_id":"1056283","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2247170","reference_id":"2247170","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2247170"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8","reference_id":"cpe:/a:redhat:advanced_cluster_security:3.74::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8","reference_id":"cpe:/a:redhat:advanced_cluster_security:4.1::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8","reference_id":"cpe:/a:redhat:advanced_cluster_security:4.2::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.0::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.2::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3","reference_id":"cpe:/a:redhat:rhel_software_collections:3","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7","reference_id":"cpe:/a:redhat:rhel_software_collections:3::el7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-5870","reference_id":"CVE-2023-5870","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-5870"},{"reference_url":"https://security.gentoo.org/glsa/202408-06","reference_id":"GLSA-202408-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7545","reference_id":"RHSA-2023:7545","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7579","reference_id":"RHSA-2023:7579","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7580","reference_id":"RHSA-2023:7580","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7581","reference_id":"RHSA-2023:7581","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7581"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7616","reference_id":"RHSA-2023:7616","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7656","reference_id":"RHSA-2023:7656","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7666","reference_id":"RHSA-2023:7666","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7666"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7667","reference_id":"RHSA-2023:7667","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7694","reference_id":"RHSA-2023:7694","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7694"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7695","reference_id":"RHSA-2023:7695","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7714","reference_id":"RHSA-2023:7714","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7714"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7770","reference_id":"RHSA-2023:7770","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7772","reference_id":"RHSA-2023:7772","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7784","reference_id":"RHSA-2023:7784","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7785","reference_id":"RHSA-2023:7785","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7883","reference_id":"RHSA-2023:7883","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7884","reference_id":"RHSA-2023:7884","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7885","reference_id":"RHSA-2023:7885","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0304","reference_id":"RHSA-2024:0304","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0332","reference_id":"RHSA-2024:0332","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0337","reference_id":"RHSA-2024:0337","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0337"},{"reference_url":"https://usn.ubuntu.com/6538-1/","reference_id":"USN-6538-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6538-1/"},{"reference_url":"https://usn.ubuntu.com/6538-2/","reference_id":"USN-6538-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6538-2/"},{"reference_url":"https://usn.ubuntu.com/6570-1/","reference_id":"USN-6570-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6570-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/179?format=json","purl":"pkg:generic/postgresql@12.17.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.17.0"},{"url":"http://public2.vulnerablecode.io/api/packages/178?format=json","purl":"pkg:generic/postgresql@13.13.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.13.0"},{"url":"http://public2.vulnerablecode.io/api/packages/154?format=json","purl":"pkg:generic/postgresql@14.10.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.10.0"},{"url":"http://public2.vulnerablecode.io/api/packages/153?format=json","purl":"pkg:generic/postgresql@15.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/152?format=json","purl":"pkg:generic/postgresql@16.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.1.0"}],"aliases":["CVE-2023-5870"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nwfr-t7xn-zuae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3516?format=json","vulnerability_id":"VCID-q5z4-wv12-1fh7","summary":"Memory disclosure in aggregate function callsmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5868.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5868.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5868","reference_id":"","reference_type":"","scores":[{"value":"0.02718","scoring_system":"epss","scoring_elements":"0.85973","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02718","scoring_system":"epss","scoring_elements":"0.85963","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02718","scoring_system":"epss","scoring_elements":"0.85972","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02718","scoring_system":"epss","scoring_elements":"0.85874","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02718","scoring_system":"epss","scoring_elements":"0.85891","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02718","scoring_system":"epss","scoring_elements":"0.85894","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02718","scoring_system":"epss","scoring_elements":"0.85913","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02718","scoring_system":"epss","scoring_elements":"0.85923","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02718","scoring_system":"epss","scoring_elements":"0.85937","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02718","scoring_system":"epss","scoring_elements":"0.85935","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02718","scoring_system":"epss","scoring_elements":"0.8593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02718","scoring_system":"epss","scoring_elements":"0.85949","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02718","scoring_system":"epss","scoring_elements":"0.85952","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02718","scoring_system":"epss","scoring_elements":"0.85943","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2023-5868/","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2023-5868/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283","reference_id":"1056283","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2247168","reference_id":"2247168","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2247168"},{"reference_url":"https://security.gentoo.org/glsa/202408-06","reference_id":"GLSA-202408-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7545","reference_id":"RHSA-2023:7545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7579","reference_id":"RHSA-2023:7579","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7580","reference_id":"RHSA-2023:7580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7581","reference_id":"RHSA-2023:7581","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7581"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7616","reference_id":"RHSA-2023:7616","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7656","reference_id":"RHSA-2023:7656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7666","reference_id":"RHSA-2023:7666","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7666"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7667","reference_id":"RHSA-2023:7667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7694","reference_id":"RHSA-2023:7694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7694"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7695","reference_id":"RHSA-2023:7695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7714","reference_id":"RHSA-2023:7714","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7714"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7770","reference_id":"RHSA-2023:7770","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7772","reference_id":"RHSA-2023:7772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7784","reference_id":"RHSA-2023:7784","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7785","reference_id":"RHSA-2023:7785","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7883","reference_id":"RHSA-2023:7883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7884","reference_id":"RHSA-2023:7884","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7885","reference_id":"RHSA-2023:7885","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0304","reference_id":"RHSA-2024:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0332","reference_id":"RHSA-2024:0332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0337","reference_id":"RHSA-2024:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0337"},{"reference_url":"https://usn.ubuntu.com/6538-1/","reference_id":"USN-6538-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6538-1/"},{"reference_url":"https://usn.ubuntu.com/6538-2/","reference_id":"USN-6538-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6538-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/179?format=json","purl":"pkg:generic/postgresql@12.17.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.17.0"},{"url":"http://public2.vulnerablecode.io/api/packages/178?format=json","purl":"pkg:generic/postgresql@13.13.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.13.0"},{"url":"http://public2.vulnerablecode.io/api/packages/154?format=json","purl":"pkg:generic/postgresql@14.10.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.10.0"},{"url":"http://public2.vulnerablecode.io/api/packages/153?format=json","purl":"pkg:generic/postgresql@15.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/152?format=json","purl":"pkg:generic/postgresql@16.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.1.0"}],"aliases":["CVE-2023-5868"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q5z4-wv12-1fh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3521?format=json","vulnerability_id":"VCID-q8ka-5dxw-w7fs","summary":"Autovacuum, REINDEX, and others omit \"security restricted operation\" sandboxmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1552.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1552.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1552","reference_id":"","reference_type":"","scores":[{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84548","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84686","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84648","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84675","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84685","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84563","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84585","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84588","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84609","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84616","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84635","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.8463","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84625","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84646","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84647","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2022-1552/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2022-1552/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2081126","reference_id":"2081126","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2081126"},{"reference_url":"https://security.archlinux.org/AVG-2719","reference_id":"AVG-2719","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2719"},{"reference_url":"https://security.gentoo.org/glsa/202211-04","reference_id":"GLSA-202211-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4771","reference_id":"RHSA-2022:4771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4805","reference_id":"RHSA-2022:4805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4807","reference_id":"RHSA-2022:4807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4854","reference_id":"RHSA-2022:4854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4855","reference_id":"RHSA-2022:4855","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4855"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4856","reference_id":"RHSA-2022:4856","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4856"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4857","reference_id":"RHSA-2022:4857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4893","reference_id":"RHSA-2022:4893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4894","reference_id":"RHSA-2022:4894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4895","reference_id":"RHSA-2022:4895","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4895"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4913","reference_id":"RHSA-2022:4913","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4913"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4915","reference_id":"RHSA-2022:4915","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4915"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4929","reference_id":"RHSA-2022:4929","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4929"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5162","reference_id":"RHSA-2022:5162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5162"},{"reference_url":"https://usn.ubuntu.com/5440-1/","reference_id":"USN-5440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5440-1/"},{"reference_url":"https://usn.ubuntu.com/5676-1/","reference_id":"USN-5676-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5676-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/286?format=json","purl":"pkg:generic/postgresql@12.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.11.0"},{"url":"http://public2.vulnerablecode.io/api/packages/285?format=json","purl":"pkg:generic/postgresql@13.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.7.0"},{"url":"http://public2.vulnerablecode.io/api/packages/160?format=json","purl":"pkg:generic/postgresql@14.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.3.0"}],"aliases":["CVE-2022-1552"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q8ka-5dxw-w7fs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3522?format=json","vulnerability_id":"VCID-qbd9-mpc6-5bap","summary":"libpq processes unencrypted bytes from man-in-the-middlemore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23222.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23222.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23222","reference_id":"","reference_type":"","scores":[{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51475","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51515","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51508","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51576","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51555","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51624","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51602","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51586","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51628","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51574","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51484","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51535","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51562","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51577","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2021-23222/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2021-23222/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2022675","reference_id":"2022675","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2022675"},{"reference_url":"https://security.archlinux.org/AVG-2547","reference_id":"AVG-2547","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2547"},{"reference_url":"https://security.gentoo.org/glsa/202211-04","reference_id":"GLSA-202211-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5179","reference_id":"RHSA-2021:5179","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5197","reference_id":"RHSA-2021:5197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1891","reference_id":"RHSA-2022:1891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1891"},{"reference_url":"https://usn.ubuntu.com/5145-1/","reference_id":"USN-5145-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5145-1/"},{"reference_url":"https://usn.ubuntu.com/5765-1/","reference_id":"USN-5765-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5765-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/295?format=json","purl":"pkg:generic/postgresql@12.9.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.9.0"},{"url":"http://public2.vulnerablecode.io/api/packages/294?format=json","purl":"pkg:generic/postgresql@13.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/161?format=json","purl":"pkg:generic/postgresql@14.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.1.0"}],"aliases":["CVE-2021-23222"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qbd9-mpc6-5bap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3508?format=json","vulnerability_id":"VCID-rac3-kfb9-efgf","summary":"PostgreSQL row security below e.g. subqueries disregards user ID changesmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10976.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10976.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10976","reference_id":"","reference_type":"","scores":[{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78063","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78028","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.77979","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78008","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.7799","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78017","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78021","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.7803","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78048","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01129","scoring_system":"epss","scoring_elements":"0.78389","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01129","scoring_system":"epss","scoring_elements":"0.78333","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01129","scoring_system":"epss","scoring_elements":"0.78366","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01129","scoring_system":"epss","scoring_elements":"0.78372","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10976"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2024-10976/","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N']"},{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-14T18:53:41Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2024-10976/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2326263","reference_id":"2326263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2326263"},{"reference_url":"https://security.gentoo.org/glsa/202412-12","reference_id":"GLSA-202412-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10785","reference_id":"RHSA-2024:10785","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10787","reference_id":"RHSA-2024:10787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10788","reference_id":"RHSA-2024:10788","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10788"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10791","reference_id":"RHSA-2024:10791","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10791"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10830","reference_id":"RHSA-2024:10830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10831","reference_id":"RHSA-2024:10831","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10831"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10832","reference_id":"RHSA-2024:10832","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10832"},{"reference_url":"https://usn.ubuntu.com/7132-1/","reference_id":"USN-7132-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7132-1/"},{"reference_url":"https://usn.ubuntu.com/7358-1/","reference_id":"USN-7358-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7358-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/169?format=json","purl":"pkg:generic/postgresql@12.21.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.21.0"},{"url":"http://public2.vulnerablecode.io/api/packages/168?format=json","purl":"pkg:generic/postgresql@13.17.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.17.0"},{"url":"http://public2.vulnerablecode.io/api/packages/140?format=json","purl":"pkg:generic/postgresql@14.14.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.14.0"},{"url":"http://public2.vulnerablecode.io/api/packages/139?format=json","purl":"pkg:generic/postgresql@15.9.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.9.0"},{"url":"http://public2.vulnerablecode.io/api/packages/138?format=json","purl":"pkg:generic/postgresql@16.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/137?format=json","purl":"pkg:generic/postgresql@17.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@17.1.0"}],"aliases":["CVE-2024-10976"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rac3-kfb9-efgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3523?format=json","vulnerability_id":"VCID-srbh-8fdq-bkc2","summary":"Server processes unencrypted bytes from man-in-the-middlemore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23214.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23214.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23214","reference_id":"","reference_type":"","scores":[{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41043","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.40956","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41037","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.4157","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.452","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45251","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45245","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4523","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4519","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45213","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45155","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45209","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45197","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2021-23214/","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2021-23214/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2022666","reference_id":"2022666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2022666"},{"reference_url":"https://security.archlinux.org/ASA-202204-1","reference_id":"ASA-202204-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202204-1"},{"reference_url":"https://security.archlinux.org/AVG-2546","reference_id":"AVG-2546","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2546"},{"reference_url":"https://security.gentoo.org/glsa/202211-04","reference_id":"GLSA-202211-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5179","reference_id":"RHSA-2021:5179","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5197","reference_id":"RHSA-2021:5197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5235","reference_id":"RHSA-2021:5235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5236","reference_id":"RHSA-2021:5236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1830","reference_id":"RHSA-2022:1830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1830"},{"reference_url":"https://usn.ubuntu.com/5145-1/","reference_id":"USN-5145-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5145-1/"},{"reference_url":"https://usn.ubuntu.com/5645-1/","reference_id":"USN-5645-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5645-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/295?format=json","purl":"pkg:generic/postgresql@12.9.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.9.0"},{"url":"http://public2.vulnerablecode.io/api/packages/294?format=json","purl":"pkg:generic/postgresql@13.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/161?format=json","purl":"pkg:generic/postgresql@14.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.1.0"}],"aliases":["CVE-2021-23214"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-srbh-8fdq-bkc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3519?format=json","vulnerability_id":"VCID-u751-gq61-fbge","summary":"Client memory disclosure when connecting, with Kerberos, to modified servermore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41862.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41862.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-41862","reference_id":"","reference_type":"","scores":[{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55029","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55118","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55098","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55081","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55119","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55122","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55102","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55036","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55055","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55056","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55082","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55057","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55107","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55106","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-41862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41862"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-152-147-1310-1214-and-1119-released-2592/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-152-147-1310-1214-and-1119-released-2592/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2022-41862/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N']"},{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T16:02:06Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2022-41862/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165722","reference_id":"2165722","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T16:02:06Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165722"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0002/","reference_id":"ntap-20230427-0002","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-07T16:02:06Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1576","reference_id":"RHSA-2023:1576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1693","reference_id":"RHSA-2023:1693","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1693"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4535","reference_id":"RHSA-2023:4535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6429","reference_id":"RHSA-2023:6429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7016","reference_id":"RHSA-2023:7016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7545","reference_id":"RHSA-2023:7545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7580","reference_id":"RHSA-2023:7580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7666","reference_id":"RHSA-2023:7666","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7666"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7667","reference_id":"RHSA-2023:7667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7694","reference_id":"RHSA-2023:7694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7694"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7695","reference_id":"RHSA-2023:7695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7772","reference_id":"RHSA-2023:7772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7772"},{"reference_url":"https://usn.ubuntu.com/5906-1/","reference_id":"USN-5906-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5906-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/185?format=json","purl":"pkg:generic/postgresql@12.14.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.14.0"},{"url":"http://public2.vulnerablecode.io/api/packages/184?format=json","purl":"pkg:generic/postgresql@13.10.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.10.0"},{"url":"http://public2.vulnerablecode.io/api/packages/158?format=json","purl":"pkg:generic/postgresql@14.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.7.0"},{"url":"http://public2.vulnerablecode.io/api/packages/157?format=json","purl":"pkg:generic/postgresql@15.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.2.0"}],"aliases":["CVE-2022-41862"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u751-gq61-fbge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3561?format=json","vulnerability_id":"VCID-umaz-62cm-bqfe","summary":"Uncontrolled search path element in CREATE EXTENSIONmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14350","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08621","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08726","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08648","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08697","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08695","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0872","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08682","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0857","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08558","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08713","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14350"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2020-14350/","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2020-14350/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1865746","reference_id":"1865746","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1865746"},{"reference_url":"https://security.gentoo.org/glsa/202008-13","reference_id":"GLSA-202008-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3669","reference_id":"RHSA-2020:3669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4295","reference_id":"RHSA-2020:4295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4295"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5110","reference_id":"RHSA-2020:5110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5112","reference_id":"RHSA-2020:5112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5620","reference_id":"RHSA-2020:5620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0163","reference_id":"RHSA-2021:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0988","reference_id":"RHSA-2021:0988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0988"},{"reference_url":"https://usn.ubuntu.com/4472-1/","reference_id":"USN-4472-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4472-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/305?format=json","purl":"pkg:generic/postgresql@12.4.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.4.0"}],"aliases":["CVE-2020-14350"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-umaz-62cm-bqfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3564?format=json","vulnerability_id":"VCID-wamn-1as1-qbfa","summary":"ALTER ... DEPENDS ON EXTENSION is missing authorization checks.more details","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1720","reference_id":"","reference_type":"","scores":[{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57428","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57501","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57567","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57563","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57543","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57502","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57522","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57512","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57509","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57562","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57566","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57581","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57561","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57539","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1720"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/2011/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/2011/"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2020-1720/","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2020-1720/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1798852","reference_id":"1798852","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1798852"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1720","reference_id":"CVE-2020-1720","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:P/A:N"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1720"},{"reference_url":"https://security.gentoo.org/glsa/202003-03","reference_id":"GLSA-202003-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0980","reference_id":"RHSA-2020:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0980"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3669","reference_id":"RHSA-2020:3669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4295","reference_id":"RHSA-2020:4295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4295"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5112","reference_id":"RHSA-2020:5112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5620","reference_id":"RHSA-2020:5620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0163","reference_id":"RHSA-2021:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://usn.ubuntu.com/4282-1/","reference_id":"USN-4282-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4282-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/316?format=json","purl":"pkg:generic/postgresql@12.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.2.0"}],"aliases":["CVE-2020-1720"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wamn-1as1-qbfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3505?format=json","vulnerability_id":"VCID-wxxg-2f53-w3ey","summary":"PostgreSQL PL/Perl environment variable changes execute arbitrary codemore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10979.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10979.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10979","reference_id":"","reference_type":"","scores":[{"value":"0.06857","scoring_system":"epss","scoring_elements":"0.91399","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06857","scoring_system":"epss","scoring_elements":"0.91392","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06857","scoring_system":"epss","scoring_elements":"0.9139","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06857","scoring_system":"epss","scoring_elements":"0.91402","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06857","scoring_system":"epss","scoring_elements":"0.914","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06857","scoring_system":"epss","scoring_elements":"0.91321","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06857","scoring_system":"epss","scoring_elements":"0.91332","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06857","scoring_system":"epss","scoring_elements":"0.91339","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06857","scoring_system":"epss","scoring_elements":"0.91351","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06857","scoring_system":"epss","scoring_elements":"0.91358","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06857","scoring_system":"epss","scoring_elements":"0.91365","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06857","scoring_system":"epss","scoring_elements":"0.91367","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10979"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2024-10979/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T14:32:36Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2024-10979/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2326253","reference_id":"2326253","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2326253"},{"reference_url":"https://security.gentoo.org/glsa/202412-12","reference_id":"GLSA-202412-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10593","reference_id":"RHSA-2024:10593","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10593"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10595","reference_id":"RHSA-2024:10595","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10595"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10677","reference_id":"RHSA-2024:10677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10705","reference_id":"RHSA-2024:10705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10736","reference_id":"RHSA-2024:10736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10739","reference_id":"RHSA-2024:10739","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10739"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10750","reference_id":"RHSA-2024:10750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10785","reference_id":"RHSA-2024:10785","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10787","reference_id":"RHSA-2024:10787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10788","reference_id":"RHSA-2024:10788","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10788"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10789","reference_id":"RHSA-2024:10789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10791","reference_id":"RHSA-2024:10791","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10791"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10800","reference_id":"RHSA-2024:10800","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10800"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10807","reference_id":"RHSA-2024:10807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10827","reference_id":"RHSA-2024:10827","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10827"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10830","reference_id":"RHSA-2024:10830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10831","reference_id":"RHSA-2024:10831","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10831"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10832","reference_id":"RHSA-2024:10832","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10832"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10846","reference_id":"RHSA-2024:10846","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10846"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10851","reference_id":"RHSA-2024:10851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10879","reference_id":"RHSA-2024:10879","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10882","reference_id":"RHSA-2024:10882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10882"},{"reference_url":"https://usn.ubuntu.com/7132-1/","reference_id":"USN-7132-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7132-1/"},{"reference_url":"https://usn.ubuntu.com/7358-1/","reference_id":"USN-7358-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7358-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/169?format=json","purl":"pkg:generic/postgresql@12.21.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.21.0"},{"url":"http://public2.vulnerablecode.io/api/packages/168?format=json","purl":"pkg:generic/postgresql@13.17.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.17.0"},{"url":"http://public2.vulnerablecode.io/api/packages/140?format=json","purl":"pkg:generic/postgresql@14.14.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.14.0"},{"url":"http://public2.vulnerablecode.io/api/packages/139?format=json","purl":"pkg:generic/postgresql@15.9.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.9.0"},{"url":"http://public2.vulnerablecode.io/api/packages/138?format=json","purl":"pkg:generic/postgresql@16.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/137?format=json","purl":"pkg:generic/postgresql@17.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@17.1.0"}],"aliases":["CVE-2024-10979"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wxxg-2f53-w3ey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3558?format=json","vulnerability_id":"VCID-xjv3-x91m-qqhn","summary":"psql's \\gset allows overwriting specially treated variablesmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25696","reference_id":"","reference_type":"","scores":[{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64626","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64766","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64739","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64757","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.6477","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64678","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64706","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64727","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64744","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64733","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64705","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64741","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64752","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2020-25696/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2020-25696/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894430","reference_id":"1894430","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894430"},{"reference_url":"https://security.archlinux.org/ASA-202011-14","reference_id":"ASA-202011-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-14"},{"reference_url":"https://security.archlinux.org/AVG-1276","reference_id":"AVG-1276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1276"},{"reference_url":"https://security.gentoo.org/glsa/202012-07","reference_id":"GLSA-202012-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5316","reference_id":"RHSA-2020:5316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5317","reference_id":"RHSA-2020:5317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5401","reference_id":"RHSA-2020:5401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5401"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5567","reference_id":"RHSA-2020:5567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5620","reference_id":"RHSA-2020:5620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5638","reference_id":"RHSA-2020:5638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0057","reference_id":"RHSA-2021:0057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0161","reference_id":"RHSA-2021:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0163","reference_id":"RHSA-2021:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0165","reference_id":"RHSA-2021:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://usn.ubuntu.com/4633-1/","reference_id":"USN-4633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4633-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/300?format=json","purl":"pkg:generic/postgresql@12.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/299?format=json","purl":"pkg:generic/postgresql@13.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0"}],"aliases":["CVE-2020-25696"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xjv3-x91m-qqhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3513?format=json","vulnerability_id":"VCID-y871-sfhf-a7by","summary":"Extension script @substitutions@ within quoting allow SQL injectionmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39417.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-39417","reference_id":"","reference_type":"","scores":[{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71012","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.7103","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71005","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71047","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71062","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71085","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.7107","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71053","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.711","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71107","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71579","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71584","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71521","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71572","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-39417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-154-149-1312-1216-1121-and-postgresql-16-beta-3-released-2689/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-154-149-1312-1216-1121-and-postgresql-16-beta-3-released-2689/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2023-39417/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2023-39417/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228111","reference_id":"2228111","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228111"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8","reference_id":"cpe:/a:redhat:advanced_cluster_security:3.74::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8","reference_id":"cpe:/a:redhat:advanced_cluster_security:4.1::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8","reference_id":"cpe:/a:redhat:advanced_cluster_security:4.2::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.0::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.2::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3","reference_id":"cpe:/a:redhat:rhel_software_collections:3","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7","reference_id":"cpe:/a:redhat:rhel_software_collections:3::el7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-39417","reference_id":"CVE-2023-39417","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-39417"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2023-39417","reference_id":"CVE-2023-39417","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2023-39417"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7545","reference_id":"RHSA-2023:7545","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7579","reference_id":"RHSA-2023:7579","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7580","reference_id":"RHSA-2023:7580","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7581","reference_id":"RHSA-2023:7581","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7581"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7616","reference_id":"RHSA-2023:7616","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7656","reference_id":"RHSA-2023:7656","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7666","reference_id":"RHSA-2023:7666","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7666"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7667","reference_id":"RHSA-2023:7667","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7694","reference_id":"RHSA-2023:7694","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7694"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7695","reference_id":"RHSA-2023:7695","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7714","reference_id":"RHSA-2023:7714","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7714"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7770","reference_id":"RHSA-2023:7770","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7772","reference_id":"RHSA-2023:7772","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7784","reference_id":"RHSA-2023:7784","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7785","reference_id":"RHSA-2023:7785","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7883","reference_id":"RHSA-2023:7883","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7884","reference_id":"RHSA-2023:7884","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7884"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7885","reference_id":"RHSA-2023:7885","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7885"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0304","reference_id":"RHSA-2024:0304","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0332","reference_id":"RHSA-2024:0332","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0337","reference_id":"RHSA-2024:0337","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0337"},{"reference_url":"https://usn.ubuntu.com/6296-1/","reference_id":"USN-6296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6296-1/"},{"reference_url":"https://usn.ubuntu.com/6366-1/","reference_id":"USN-6366-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6366-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/176?format=json","purl":"pkg:generic/postgresql@12.16.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.16.0"},{"url":"http://public2.vulnerablecode.io/api/packages/175?format=json","purl":"pkg:generic/postgresql@13.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/151?format=json","purl":"pkg:generic/postgresql@14.9.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.9.0"},{"url":"http://public2.vulnerablecode.io/api/packages/150?format=json","purl":"pkg:generic/postgresql@15.4.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.4.0"}],"aliases":["CVE-2023-39417"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y871-sfhf-a7by"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3594?format=json","vulnerability_id":"VCID-yy3k-mszq-cbcs","summary":"Memory disclosure in certain queriesmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3677.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3677.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3677","reference_id":"","reference_type":"","scores":[{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42211","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42323","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42273","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42286","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42314","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42256","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42307","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42301","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42337","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45171","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45311","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45223","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4523","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45363","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-134-128-1113-1018-9623-and-14-beta-3-released-2277/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-134-128-1113-1018-9623-and-14-beta-3-released-2277/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2021-3677/","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2021-3677/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2001857","reference_id":"2001857","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2001857"},{"reference_url":"https://security.archlinux.org/AVG-2290","reference_id":"AVG-2290","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2290"},{"reference_url":"https://security.gentoo.org/glsa/202211-04","reference_id":"GLSA-202211-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5179","reference_id":"RHSA-2021:5179","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5197","reference_id":"RHSA-2021:5197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5235","reference_id":"RHSA-2021:5235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5236","reference_id":"RHSA-2021:5236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4931","reference_id":"RHSA-2022:4931","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4931"},{"reference_url":"https://usn.ubuntu.com/5038-1/","reference_id":"USN-5038-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5038-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/395?format=json","purl":"pkg:generic/postgresql@12.8.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.8.0"},{"url":"http://public2.vulnerablecode.io/api/packages/394?format=json","purl":"pkg:generic/postgresql@13.4.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.4.0"}],"aliases":["CVE-2021-3677"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yy3k-mszq-cbcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3529?format=json","vulnerability_id":"VCID-zrcc-w98g-gfhk","summary":"pg_ctlcluster script in postgresql-common does not drop privileges when creating socket/statistics temporary directoriesmore details","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3466","reference_id":"","reference_type":"","scores":[{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31812","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3219","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32181","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3202","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31892","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32326","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32364","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32188","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32265","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32266","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32228","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32198","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32231","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3221","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3466"},{"reference_url":"https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/","reference_id":"","reference_type":"","scores":[],"url":"https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466"},{"reference_url":"https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2019-3466/","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2019-3466/"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3466","reference_id":"CVE-2019-3466","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3466"},{"reference_url":"https://usn.ubuntu.com/4194-1/","reference_id":"USN-4194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4194-1/"},{"reference_url":"https://usn.ubuntu.com/4194-2/","reference_id":"USN-4194-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4194-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/210?format=json","purl":"pkg:generic/postgresql@12.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.1.0"}],"aliases":["CVE-2019-3466"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zrcc-w98g-gfhk"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.0.0"}