Lookup for vulnerable packages by Package URL.

GET /api/packages/174?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/174?format=api",
    "purl": "pkg:generic/postgresql@11.0.0",
    "type": "generic",
    "namespace": "",
    "name": "postgresql",
    "version": "11.0.0",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "11.1.0",
    "latest_non_vulnerable_version": "18.2.0",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3567?format=api",
            "vulnerability_id": "VCID-1rgq-t3wa-2fck",
            "summary": "SQL injection in pg_upgrade and pg_dump, via CREATE TRIGGER ... REFERENCING.more details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16850.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16850.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16850",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79805",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79813",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79834",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79851",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79859",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7988",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79863",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79856",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79884",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79885",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79888",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79916",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79923",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7994",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01317",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79955",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16850"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-111-106-9611-9515-9420-and-9325-released-1905/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-111-106-9611-9515-9420-and-9325-released-1905/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2018-16850/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2018-16850/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645937",
                    "reference_id": "1645937",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645937"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201811-24",
                    "reference_id": "GLSA-201811-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201811-24"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3757",
                    "reference_id": "RHSA-2018:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3818-1/",
                    "reference_id": "USN-3818-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3818-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/326?format=api",
                    "purl": "pkg:generic/postgresql@11.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.1.0"
                }
            ],
            "aliases": [
                "CVE-2018-16850"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1rgq-t3wa-2fck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3560?format=api",
            "vulnerability_id": "VCID-36gv-m96w-47db",
            "summary": "Reconnection can downgrade connection security settingsmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58007",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58051",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58124",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58104",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5809",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58091",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58113",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58087",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58142",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58145",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5816",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58137",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58118",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58148",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58149",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25694"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2020-25694/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2020-25694/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894423",
                    "reference_id": "1894423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894423"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-14",
                    "reference_id": "ASA-202011-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-14"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1276",
                    "reference_id": "AVG-1276",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1276"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-07",
                    "reference_id": "GLSA-202012-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202012-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5316",
                    "reference_id": "RHSA-2020:5316",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5316"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5317",
                    "reference_id": "RHSA-2020:5317",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5317"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5401",
                    "reference_id": "RHSA-2020:5401",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5401"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5567",
                    "reference_id": "RHSA-2020:5567",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5567"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619",
                    "reference_id": "RHSA-2020:5619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5619"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620",
                    "reference_id": "RHSA-2020:5620",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5620"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5638",
                    "reference_id": "RHSA-2020:5638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661",
                    "reference_id": "RHSA-2020:5661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0057",
                    "reference_id": "RHSA-2021:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0161",
                    "reference_id": "RHSA-2021:0161",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0161"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163",
                    "reference_id": "RHSA-2021:0163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0163"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164",
                    "reference_id": "RHSA-2021:0164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0165",
                    "reference_id": "RHSA-2021:0165",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0165"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167",
                    "reference_id": "RHSA-2021:0167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0167"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1512",
                    "reference_id": "RHSA-2021:1512",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1512"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4633-1/",
                    "reference_id": "USN-4633-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4633-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/301?format=api",
                    "purl": "pkg:generic/postgresql@11.10.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/300?format=api",
                    "purl": "pkg:generic/postgresql@12.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/299?format=api",
                    "purl": "pkg:generic/postgresql@13.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0"
                }
            ],
            "aliases": [
                "CVE-2020-25694"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-36gv-m96w-47db"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3517?format=api",
            "vulnerability_id": "VCID-3kph-5gzq-ryhu",
            "summary": "Row security policies disregard user ID changes after inliningmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2455.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2455.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4378",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43756",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45175",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45469",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45464",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45414",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45331",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45338",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45277",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45369",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45424",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45425",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45447",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45417",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45418",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2455"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2023-2455/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N']"
                        },
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T17:13:19Z/"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2023-2455/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207569",
                    "reference_id": "2207569",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207569"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-2455",
                    "reference_id": "CVE-2023-2455",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T17:13:19Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-2455"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230706-0006/",
                    "reference_id": "ntap-20230706-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T17:13:19Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230706-0006/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3714",
                    "reference_id": "RHSA-2023:3714",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3714"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4313",
                    "reference_id": "RHSA-2023:4313",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4313"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4327",
                    "reference_id": "RHSA-2023:4327",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4327"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4527",
                    "reference_id": "RHSA-2023:4527",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4527"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4535",
                    "reference_id": "RHSA-2023:4535",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4535"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4539",
                    "reference_id": "RHSA-2023:4539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4539"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5269",
                    "reference_id": "RHSA-2023:5269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5269"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7545",
                    "reference_id": "RHSA-2023:7545",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7545"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7580",
                    "reference_id": "RHSA-2023:7580",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7580"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7666",
                    "reference_id": "RHSA-2023:7666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7666"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7667",
                    "reference_id": "RHSA-2023:7667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7694",
                    "reference_id": "RHSA-2023:7694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7694"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7695",
                    "reference_id": "RHSA-2023:7695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7695"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7772",
                    "reference_id": "RHSA-2023:7772",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7772"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6104-1/",
                    "reference_id": "USN-6104-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6104-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/183?format=api",
                    "purl": "pkg:generic/postgresql@11.20.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.20.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/182?format=api",
                    "purl": "pkg:generic/postgresql@12.15.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.15.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/181?format=api",
                    "purl": "pkg:generic/postgresql@13.11.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.11.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/156?format=api",
                    "purl": "pkg:generic/postgresql@14.8.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.8.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/155?format=api",
                    "purl": "pkg:generic/postgresql@15.3.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.3.0"
                }
            ],
            "aliases": [
                "CVE-2023-2455"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "4.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3kph-5gzq-ryhu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3557?format=api",
            "vulnerability_id": "VCID-4jdp-3xqp-ufap",
            "summary": "Buffer overrun from integer overflow in array subscripting calculationsmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32027",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65502",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65621",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65634",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65645",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65644",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6555",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6558",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65546",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65599",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65611",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6563",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65616",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65587",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65623",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65635",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65619",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32027"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2021-32027/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2021-32027/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956876",
                    "reference_id": "1956876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956876"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202106-15",
                    "reference_id": "ASA-202106-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202106-15"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1956",
                    "reference_id": "AVG-1956",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1956"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202211-04",
                    "reference_id": "GLSA-202211-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202211-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2360",
                    "reference_id": "RHSA-2021:2360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2360"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2361",
                    "reference_id": "RHSA-2021:2361",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2361"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2372",
                    "reference_id": "RHSA-2021:2372",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2372"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2375",
                    "reference_id": "RHSA-2021:2375",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2375"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2389",
                    "reference_id": "RHSA-2021:2389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2389"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2390",
                    "reference_id": "RHSA-2021:2390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2390"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2391",
                    "reference_id": "RHSA-2021:2391",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2391"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2392",
                    "reference_id": "RHSA-2021:2392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2393",
                    "reference_id": "RHSA-2021:2393",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2393"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2394",
                    "reference_id": "RHSA-2021:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2394"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2395",
                    "reference_id": "RHSA-2021:2395",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2395"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2396",
                    "reference_id": "RHSA-2021:2396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2396"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2397",
                    "reference_id": "RHSA-2021:2397",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2397"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4972-1/",
                    "reference_id": "USN-4972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4972-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5645-1/",
                    "reference_id": "USN-5645-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5645-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/291?format=api",
                    "purl": "pkg:generic/postgresql@11.12.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/290?format=api",
                    "purl": "pkg:generic/postgresql@12.7.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/289?format=api",
                    "purl": "pkg:generic/postgresql@13.3.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0"
                }
            ],
            "aliases": [
                "CVE-2021-32027"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4jdp-3xqp-ufap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3518?format=api",
            "vulnerability_id": "VCID-5py6-fe2j-d3f4",
            "summary": "CREATE SCHEMA ... schema_element defeats protective search_path changesmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2454.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2454.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2454",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45609",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45587",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4615",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46244",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46299",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46288",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46307",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47576",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47631",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47627",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47651",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47636",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47694",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47686",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2454"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2023-2454/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H']"
                        },
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2023-2454/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207568",
                    "reference_id": "2207568",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207568"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-2454",
                    "reference_id": "CVE-2023-2454",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-2454"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230706-0006/",
                    "reference_id": "ntap-20230706-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230706-0006/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3714",
                    "reference_id": "RHSA-2023:3714",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3714"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4313",
                    "reference_id": "RHSA-2023:4313",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4313"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4327",
                    "reference_id": "RHSA-2023:4327",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4327"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4527",
                    "reference_id": "RHSA-2023:4527",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4527"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4535",
                    "reference_id": "RHSA-2023:4535",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4535"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4539",
                    "reference_id": "RHSA-2023:4539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4539"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5269",
                    "reference_id": "RHSA-2023:5269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5269"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7545",
                    "reference_id": "RHSA-2023:7545",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7545"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7580",
                    "reference_id": "RHSA-2023:7580",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7580"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7666",
                    "reference_id": "RHSA-2023:7666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7666"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7667",
                    "reference_id": "RHSA-2023:7667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7694",
                    "reference_id": "RHSA-2023:7694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7694"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7695",
                    "reference_id": "RHSA-2023:7695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7695"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7772",
                    "reference_id": "RHSA-2023:7772",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7772"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6104-1/",
                    "reference_id": "USN-6104-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6104-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6230-1/",
                    "reference_id": "USN-6230-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6230-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/183?format=api",
                    "purl": "pkg:generic/postgresql@11.20.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.20.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/182?format=api",
                    "purl": "pkg:generic/postgresql@12.15.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.15.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/181?format=api",
                    "purl": "pkg:generic/postgresql@13.11.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.11.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/156?format=api",
                    "purl": "pkg:generic/postgresql@14.8.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.8.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/155?format=api",
                    "purl": "pkg:generic/postgresql@15.3.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.3.0"
                }
            ],
            "aliases": [
                "CVE-2023-2454"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5py6-fe2j-d3f4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3556?format=api",
            "vulnerability_id": "VCID-8p8h-jdyq-vfek",
            "summary": "Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATEmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64362",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64512",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64479",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.645",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64513",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64445",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64405",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64453",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64469",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64481",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64441",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64475",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64487",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32028"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2021-32028/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2021-32028/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956877",
                    "reference_id": "1956877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956877"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202106-15",
                    "reference_id": "ASA-202106-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202106-15"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1956",
                    "reference_id": "AVG-1956",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1956"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202211-04",
                    "reference_id": "GLSA-202211-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202211-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2360",
                    "reference_id": "RHSA-2021:2360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2360"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2361",
                    "reference_id": "RHSA-2021:2361",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2361"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2372",
                    "reference_id": "RHSA-2021:2372",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2372"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2375",
                    "reference_id": "RHSA-2021:2375",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2375"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2389",
                    "reference_id": "RHSA-2021:2389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2389"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2390",
                    "reference_id": "RHSA-2021:2390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2390"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2391",
                    "reference_id": "RHSA-2021:2391",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2391"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2392",
                    "reference_id": "RHSA-2021:2392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2393",
                    "reference_id": "RHSA-2021:2393",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2393"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2394",
                    "reference_id": "RHSA-2021:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2394"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2395",
                    "reference_id": "RHSA-2021:2395",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2395"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2396",
                    "reference_id": "RHSA-2021:2396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2396"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4972-1/",
                    "reference_id": "USN-4972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4972-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/291?format=api",
                    "purl": "pkg:generic/postgresql@11.12.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/290?format=api",
                    "purl": "pkg:generic/postgresql@12.7.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/289?format=api",
                    "purl": "pkg:generic/postgresql@13.3.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0"
                }
            ],
            "aliases": [
                "CVE-2021-32028"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8p8h-jdyq-vfek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3526?format=api",
            "vulnerability_id": "VCID-bb5j-e9vw-mbd1",
            "summary": "TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER executionmore details",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10208.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10208.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40573",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40225",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40671",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4064",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40563",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40461",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40447",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40366",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40654",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40682",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40603",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40653",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40662",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4068",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40643",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40625",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10208"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10208"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/1960/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/1960/"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10208/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2019-10208/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734416",
                    "reference_id": "1734416",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734416"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201908-7",
                    "reference_id": "ASA-201908-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201908-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201908-8",
                    "reference_id": "ASA-201908-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201908-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1019",
                    "reference_id": "AVG-1019",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1019"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10208",
                    "reference_id": "CVE-2019-10208",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10208"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980",
                    "reference_id": "RHSA-2020:0980",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0980"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669",
                    "reference_id": "RHSA-2020:3669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295",
                    "reference_id": "RHSA-2020:4295",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4295"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619",
                    "reference_id": "RHSA-2020:5619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5619"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661",
                    "reference_id": "RHSA-2020:5661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164",
                    "reference_id": "RHSA-2021:0164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167",
                    "reference_id": "RHSA-2021:0167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0167"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1512",
                    "reference_id": "RHSA-2021:1512",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1512"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4090-1/",
                    "reference_id": "USN-4090-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4090-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/200?format=api",
                    "purl": "pkg:generic/postgresql@11.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.5.0"
                }
            ],
            "aliases": [
                "CVE-2019-10208"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bb5j-e9vw-mbd1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3559?format=api",
            "vulnerability_id": "VCID-bdw5-v87c-zyfj",
            "summary": "Multiple features escape \"security restricted operation\" sandboxmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.22672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95843",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.22672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95826",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.22672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95854",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.22672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95845",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.22672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95835",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.23757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96032",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.23757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9602",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.23757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96022",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.23757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96021",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.23757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95999",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.23757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96003",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.23757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96005",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.23757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96015",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2020-25695/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2020-25695/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894425",
                    "reference_id": "1894425",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894425"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-14",
                    "reference_id": "ASA-202011-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-14"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1276",
                    "reference_id": "AVG-1276",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1276"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-07",
                    "reference_id": "GLSA-202012-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202012-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5316",
                    "reference_id": "RHSA-2020:5316",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5316"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5317",
                    "reference_id": "RHSA-2020:5317",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5317"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5567",
                    "reference_id": "RHSA-2020:5567",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5567"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619",
                    "reference_id": "RHSA-2020:5619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5619"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620",
                    "reference_id": "RHSA-2020:5620",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5620"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661",
                    "reference_id": "RHSA-2020:5661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0161",
                    "reference_id": "RHSA-2021:0161",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0161"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163",
                    "reference_id": "RHSA-2021:0163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0163"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164",
                    "reference_id": "RHSA-2021:0164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167",
                    "reference_id": "RHSA-2021:0167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0167"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1512",
                    "reference_id": "RHSA-2021:1512",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1512"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4633-1/",
                    "reference_id": "USN-4633-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4633-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/301?format=api",
                    "purl": "pkg:generic/postgresql@11.10.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/300?format=api",
                    "purl": "pkg:generic/postgresql@12.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/299?format=api",
                    "purl": "pkg:generic/postgresql@13.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0"
                }
            ],
            "aliases": [
                "CVE-2020-25695"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bdw5-v87c-zyfj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3595?format=api",
            "vulnerability_id": "VCID-brqx-ae92-83ep",
            "summary": "Partition constraint violation errors leak values of denied columnsmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3393.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3393.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3393",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28432",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28405",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2839",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28526",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28568",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28371",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28436",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28479",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28439",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28482",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28729",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2906",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28949",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28876",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29224",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2918",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3393"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3393",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3393"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-132-126-1111-1016-9621-and-9525-released-2165/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-132-126-1111-1016-9621-and-9525-released-2165/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2021-3393/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2021-3393/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924005",
                    "reference_id": "1924005",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924005"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202102-31",
                    "reference_id": "ASA-202102-31",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202102-31"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1567",
                    "reference_id": "AVG-1567",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1567"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-32",
                    "reference_id": "GLSA-202105-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2372",
                    "reference_id": "RHSA-2021:2372",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2372"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2389",
                    "reference_id": "RHSA-2021:2389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2389"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2394",
                    "reference_id": "RHSA-2021:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2394"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4735-1/",
                    "reference_id": "USN-4735-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4735-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/399?format=api",
                    "purl": "pkg:generic/postgresql@11.11.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.11.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/398?format=api",
                    "purl": "pkg:generic/postgresql@12.6.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.6.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/397?format=api",
                    "purl": "pkg:generic/postgresql@13.2.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.2.0"
                }
            ],
            "aliases": [
                "CVE-2021-3393"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-brqx-ae92-83ep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3562?format=api",
            "vulnerability_id": "VCID-cegf-gbkv-aqab",
            "summary": "Uncontrolled search path element in logical replicationmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14349.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14349.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81342",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81496",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81474",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81478",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81351",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81373",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81371",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81399",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81404",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81425",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81413",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81405",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81442",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81443",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81445",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01548",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81466",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14349"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2020-14349/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2020-14349/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865744",
                    "reference_id": "1865744",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865744"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202008-13",
                    "reference_id": "GLSA-202008-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202008-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669",
                    "reference_id": "RHSA-2020:3669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5110",
                    "reference_id": "RHSA-2020:5110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5112",
                    "reference_id": "RHSA-2020:5112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5112"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620",
                    "reference_id": "RHSA-2020:5620",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5620"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163",
                    "reference_id": "RHSA-2021:0163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0163"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0988",
                    "reference_id": "RHSA-2021:0988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0988"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4472-1/",
                    "reference_id": "USN-4472-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4472-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/306?format=api",
                    "purl": "pkg:generic/postgresql@11.9.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.9.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/305?format=api",
                    "purl": "pkg:generic/postgresql@12.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.4.0"
                }
            ],
            "aliases": [
                "CVE-2020-14349"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cegf-gbkv-aqab"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3593?format=api",
            "vulnerability_id": "VCID-dv4x-n7v8-vyfh",
            "summary": "Memory disclosure in partitioned-table UPDATE ... RETURNINGmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32029.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32029.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37703",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37769",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37831",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37885",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37909",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37788",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37838",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37851",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37866",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37804",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38525",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38759",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38735",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38647",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32029"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2021-32029/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2021-32029/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956883",
                    "reference_id": "1956883",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956883"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202106-15",
                    "reference_id": "ASA-202106-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202106-15"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1956",
                    "reference_id": "AVG-1956",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1956"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2372",
                    "reference_id": "RHSA-2021:2372",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2372"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2375",
                    "reference_id": "RHSA-2021:2375",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2375"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2389",
                    "reference_id": "RHSA-2021:2389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2389"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2394",
                    "reference_id": "RHSA-2021:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2394"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2396",
                    "reference_id": "RHSA-2021:2396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2396"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4972-1/",
                    "reference_id": "USN-4972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4972-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/291?format=api",
                    "purl": "pkg:generic/postgresql@11.12.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/290?format=api",
                    "purl": "pkg:generic/postgresql@12.7.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/289?format=api",
                    "purl": "pkg:generic/postgresql@13.3.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0"
                }
            ],
            "aliases": [
                "CVE-2021-32029"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dv4x-n7v8-vyfh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3515?format=api",
            "vulnerability_id": "VCID-dwqe-a6p3-tyf6",
            "summary": "Buffer overrun from integer overflow in array modificationmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5869.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5869.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5869",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81841",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81744",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81763",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81751",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81745",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81783",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81784",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81692",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81716",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81713",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81739",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82055",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82078",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82089",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01652",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82093",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5869"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2023-5869/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2023-5869/"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283",
                    "reference_id": "1056283",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247169",
                    "reference_id": "2247169",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247169"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202408-06",
                    "reference_id": "GLSA-202408-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202408-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7545",
                    "reference_id": "RHSA-2023:7545",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7545"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7579",
                    "reference_id": "RHSA-2023:7579",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7579"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7580",
                    "reference_id": "RHSA-2023:7580",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7580"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7581",
                    "reference_id": "RHSA-2023:7581",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7581"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7616",
                    "reference_id": "RHSA-2023:7616",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7616"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7656",
                    "reference_id": "RHSA-2023:7656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7656"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7666",
                    "reference_id": "RHSA-2023:7666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7666"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7667",
                    "reference_id": "RHSA-2023:7667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7694",
                    "reference_id": "RHSA-2023:7694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7694"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7695",
                    "reference_id": "RHSA-2023:7695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7695"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7714",
                    "reference_id": "RHSA-2023:7714",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7714"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7770",
                    "reference_id": "RHSA-2023:7770",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7770"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7771",
                    "reference_id": "RHSA-2023:7771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7771"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7772",
                    "reference_id": "RHSA-2023:7772",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7772"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7778",
                    "reference_id": "RHSA-2023:7778",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7778"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7783",
                    "reference_id": "RHSA-2023:7783",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7783"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7784",
                    "reference_id": "RHSA-2023:7784",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7784"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7785",
                    "reference_id": "RHSA-2023:7785",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7785"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7786",
                    "reference_id": "RHSA-2023:7786",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7786"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7788",
                    "reference_id": "RHSA-2023:7788",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7788"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7789",
                    "reference_id": "RHSA-2023:7789",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7790",
                    "reference_id": "RHSA-2023:7790",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7878",
                    "reference_id": "RHSA-2023:7878",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7878"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7883",
                    "reference_id": "RHSA-2023:7883",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7883"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7884",
                    "reference_id": "RHSA-2023:7884",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7884"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7885",
                    "reference_id": "RHSA-2023:7885",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7885"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0304",
                    "reference_id": "RHSA-2024:0304",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0304"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0332",
                    "reference_id": "RHSA-2024:0332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0332"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0337",
                    "reference_id": "RHSA-2024:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0337"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6538-1/",
                    "reference_id": "USN-6538-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6538-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6538-2/",
                    "reference_id": "USN-6538-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6538-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6570-1/",
                    "reference_id": "USN-6570-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6570-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/180?format=api",
                    "purl": "pkg:generic/postgresql@11.22.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.22.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/179?format=api",
                    "purl": "pkg:generic/postgresql@12.17.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.17.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/178?format=api",
                    "purl": "pkg:generic/postgresql@13.13.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.13.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/154?format=api",
                    "purl": "pkg:generic/postgresql@14.10.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.10.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/153?format=api",
                    "purl": "pkg:generic/postgresql@15.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.5.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/152?format=api",
                    "purl": "pkg:generic/postgresql@16.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.1.0"
                }
            ],
            "aliases": [
                "CVE-2023-5869"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dwqe-a6p3-tyf6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3520?format=api",
            "vulnerability_id": "VCID-nuek-ypyh-b3dm",
            "summary": "Extension scripts replace objects not belonging to the extensionmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76742",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76743",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76755",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76616",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76645",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76627",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7666",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76671",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76698",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76678",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7667",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76712",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76717",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76706",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00973",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76737",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2625"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2022-2625/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2022-2625/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113825",
                    "reference_id": "2113825",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113825"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202211-04",
                    "reference_id": "GLSA-202211-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202211-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7128",
                    "reference_id": "RHSA-2022:7128",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7128"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0113",
                    "reference_id": "RHSA-2023:0113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0113"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0160",
                    "reference_id": "RHSA-2023:0160",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0160"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1576",
                    "reference_id": "RHSA-2023:1576",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1576"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1693",
                    "reference_id": "RHSA-2023:1693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1693"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7545",
                    "reference_id": "RHSA-2023:7545",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7545"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7580",
                    "reference_id": "RHSA-2023:7580",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7580"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7667",
                    "reference_id": "RHSA-2023:7667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7694",
                    "reference_id": "RHSA-2023:7694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7694"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7695",
                    "reference_id": "RHSA-2023:7695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7695"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5571-1/",
                    "reference_id": "USN-5571-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5571-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/283?format=api",
                    "purl": "pkg:generic/postgresql@11.17.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.17.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/282?format=api",
                    "purl": "pkg:generic/postgresql@12.12.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.12.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/281?format=api",
                    "purl": "pkg:generic/postgresql@13.8.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.8.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/159?format=api",
                    "purl": "pkg:generic/postgresql@14.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.5.0"
                }
            ],
            "aliases": [
                "CVE-2022-2625"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nuek-ypyh-b3dm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3514?format=api",
            "vulnerability_id": "VCID-nwfr-t7xn-zuae",
            "summary": "Role \"pg_signal_backend\" can signal certain superuser processesmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5870.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5870.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5870",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7002",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7007",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70113",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70123",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70102",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70153",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7016",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70161",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70136",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70035",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70011",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70059",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70075",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70098",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70083",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5870"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2023-5870/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L']"
                        },
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2023-5870/"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283",
                    "reference_id": "1056283",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247170",
                    "reference_id": "2247170",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247170"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8",
                    "reference_id": "cpe:/a:redhat:advanced_cluster_security:3.74::el8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8",
                    "reference_id": "cpe:/a:redhat:advanced_cluster_security:4.1::el8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8",
                    "reference_id": "cpe:/a:redhat:advanced_cluster_security:4.2::el8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_aus:8.2::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_aus:8.4::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_e4s:8.2::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_e4s:8.4::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.6::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.0::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.0::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3",
                    "reference_id": "cpe:/a:redhat:rhel_software_collections:3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7",
                    "reference_id": "cpe:/a:redhat:rhel_software_collections:3::el7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_tus:8.2::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_tus:8.4::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-5870",
                    "reference_id": "CVE-2023-5870",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-5870"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202408-06",
                    "reference_id": "GLSA-202408-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202408-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7545",
                    "reference_id": "RHSA-2023:7545",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7545"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7579",
                    "reference_id": "RHSA-2023:7579",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7579"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7580",
                    "reference_id": "RHSA-2023:7580",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7580"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7581",
                    "reference_id": "RHSA-2023:7581",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7581"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7616",
                    "reference_id": "RHSA-2023:7616",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7616"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7656",
                    "reference_id": "RHSA-2023:7656",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7656"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7666",
                    "reference_id": "RHSA-2023:7666",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7666"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7667",
                    "reference_id": "RHSA-2023:7667",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7694",
                    "reference_id": "RHSA-2023:7694",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7694"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7695",
                    "reference_id": "RHSA-2023:7695",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7695"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7714",
                    "reference_id": "RHSA-2023:7714",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7714"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7770",
                    "reference_id": "RHSA-2023:7770",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7770"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7772",
                    "reference_id": "RHSA-2023:7772",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7772"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7784",
                    "reference_id": "RHSA-2023:7784",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7784"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7785",
                    "reference_id": "RHSA-2023:7785",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7785"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7883",
                    "reference_id": "RHSA-2023:7883",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7883"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7884",
                    "reference_id": "RHSA-2023:7884",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7884"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7885",
                    "reference_id": "RHSA-2023:7885",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7885"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0304",
                    "reference_id": "RHSA-2024:0304",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0304"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0332",
                    "reference_id": "RHSA-2024:0332",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0332"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0337",
                    "reference_id": "RHSA-2024:0337",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0337"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6538-1/",
                    "reference_id": "USN-6538-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6538-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6538-2/",
                    "reference_id": "USN-6538-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6538-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6570-1/",
                    "reference_id": "USN-6570-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6570-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/180?format=api",
                    "purl": "pkg:generic/postgresql@11.22.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.22.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/179?format=api",
                    "purl": "pkg:generic/postgresql@12.17.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.17.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/178?format=api",
                    "purl": "pkg:generic/postgresql@13.13.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.13.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/154?format=api",
                    "purl": "pkg:generic/postgresql@14.10.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.10.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/153?format=api",
                    "purl": "pkg:generic/postgresql@15.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.5.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/152?format=api",
                    "purl": "pkg:generic/postgresql@16.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.1.0"
                }
            ],
            "aliases": [
                "CVE-2023-5870"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nwfr-t7xn-zuae"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3566?format=api",
            "vulnerability_id": "VCID-pg5v-ux6b-3qdn",
            "summary": "Selectivity estimators bypass row security policiesmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10130.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10130.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10130",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41713",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41723",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41779",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41808",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41736",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41786",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41795",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41818",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41785",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41821",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41772",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42043",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42273",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4219",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42278",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10130"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10130/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2019-10130/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707109",
                    "reference_id": "1707109",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707109"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-03",
                    "reference_id": "GLSA-202003-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980",
                    "reference_id": "RHSA-2020:0980",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0980"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669",
                    "reference_id": "RHSA-2020:3669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295",
                    "reference_id": "RHSA-2020:4295",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4295"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619",
                    "reference_id": "RHSA-2020:5619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5619"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661",
                    "reference_id": "RHSA-2020:5661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164",
                    "reference_id": "RHSA-2021:0164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167",
                    "reference_id": "RHSA-2021:0167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0167"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3972-1/",
                    "reference_id": "USN-3972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3972-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/322?format=api",
                    "purl": "pkg:generic/postgresql@11.3.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.3.0"
                }
            ],
            "aliases": [
                "CVE-2019-10130"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pg5v-ux6b-3qdn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3516?format=api",
            "vulnerability_id": "VCID-q5z4-wv12-1fh7",
            "summary": "Memory disclosure in aggregate function callsmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5868.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5868.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85992",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85972",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85973",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85874",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85891",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85894",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85913",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85923",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85937",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85935",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8593",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85949",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85952",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85943",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85963",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5868"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2023-5868/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2023-5868/"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283",
                    "reference_id": "1056283",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247168",
                    "reference_id": "2247168",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247168"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202408-06",
                    "reference_id": "GLSA-202408-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202408-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7545",
                    "reference_id": "RHSA-2023:7545",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7545"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7579",
                    "reference_id": "RHSA-2023:7579",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7579"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7580",
                    "reference_id": "RHSA-2023:7580",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7580"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7581",
                    "reference_id": "RHSA-2023:7581",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7581"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7616",
                    "reference_id": "RHSA-2023:7616",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7616"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7656",
                    "reference_id": "RHSA-2023:7656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7656"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7666",
                    "reference_id": "RHSA-2023:7666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7666"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7667",
                    "reference_id": "RHSA-2023:7667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7694",
                    "reference_id": "RHSA-2023:7694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7694"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7695",
                    "reference_id": "RHSA-2023:7695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7695"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7714",
                    "reference_id": "RHSA-2023:7714",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7714"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7770",
                    "reference_id": "RHSA-2023:7770",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7770"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7772",
                    "reference_id": "RHSA-2023:7772",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7772"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7784",
                    "reference_id": "RHSA-2023:7784",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7784"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7785",
                    "reference_id": "RHSA-2023:7785",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7785"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7883",
                    "reference_id": "RHSA-2023:7883",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7883"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7884",
                    "reference_id": "RHSA-2023:7884",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7884"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7885",
                    "reference_id": "RHSA-2023:7885",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7885"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0304",
                    "reference_id": "RHSA-2024:0304",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0304"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0332",
                    "reference_id": "RHSA-2024:0332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0332"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0337",
                    "reference_id": "RHSA-2024:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0337"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6538-1/",
                    "reference_id": "USN-6538-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6538-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6538-2/",
                    "reference_id": "USN-6538-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6538-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/180?format=api",
                    "purl": "pkg:generic/postgresql@11.22.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.22.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/179?format=api",
                    "purl": "pkg:generic/postgresql@12.17.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.17.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/178?format=api",
                    "purl": "pkg:generic/postgresql@13.13.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.13.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/154?format=api",
                    "purl": "pkg:generic/postgresql@14.10.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.10.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/153?format=api",
                    "purl": "pkg:generic/postgresql@15.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.5.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/152?format=api",
                    "purl": "pkg:generic/postgresql@16.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.1.0"
                }
            ],
            "aliases": [
                "CVE-2023-5868"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5z4-wv12-1fh7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3521?format=api",
            "vulnerability_id": "VCID-q8ka-5dxw-w7fs",
            "summary": "Autovacuum, REINDEX, and others omit \"security restricted operation\" sandboxmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1552.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1552.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84548",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.847",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84675",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84685",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84686",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84563",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84585",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84588",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84609",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84616",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84635",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8463",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84625",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84646",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84647",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84648",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2022-1552/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2022-1552/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081126",
                    "reference_id": "2081126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081126"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2719",
                    "reference_id": "AVG-2719",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2719"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202211-04",
                    "reference_id": "GLSA-202211-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202211-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4771",
                    "reference_id": "RHSA-2022:4771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4771"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4805",
                    "reference_id": "RHSA-2022:4805",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4805"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4807",
                    "reference_id": "RHSA-2022:4807",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4807"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4854",
                    "reference_id": "RHSA-2022:4854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4854"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4855",
                    "reference_id": "RHSA-2022:4855",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4855"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4856",
                    "reference_id": "RHSA-2022:4856",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4856"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4857",
                    "reference_id": "RHSA-2022:4857",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4857"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4893",
                    "reference_id": "RHSA-2022:4893",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4893"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4894",
                    "reference_id": "RHSA-2022:4894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4895",
                    "reference_id": "RHSA-2022:4895",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4895"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4913",
                    "reference_id": "RHSA-2022:4913",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4913"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4915",
                    "reference_id": "RHSA-2022:4915",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4915"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4929",
                    "reference_id": "RHSA-2022:4929",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4929"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5162",
                    "reference_id": "RHSA-2022:5162",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5162"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5440-1/",
                    "reference_id": "USN-5440-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5440-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5676-1/",
                    "reference_id": "USN-5676-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5676-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/287?format=api",
                    "purl": "pkg:generic/postgresql@11.16.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.16.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/286?format=api",
                    "purl": "pkg:generic/postgresql@12.11.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.11.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/285?format=api",
                    "purl": "pkg:generic/postgresql@13.7.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.7.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/160?format=api",
                    "purl": "pkg:generic/postgresql@14.3.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.3.0"
                }
            ],
            "aliases": [
                "CVE-2022-1552"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q8ka-5dxw-w7fs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3522?format=api",
            "vulnerability_id": "VCID-qbd9-mpc6-5bap",
            "summary": "libpq processes unencrypted bytes from man-in-the-middlemore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23222.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23222.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51475",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51515",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51576",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51555",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51508",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51419",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51602",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51586",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51628",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51624",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51484",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51535",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51562",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51523",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51577",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51574",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23222"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2021-23222/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2021-23222/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022675",
                    "reference_id": "2022675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022675"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2547",
                    "reference_id": "AVG-2547",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2547"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202211-04",
                    "reference_id": "GLSA-202211-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202211-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5179",
                    "reference_id": "RHSA-2021:5179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5179"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5197",
                    "reference_id": "RHSA-2021:5197",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5197"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1891",
                    "reference_id": "RHSA-2022:1891",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1891"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5145-1/",
                    "reference_id": "USN-5145-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5145-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5765-1/",
                    "reference_id": "USN-5765-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5765-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/296?format=api",
                    "purl": "pkg:generic/postgresql@11.14.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.14.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/295?format=api",
                    "purl": "pkg:generic/postgresql@12.9.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.9.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/294?format=api",
                    "purl": "pkg:generic/postgresql@13.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.5.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/161?format=api",
                    "purl": "pkg:generic/postgresql@14.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.1.0"
                }
            ],
            "aliases": [
                "CVE-2021-23222"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qbd9-mpc6-5bap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3523?format=api",
            "vulnerability_id": "VCID-srbh-8fdq-bkc2",
            "summary": "Server processes unencrypted bytes from man-in-the-middlemore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23214.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23214.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40816",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41043",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41037",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40956",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41154",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4157",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45251",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45245",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4523",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4519",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45213",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45155",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45209",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45197",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.452",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23214"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2021-23214/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2021-23214/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022666",
                    "reference_id": "2022666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022666"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202204-1",
                    "reference_id": "ASA-202204-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202204-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2546",
                    "reference_id": "AVG-2546",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2546"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202211-04",
                    "reference_id": "GLSA-202211-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202211-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5179",
                    "reference_id": "RHSA-2021:5179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5179"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5197",
                    "reference_id": "RHSA-2021:5197",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5197"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5235",
                    "reference_id": "RHSA-2021:5235",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5235"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5236",
                    "reference_id": "RHSA-2021:5236",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5236"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1830",
                    "reference_id": "RHSA-2022:1830",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1830"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5145-1/",
                    "reference_id": "USN-5145-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5145-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5645-1/",
                    "reference_id": "USN-5645-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5645-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/296?format=api",
                    "purl": "pkg:generic/postgresql@11.14.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.14.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/295?format=api",
                    "purl": "pkg:generic/postgresql@12.9.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.9.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/294?format=api",
                    "purl": "pkg:generic/postgresql@13.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.5.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/161?format=api",
                    "purl": "pkg:generic/postgresql@14.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.1.0"
                }
            ],
            "aliases": [
                "CVE-2021-23214"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-srbh-8fdq-bkc2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3561?format=api",
            "vulnerability_id": "VCID-umaz-62cm-bqfe",
            "summary": "Uncontrolled search path element in CREATE EXTENSIONmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08621",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08617",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0868",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08683",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08648",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08697",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08618",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08695",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0872",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08682",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0857",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08558",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08713",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08726",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14350"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2020-14350/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2020-14350/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865746",
                    "reference_id": "1865746",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865746"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202008-13",
                    "reference_id": "GLSA-202008-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202008-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669",
                    "reference_id": "RHSA-2020:3669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295",
                    "reference_id": "RHSA-2020:4295",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4295"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5110",
                    "reference_id": "RHSA-2020:5110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5112",
                    "reference_id": "RHSA-2020:5112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5112"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619",
                    "reference_id": "RHSA-2020:5619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5619"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620",
                    "reference_id": "RHSA-2020:5620",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5620"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661",
                    "reference_id": "RHSA-2020:5661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163",
                    "reference_id": "RHSA-2021:0163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0163"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164",
                    "reference_id": "RHSA-2021:0164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167",
                    "reference_id": "RHSA-2021:0167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0167"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0988",
                    "reference_id": "RHSA-2021:0988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0988"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4472-1/",
                    "reference_id": "USN-4472-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4472-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/306?format=api",
                    "purl": "pkg:generic/postgresql@11.9.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.9.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/305?format=api",
                    "purl": "pkg:generic/postgresql@12.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.4.0"
                }
            ],
            "aliases": [
                "CVE-2020-14350"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-umaz-62cm-bqfe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3564?format=api",
            "vulnerability_id": "VCID-wamn-1as1-qbfa",
            "summary": "ALTER ... DEPENDS ON EXTENSION is missing authorization checks.more details",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1720",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57428",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57452",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57563",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57543",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57502",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57522",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57501",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57512",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57509",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57562",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57566",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57581",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57561",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57539",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57567",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1720"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/2011/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/2011/"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2020-1720/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2020-1720/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798852",
                    "reference_id": "1798852",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798852"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1720",
                    "reference_id": "CVE-2020-1720",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:P/A:N"
                        },
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1720"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-03",
                    "reference_id": "GLSA-202003-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980",
                    "reference_id": "RHSA-2020:0980",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0980"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669",
                    "reference_id": "RHSA-2020:3669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295",
                    "reference_id": "RHSA-2020:4295",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4295"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5112",
                    "reference_id": "RHSA-2020:5112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5112"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619",
                    "reference_id": "RHSA-2020:5619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5619"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620",
                    "reference_id": "RHSA-2020:5620",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5620"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661",
                    "reference_id": "RHSA-2020:5661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163",
                    "reference_id": "RHSA-2021:0163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0163"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164",
                    "reference_id": "RHSA-2021:0164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167",
                    "reference_id": "RHSA-2021:0167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0167"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4282-1/",
                    "reference_id": "USN-4282-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4282-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/317?format=api",
                    "purl": "pkg:generic/postgresql@11.7.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.7.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/316?format=api",
                    "purl": "pkg:generic/postgresql@12.2.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.2.0"
                }
            ],
            "aliases": [
                "CVE-2020-1720"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wamn-1as1-qbfa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3596?format=api",
            "vulnerability_id": "VCID-xbd8-nqxx-buhb",
            "summary": "Memory disclosure in cross-type comparison for hashed subplanmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10209.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10209.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10209",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63167",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.633",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63279",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63298",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63312",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63309",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63227",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63256",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63221",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63272",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6329",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63307",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63291",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63255",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63292",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10209"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10209",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10209"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/1960/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/1960/"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10209/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2019-10209/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734447",
                    "reference_id": "1734447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734447"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201908-7",
                    "reference_id": "ASA-201908-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201908-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201908-8",
                    "reference_id": "ASA-201908-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201908-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1019",
                    "reference_id": "AVG-1019",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1019"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10209",
                    "reference_id": "CVE-2019-10209",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:N/A:N"
                        },
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10209"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4090-1/",
                    "reference_id": "USN-4090-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4090-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/200?format=api",
                    "purl": "pkg:generic/postgresql@11.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.5.0"
                }
            ],
            "aliases": [
                "CVE-2019-10209"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xbd8-nqxx-buhb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3558?format=api",
            "vulnerability_id": "VCID-xjv3-x91m-qqhn",
            "summary": "psql's \\gset allows overwriting specially treated variablesmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64626",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64748",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64757",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6477",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64766",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64678",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64706",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64665",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64713",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64727",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64744",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64733",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64705",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64741",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64752",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64739",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25696"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2020-25696/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2020-25696/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894430",
                    "reference_id": "1894430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894430"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-14",
                    "reference_id": "ASA-202011-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-14"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1276",
                    "reference_id": "AVG-1276",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1276"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-07",
                    "reference_id": "GLSA-202012-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202012-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5316",
                    "reference_id": "RHSA-2020:5316",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5316"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5317",
                    "reference_id": "RHSA-2020:5317",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5317"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5401",
                    "reference_id": "RHSA-2020:5401",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5401"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5567",
                    "reference_id": "RHSA-2020:5567",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5567"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619",
                    "reference_id": "RHSA-2020:5619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5619"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620",
                    "reference_id": "RHSA-2020:5620",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5620"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5638",
                    "reference_id": "RHSA-2020:5638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661",
                    "reference_id": "RHSA-2020:5661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0057",
                    "reference_id": "RHSA-2021:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0161",
                    "reference_id": "RHSA-2021:0161",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0161"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163",
                    "reference_id": "RHSA-2021:0163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0163"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164",
                    "reference_id": "RHSA-2021:0164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0165",
                    "reference_id": "RHSA-2021:0165",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0165"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167",
                    "reference_id": "RHSA-2021:0167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0167"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4633-1/",
                    "reference_id": "USN-4633-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4633-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/301?format=api",
                    "purl": "pkg:generic/postgresql@11.10.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/300?format=api",
                    "purl": "pkg:generic/postgresql@12.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/299?format=api",
                    "purl": "pkg:generic/postgresql@13.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0"
                }
            ],
            "aliases": [
                "CVE-2020-25696"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xjv3-x91m-qqhn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3597?format=api",
            "vulnerability_id": "VCID-y23y-qvcc-4qh2",
            "summary": "Memory disclosure in partition routingmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10129.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10129.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63198",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63257",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63287",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63251",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63303",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6332",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63338",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63321",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63285",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63322",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63329",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63309",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63328",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63341",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63339",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63311",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10129"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10129/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2019-10129/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707106",
                    "reference_id": "1707106",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707106"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-03",
                    "reference_id": "GLSA-202003-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-03"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3972-1/",
                    "reference_id": "USN-3972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3972-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/322?format=api",
                    "purl": "pkg:generic/postgresql@11.3.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.3.0"
                }
            ],
            "aliases": [
                "CVE-2019-10129"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y23y-qvcc-4qh2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3513?format=api",
            "vulnerability_id": "VCID-y871-sfhf-a7by",
            "summary": "Extension script @substitutions@ within quoting allow SQL injectionmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39417.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39417.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-39417",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71012",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7103",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71005",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71047",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71062",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71085",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7107",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71053",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.711",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71107",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71139",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00677",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71572",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00677",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71579",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00677",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71584",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00677",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71521",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-39417"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-154-149-1312-1216-1121-and-postgresql-16-beta-3-released-2689/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-154-149-1312-1216-1121-and-postgresql-16-beta-3-released-2689/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2023-39417/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2023-39417/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228111",
                    "reference_id": "2228111",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228111"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8",
                    "reference_id": "cpe:/a:redhat:advanced_cluster_security:3.74::el8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8",
                    "reference_id": "cpe:/a:redhat:advanced_cluster_security:4.1::el8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8",
                    "reference_id": "cpe:/a:redhat:advanced_cluster_security:4.2::el8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_aus:8.2::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_aus:8.4::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_e4s:8.2::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_e4s:8.4::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.6::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.0::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.0::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.2::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3",
                    "reference_id": "cpe:/a:redhat:rhel_software_collections:3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7",
                    "reference_id": "cpe:/a:redhat:rhel_software_collections:3::el7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_tus:8.2::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_tus:8.4::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-39417",
                    "reference_id": "CVE-2023-39417",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-39417"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2023-39417",
                    "reference_id": "CVE-2023-39417",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2023-39417"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7545",
                    "reference_id": "RHSA-2023:7545",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7545"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7579",
                    "reference_id": "RHSA-2023:7579",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7579"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7580",
                    "reference_id": "RHSA-2023:7580",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7580"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7581",
                    "reference_id": "RHSA-2023:7581",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7581"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7616",
                    "reference_id": "RHSA-2023:7616",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7616"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7656",
                    "reference_id": "RHSA-2023:7656",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7656"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7666",
                    "reference_id": "RHSA-2023:7666",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7666"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7667",
                    "reference_id": "RHSA-2023:7667",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7694",
                    "reference_id": "RHSA-2023:7694",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7694"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7695",
                    "reference_id": "RHSA-2023:7695",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7695"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7714",
                    "reference_id": "RHSA-2023:7714",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7714"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7770",
                    "reference_id": "RHSA-2023:7770",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7770"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7772",
                    "reference_id": "RHSA-2023:7772",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7772"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7784",
                    "reference_id": "RHSA-2023:7784",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7784"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7785",
                    "reference_id": "RHSA-2023:7785",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7785"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7883",
                    "reference_id": "RHSA-2023:7883",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7883"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7884",
                    "reference_id": "RHSA-2023:7884",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7884"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7885",
                    "reference_id": "RHSA-2023:7885",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7885"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0304",
                    "reference_id": "RHSA-2024:0304",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0304"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0332",
                    "reference_id": "RHSA-2024:0332",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0332"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0337",
                    "reference_id": "RHSA-2024:0337",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0337"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6296-1/",
                    "reference_id": "USN-6296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6366-1/",
                    "reference_id": "USN-6366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6366-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/177?format=api",
                    "purl": "pkg:generic/postgresql@11.21.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.21.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/176?format=api",
                    "purl": "pkg:generic/postgresql@12.16.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.16.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/175?format=api",
                    "purl": "pkg:generic/postgresql@13.12.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.12.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/151?format=api",
                    "purl": "pkg:generic/postgresql@14.9.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.9.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/150?format=api",
                    "purl": "pkg:generic/postgresql@15.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.4.0"
                }
            ],
            "aliases": [
                "CVE-2023-39417"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y871-sfhf-a7by"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3565?format=api",
            "vulnerability_id": "VCID-ybb6-2xrm-7fbk",
            "summary": "Stack-based buffer overflow via setting a passwordmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10164.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10164.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90528",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90516",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9051",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90571",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90579",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90591",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90597",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90556",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9056",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.13393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94218",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.13393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94211",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.13393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94214",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10164"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-114-109-9614-9518-9423-and-12-beta-2-released-1949/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-114-109-9614-9518-9423-and-12-beta-2-released-1949/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10164/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2019-10164/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719698",
                    "reference_id": "1719698",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719698"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-03",
                    "reference_id": "GLSA-202003-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980",
                    "reference_id": "RHSA-2020:0980",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0980"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669",
                    "reference_id": "RHSA-2020:3669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664",
                    "reference_id": "RHSA-2020:5664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166",
                    "reference_id": "RHSA-2021:0166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0166"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4027-1/",
                    "reference_id": "USN-4027-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4027-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/320?format=api",
                    "purl": "pkg:generic/postgresql@11.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.4.0"
                }
            ],
            "aliases": [
                "CVE-2019-10164"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ybb6-2xrm-7fbk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3594?format=api",
            "vulnerability_id": "VCID-yy3k-mszq-cbcs",
            "summary": "Memory disclosure in certain queriesmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3677.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3677.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42211",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42323",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42273",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42286",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42314",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42256",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42307",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42301",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42337",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45067",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45223",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4523",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45171",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45363",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45311",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-134-128-1113-1018-9623-and-14-beta-3-released-2277/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-134-128-1113-1018-9623-and-14-beta-3-released-2277/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2021-3677/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2021-3677/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001857",
                    "reference_id": "2001857",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001857"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2290",
                    "reference_id": "AVG-2290",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2290"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202211-04",
                    "reference_id": "GLSA-202211-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202211-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5179",
                    "reference_id": "RHSA-2021:5179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5179"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5197",
                    "reference_id": "RHSA-2021:5197",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5197"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5235",
                    "reference_id": "RHSA-2021:5235",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5235"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5236",
                    "reference_id": "RHSA-2021:5236",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5236"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4931",
                    "reference_id": "RHSA-2022:4931",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4931"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5038-1/",
                    "reference_id": "USN-5038-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5038-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396?format=api",
                    "purl": "pkg:generic/postgresql@11.13.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.13.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/395?format=api",
                    "purl": "pkg:generic/postgresql@12.8.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.8.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/394?format=api",
                    "purl": "pkg:generic/postgresql@13.4.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.4.0"
                }
            ],
            "aliases": [
                "CVE-2021-3677"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yy3k-mszq-cbcs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3529?format=api",
            "vulnerability_id": "VCID-zrcc-w98g-gfhk",
            "summary": "pg_ctlcluster script in postgresql-common does not drop privileges when creating socket/statistics temporary directoriesmore details",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31664",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3219",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3202",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31892",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31812",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32326",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32364",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32188",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32237",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32265",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32266",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32228",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32198",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32231",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3221",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32181",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3466"
                },
                {
                    "reference_url": "https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2019-3466/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H']"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2019-3466/"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3466",
                    "reference_id": "CVE-2019-3466",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3466"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4194-1/",
                    "reference_id": "USN-4194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4194-2/",
                    "reference_id": "USN-4194-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4194-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/211?format=api",
                    "purl": "pkg:generic/postgresql@11.6.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.6.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/210?format=api",
                    "purl": "pkg:generic/postgresql@12.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.1.0"
                }
            ],
            "aliases": [
                "CVE-2019-3466"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zrcc-w98g-gfhk"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.0.0"
}