Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/174?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/174?format=api", "purl": "pkg:generic/postgresql@11.0.0", "type": "generic", "namespace": "", "name": "postgresql", "version": "11.0.0", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "11.1.0", "latest_non_vulnerable_version": "18.2.0", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3567?format=api", "vulnerability_id": "VCID-1rgq-t3wa-2fck", "summary": "SQL injection in pg_upgrade and pg_dump, via CREATE TRIGGER ... REFERENCING.more details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16850.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16850.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16850", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79805", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79813", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79822", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79851", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79859", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.7988", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79863", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79856", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79884", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79885", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79888", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79916", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79923", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.7994", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79955", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16850" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-111-106-9611-9515-9420-and-9325-released-1905/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-111-106-9611-9515-9420-and-9325-released-1905/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2018-16850/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2018-16850/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645937", "reference_id": "1645937", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645937" }, { "reference_url": "https://security.gentoo.org/glsa/201811-24", "reference_id": "GLSA-201811-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3757", "reference_id": "RHSA-2018:3757", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3757" }, { "reference_url": "https://usn.ubuntu.com/3818-1/", "reference_id": "USN-3818-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3818-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/326?format=api", "purl": "pkg:generic/postgresql@11.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.1.0" } ], "aliases": [ "CVE-2018-16850" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1rgq-t3wa-2fck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3560?format=api", "vulnerability_id": "VCID-36gv-m96w-47db", "summary": "Reconnection can downgrade connection security settingsmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25694", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58007", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58051", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58124", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58104", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.5809", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58091", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58113", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58087", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58142", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58145", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.5816", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58137", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58118", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58148", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58149", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2020-25694/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2020-25694/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894423", "reference_id": "1894423", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894423" }, { "reference_url": "https://security.archlinux.org/ASA-202011-14", "reference_id": "ASA-202011-14", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202011-14" }, { "reference_url": "https://security.archlinux.org/AVG-1276", "reference_id": "AVG-1276", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1276" }, { "reference_url": "https://security.gentoo.org/glsa/202012-07", "reference_id": "GLSA-202012-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202012-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5316", "reference_id": "RHSA-2020:5316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5316" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5317", "reference_id": "RHSA-2020:5317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5401", "reference_id": "RHSA-2020:5401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5401" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5567", "reference_id": "RHSA-2020:5567", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5567" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619", "reference_id": "RHSA-2020:5619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620", "reference_id": "RHSA-2020:5620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5638", "reference_id": "RHSA-2020:5638", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5638" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661", "reference_id": "RHSA-2020:5661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0057", "reference_id": "RHSA-2021:0057", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0057" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0161", "reference_id": "RHSA-2021:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163", "reference_id": "RHSA-2021:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164", "reference_id": "RHSA-2021:0164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0165", "reference_id": "RHSA-2021:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167", "reference_id": "RHSA-2021:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1512", "reference_id": "RHSA-2021:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1512" }, { "reference_url": "https://usn.ubuntu.com/4633-1/", "reference_id": "USN-4633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4633-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/301?format=api", "purl": "pkg:generic/postgresql@11.10.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/300?format=api", "purl": "pkg:generic/postgresql@12.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/299?format=api", "purl": "pkg:generic/postgresql@13.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0" } ], "aliases": [ "CVE-2020-25694" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-36gv-m96w-47db" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3517?format=api", "vulnerability_id": "VCID-3kph-5gzq-ryhu", "summary": "Row security policies disregard user ID changes after inliningmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2455.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2455.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2455", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.4378", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43756", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45175", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45469", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45464", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45414", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45331", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45338", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45277", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45369", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45424", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45425", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45447", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45417", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45418", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2455" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2023-2455/", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N']" }, { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T17:13:19Z/" } ], "url": "https://www.postgresql.org/support/security/CVE-2023-2455/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207569", "reference_id": "2207569", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207569" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-2455", "reference_id": "CVE-2023-2455", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T17:13:19Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-2455" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230706-0006/", "reference_id": "ntap-20230706-0006", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T17:13:19Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230706-0006/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3714", "reference_id": "RHSA-2023:3714", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3714" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4313", "reference_id": "RHSA-2023:4313", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4313" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4327", "reference_id": "RHSA-2023:4327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4527", "reference_id": "RHSA-2023:4527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4535", "reference_id": "RHSA-2023:4535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4535" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4539", "reference_id": "RHSA-2023:4539", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4539" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5269", "reference_id": "RHSA-2023:5269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7545", "reference_id": "RHSA-2023:7545", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7580", "reference_id": "RHSA-2023:7580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7666", "reference_id": "RHSA-2023:7666", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7666" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7667", "reference_id": "RHSA-2023:7667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7694", "reference_id": "RHSA-2023:7694", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7694" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7695", "reference_id": "RHSA-2023:7695", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7695" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7772", "reference_id": "RHSA-2023:7772", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7772" }, { "reference_url": "https://usn.ubuntu.com/6104-1/", "reference_id": "USN-6104-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6104-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/183?format=api", "purl": "pkg:generic/postgresql@11.20.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.20.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/182?format=api", "purl": "pkg:generic/postgresql@12.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.15.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/181?format=api", "purl": "pkg:generic/postgresql@13.11.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.11.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/156?format=api", "purl": "pkg:generic/postgresql@14.8.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.8.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/155?format=api", "purl": "pkg:generic/postgresql@15.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.3.0" } ], "aliases": [ "CVE-2023-2455" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3kph-5gzq-ryhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3557?format=api", "vulnerability_id": "VCID-4jdp-3xqp-ufap", "summary": "Buffer overrun from integer overflow in array subscripting calculationsmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32027", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65502", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65621", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65634", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65645", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65644", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.6555", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.6558", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65546", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65599", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65611", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.6563", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65616", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65587", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65623", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65635", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65619", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2021-32027/", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2021-32027/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956876", "reference_id": "1956876", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956876" }, { "reference_url": "https://security.archlinux.org/ASA-202106-15", "reference_id": "ASA-202106-15", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-15" }, { "reference_url": "https://security.archlinux.org/AVG-1956", "reference_id": "AVG-1956", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1956" }, { "reference_url": "https://security.gentoo.org/glsa/202211-04", "reference_id": "GLSA-202211-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202211-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2360", "reference_id": "RHSA-2021:2360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2361", "reference_id": "RHSA-2021:2361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2372", "reference_id": "RHSA-2021:2372", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2372" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2375", "reference_id": "RHSA-2021:2375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2375" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2389", "reference_id": "RHSA-2021:2389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2390", "reference_id": "RHSA-2021:2390", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2390" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2391", "reference_id": "RHSA-2021:2391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2392", "reference_id": "RHSA-2021:2392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2393", "reference_id": "RHSA-2021:2393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2394", "reference_id": "RHSA-2021:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2395", "reference_id": "RHSA-2021:2395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2396", "reference_id": "RHSA-2021:2396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2397", "reference_id": "RHSA-2021:2397", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2397" }, { "reference_url": "https://usn.ubuntu.com/4972-1/", "reference_id": "USN-4972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4972-1/" }, { "reference_url": "https://usn.ubuntu.com/5645-1/", "reference_id": "USN-5645-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5645-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/291?format=api", "purl": "pkg:generic/postgresql@11.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/290?format=api", "purl": "pkg:generic/postgresql@12.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/289?format=api", "purl": "pkg:generic/postgresql@13.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0" } ], "aliases": [ "CVE-2021-32027" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4jdp-3xqp-ufap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3518?format=api", "vulnerability_id": "VCID-5py6-fe2j-d3f4", "summary": "CREATE SCHEMA ... schema_element defeats protective search_path changesmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2454.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2454.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2454", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45609", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45587", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.4615", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46244", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46299", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46288", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46307", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47576", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47631", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47627", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47651", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47636", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47694", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47686", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2023-2454/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H']" }, { "value": "7.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/" } ], "url": "https://www.postgresql.org/support/security/CVE-2023-2454/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207568", "reference_id": "2207568", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207568" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-2454", "reference_id": "CVE-2023-2454", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-2454" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230706-0006/", "reference_id": "ntap-20230706-0006", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-06T17:13:48Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230706-0006/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3714", "reference_id": "RHSA-2023:3714", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3714" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4313", "reference_id": "RHSA-2023:4313", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4313" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4327", "reference_id": "RHSA-2023:4327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4527", "reference_id": "RHSA-2023:4527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4535", "reference_id": "RHSA-2023:4535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4535" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4539", "reference_id": "RHSA-2023:4539", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4539" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5269", "reference_id": "RHSA-2023:5269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7545", "reference_id": "RHSA-2023:7545", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7580", "reference_id": "RHSA-2023:7580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7666", "reference_id": "RHSA-2023:7666", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7666" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7667", "reference_id": "RHSA-2023:7667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7694", "reference_id": "RHSA-2023:7694", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7694" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7695", "reference_id": "RHSA-2023:7695", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7695" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7772", "reference_id": "RHSA-2023:7772", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7772" }, { "reference_url": "https://usn.ubuntu.com/6104-1/", "reference_id": "USN-6104-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6104-1/" }, { "reference_url": "https://usn.ubuntu.com/6230-1/", "reference_id": "USN-6230-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6230-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/183?format=api", "purl": "pkg:generic/postgresql@11.20.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.20.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/182?format=api", "purl": "pkg:generic/postgresql@12.15.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.15.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/181?format=api", "purl": "pkg:generic/postgresql@13.11.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.11.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/156?format=api", "purl": "pkg:generic/postgresql@14.8.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.8.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/155?format=api", "purl": "pkg:generic/postgresql@15.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.3.0" } ], "aliases": [ "CVE-2023-2454" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5py6-fe2j-d3f4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3556?format=api", "vulnerability_id": "VCID-8p8h-jdyq-vfek", "summary": "Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATEmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32028", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64362", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64512", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64479", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.645", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64513", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64445", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64405", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64453", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64469", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64481", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64441", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64475", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64487", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2021-32028/", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2021-32028/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956877", "reference_id": "1956877", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956877" }, { "reference_url": "https://security.archlinux.org/ASA-202106-15", "reference_id": "ASA-202106-15", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-15" }, { "reference_url": "https://security.archlinux.org/AVG-1956", "reference_id": "AVG-1956", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1956" }, { "reference_url": "https://security.gentoo.org/glsa/202211-04", "reference_id": "GLSA-202211-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202211-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2360", "reference_id": "RHSA-2021:2360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2361", "reference_id": "RHSA-2021:2361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2372", "reference_id": "RHSA-2021:2372", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2372" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2375", "reference_id": "RHSA-2021:2375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2375" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2389", "reference_id": "RHSA-2021:2389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2390", "reference_id": "RHSA-2021:2390", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2390" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2391", "reference_id": "RHSA-2021:2391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2392", "reference_id": "RHSA-2021:2392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2393", "reference_id": "RHSA-2021:2393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2394", "reference_id": "RHSA-2021:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2395", "reference_id": "RHSA-2021:2395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2396", "reference_id": "RHSA-2021:2396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2396" }, { "reference_url": "https://usn.ubuntu.com/4972-1/", "reference_id": "USN-4972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/291?format=api", "purl": "pkg:generic/postgresql@11.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/290?format=api", "purl": "pkg:generic/postgresql@12.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/289?format=api", "purl": "pkg:generic/postgresql@13.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0" } ], "aliases": [ "CVE-2021-32028" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8p8h-jdyq-vfek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3526?format=api", "vulnerability_id": "VCID-bb5j-e9vw-mbd1", "summary": "TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER executionmore details", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10208.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10208.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10208", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40573", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40225", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40671", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.4064", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40563", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40461", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40447", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40366", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40654", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40682", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40603", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40653", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40662", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.4068", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40643", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40625", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10208" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/1960/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/1960/" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10208/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2019-10208/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734416", "reference_id": "1734416", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734416" }, { "reference_url": "https://security.archlinux.org/ASA-201908-7", "reference_id": "ASA-201908-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201908-7" }, { "reference_url": "https://security.archlinux.org/ASA-201908-8", "reference_id": "ASA-201908-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201908-8" }, { "reference_url": "https://security.archlinux.org/AVG-1019", "reference_id": "AVG-1019", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1019" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10208", "reference_id": "CVE-2019-10208", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980", "reference_id": "RHSA-2020:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669", "reference_id": "RHSA-2020:3669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295", "reference_id": "RHSA-2020:4295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619", "reference_id": "RHSA-2020:5619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661", "reference_id": "RHSA-2020:5661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164", "reference_id": "RHSA-2021:0164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167", "reference_id": "RHSA-2021:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1512", "reference_id": "RHSA-2021:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1512" }, { "reference_url": "https://usn.ubuntu.com/4090-1/", "reference_id": "USN-4090-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4090-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/200?format=api", "purl": "pkg:generic/postgresql@11.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.5.0" } ], "aliases": [ "CVE-2019-10208" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bb5j-e9vw-mbd1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3559?format=api", "vulnerability_id": "VCID-bdw5-v87c-zyfj", "summary": "Multiple features escape \"security restricted operation\" sandboxmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25695", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.22672", "scoring_system": "epss", "scoring_elements": "0.95843", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.22672", "scoring_system": "epss", "scoring_elements": "0.95826", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.22672", "scoring_system": "epss", "scoring_elements": "0.95854", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.22672", "scoring_system": "epss", "scoring_elements": "0.95845", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.22672", "scoring_system": "epss", "scoring_elements": "0.95835", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.23757", "scoring_system": "epss", "scoring_elements": "0.96032", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.23757", "scoring_system": "epss", "scoring_elements": "0.9602", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.23757", "scoring_system": "epss", "scoring_elements": "0.96022", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.23757", "scoring_system": "epss", "scoring_elements": "0.96021", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.23757", "scoring_system": "epss", "scoring_elements": "0.95999", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.23757", "scoring_system": "epss", "scoring_elements": "0.96003", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.23757", "scoring_system": "epss", "scoring_elements": "0.96005", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.23757", "scoring_system": "epss", "scoring_elements": "0.96015", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2020-25695/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2020-25695/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894425", "reference_id": "1894425", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894425" }, { "reference_url": "https://security.archlinux.org/ASA-202011-14", "reference_id": "ASA-202011-14", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202011-14" }, { "reference_url": "https://security.archlinux.org/AVG-1276", "reference_id": "AVG-1276", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1276" }, { "reference_url": "https://security.gentoo.org/glsa/202012-07", "reference_id": "GLSA-202012-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202012-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5316", "reference_id": "RHSA-2020:5316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5316" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5317", "reference_id": "RHSA-2020:5317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5567", "reference_id": "RHSA-2020:5567", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5567" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619", "reference_id": "RHSA-2020:5619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620", "reference_id": "RHSA-2020:5620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661", "reference_id": "RHSA-2020:5661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0161", "reference_id": "RHSA-2021:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163", "reference_id": "RHSA-2021:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164", "reference_id": "RHSA-2021:0164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167", "reference_id": "RHSA-2021:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1512", "reference_id": "RHSA-2021:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1512" }, { "reference_url": "https://usn.ubuntu.com/4633-1/", "reference_id": "USN-4633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4633-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/301?format=api", "purl": "pkg:generic/postgresql@11.10.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/300?format=api", "purl": "pkg:generic/postgresql@12.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/299?format=api", "purl": "pkg:generic/postgresql@13.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0" } ], "aliases": [ "CVE-2020-25695" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bdw5-v87c-zyfj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3595?format=api", "vulnerability_id": "VCID-brqx-ae92-83ep", "summary": "Partition constraint violation errors leak values of denied columnsmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3393.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3393.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3393", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28432", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28405", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.2839", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28526", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28568", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28371", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28436", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28479", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28439", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28482", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.28729", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.2906", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.28949", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.28876", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29224", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.2918", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3393" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3393", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3393" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-132-126-1111-1016-9621-and-9525-released-2165/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-132-126-1111-1016-9621-and-9525-released-2165/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2021-3393/", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2021-3393/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924005", "reference_id": "1924005", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924005" }, { "reference_url": "https://security.archlinux.org/ASA-202102-31", "reference_id": "ASA-202102-31", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-31" }, { "reference_url": "https://security.archlinux.org/AVG-1567", "reference_id": "AVG-1567", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1567" }, { "reference_url": "https://security.gentoo.org/glsa/202105-32", "reference_id": "GLSA-202105-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202105-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2372", "reference_id": "RHSA-2021:2372", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2372" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2389", "reference_id": "RHSA-2021:2389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2394", "reference_id": "RHSA-2021:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2394" }, { "reference_url": "https://usn.ubuntu.com/4735-1/", "reference_id": "USN-4735-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4735-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/399?format=api", "purl": "pkg:generic/postgresql@11.11.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.11.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/398?format=api", "purl": "pkg:generic/postgresql@12.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/397?format=api", "purl": "pkg:generic/postgresql@13.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.2.0" } ], "aliases": [ "CVE-2021-3393" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-brqx-ae92-83ep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3562?format=api", "vulnerability_id": "VCID-cegf-gbkv-aqab", "summary": "Uncontrolled search path element in logical replicationmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14349.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14349.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14349", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81342", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81496", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81474", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81478", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81351", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81373", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81371", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81399", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81404", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81425", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81413", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81405", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81442", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81443", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81445", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01548", "scoring_system": "epss", "scoring_elements": "0.81466", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14349" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2020-14349/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2020-14349/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865744", "reference_id": "1865744", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865744" }, { "reference_url": "https://security.gentoo.org/glsa/202008-13", "reference_id": "GLSA-202008-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202008-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669", "reference_id": "RHSA-2020:3669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5110", "reference_id": "RHSA-2020:5110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5112", "reference_id": "RHSA-2020:5112", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5112" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620", "reference_id": "RHSA-2020:5620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163", "reference_id": "RHSA-2021:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0988", "reference_id": "RHSA-2021:0988", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0988" }, { "reference_url": "https://usn.ubuntu.com/4472-1/", "reference_id": "USN-4472-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4472-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/306?format=api", "purl": "pkg:generic/postgresql@11.9.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.9.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/305?format=api", "purl": "pkg:generic/postgresql@12.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.4.0" } ], "aliases": [ "CVE-2020-14349" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cegf-gbkv-aqab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3593?format=api", "vulnerability_id": "VCID-dv4x-n7v8-vyfh", "summary": "Memory disclosure in partitioned-table UPDATE ... RETURNINGmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32029.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32029.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32029", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37703", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37769", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37831", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37909", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37788", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37838", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37851", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37866", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37804", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38525", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38759", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38735", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38647", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2021-32029/", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2021-32029/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956883", "reference_id": "1956883", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956883" }, { "reference_url": "https://security.archlinux.org/ASA-202106-15", "reference_id": "ASA-202106-15", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-15" }, { "reference_url": "https://security.archlinux.org/AVG-1956", "reference_id": "AVG-1956", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2372", "reference_id": "RHSA-2021:2372", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2372" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2375", "reference_id": "RHSA-2021:2375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2375" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2389", "reference_id": "RHSA-2021:2389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2394", "reference_id": "RHSA-2021:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2396", "reference_id": "RHSA-2021:2396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2396" }, { "reference_url": "https://usn.ubuntu.com/4972-1/", "reference_id": "USN-4972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/291?format=api", "purl": "pkg:generic/postgresql@11.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/290?format=api", "purl": "pkg:generic/postgresql@12.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/289?format=api", "purl": "pkg:generic/postgresql@13.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0" } ], "aliases": [ "CVE-2021-32029" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dv4x-n7v8-vyfh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3515?format=api", "vulnerability_id": "VCID-dwqe-a6p3-tyf6", "summary": "Buffer overrun from integer overflow in array modificationmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5869.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5869.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5869", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01608", "scoring_system": "epss", "scoring_elements": "0.81841", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01608", "scoring_system": "epss", "scoring_elements": "0.81744", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01608", "scoring_system": "epss", "scoring_elements": "0.81763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01608", "scoring_system": "epss", "scoring_elements": "0.81751", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01608", "scoring_system": "epss", "scoring_elements": "0.81745", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01608", "scoring_system": "epss", "scoring_elements": "0.81783", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01608", "scoring_system": "epss", "scoring_elements": "0.81784", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01608", "scoring_system": "epss", "scoring_elements": "0.81692", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01608", "scoring_system": "epss", "scoring_elements": "0.81716", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01608", "scoring_system": "epss", "scoring_elements": "0.81713", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01608", "scoring_system": "epss", "scoring_elements": "0.81739", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01652", "scoring_system": "epss", "scoring_elements": "0.82055", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01652", "scoring_system": "epss", "scoring_elements": "0.82078", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01652", "scoring_system": "epss", "scoring_elements": "0.82089", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01652", "scoring_system": "epss", "scoring_elements": "0.82093", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5869" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2023-5869/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2023-5869/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283", "reference_id": "1056283", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247169", "reference_id": "2247169", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247169" }, { "reference_url": "https://security.gentoo.org/glsa/202408-06", "reference_id": "GLSA-202408-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202408-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7545", "reference_id": "RHSA-2023:7545", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7579", "reference_id": "RHSA-2023:7579", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7579" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7580", "reference_id": "RHSA-2023:7580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7581", "reference_id": "RHSA-2023:7581", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7581" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7616", "reference_id": "RHSA-2023:7616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7656", "reference_id": "RHSA-2023:7656", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7656" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7666", "reference_id": "RHSA-2023:7666", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7666" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7667", "reference_id": "RHSA-2023:7667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7694", "reference_id": "RHSA-2023:7694", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7694" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7695", "reference_id": "RHSA-2023:7695", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7695" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7714", "reference_id": "RHSA-2023:7714", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7714" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7770", "reference_id": "RHSA-2023:7770", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7770" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7771", "reference_id": "RHSA-2023:7771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7772", "reference_id": "RHSA-2023:7772", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7772" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7778", "reference_id": "RHSA-2023:7778", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7778" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7783", "reference_id": "RHSA-2023:7783", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7783" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7784", "reference_id": "RHSA-2023:7784", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7784" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7785", "reference_id": "RHSA-2023:7785", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7785" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7786", "reference_id": "RHSA-2023:7786", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7788", "reference_id": "RHSA-2023:7788", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7788" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7789", "reference_id": "RHSA-2023:7789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7790", "reference_id": "RHSA-2023:7790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7878", "reference_id": "RHSA-2023:7878", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7878" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7883", "reference_id": "RHSA-2023:7883", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7884", "reference_id": "RHSA-2023:7884", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7885", "reference_id": "RHSA-2023:7885", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0304", "reference_id": "RHSA-2024:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0332", "reference_id": "RHSA-2024:0332", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0332" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0337", "reference_id": "RHSA-2024:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0337" }, { "reference_url": "https://usn.ubuntu.com/6538-1/", "reference_id": "USN-6538-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6538-1/" }, { "reference_url": "https://usn.ubuntu.com/6538-2/", "reference_id": "USN-6538-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6538-2/" }, { "reference_url": "https://usn.ubuntu.com/6570-1/", "reference_id": "USN-6570-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6570-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/180?format=api", "purl": "pkg:generic/postgresql@11.22.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.22.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/179?format=api", "purl": "pkg:generic/postgresql@12.17.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.17.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/178?format=api", "purl": "pkg:generic/postgresql@13.13.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.13.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/154?format=api", "purl": "pkg:generic/postgresql@14.10.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.10.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/153?format=api", "purl": "pkg:generic/postgresql@15.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/152?format=api", "purl": "pkg:generic/postgresql@16.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.1.0" } ], "aliases": [ "CVE-2023-5869" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dwqe-a6p3-tyf6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3520?format=api", "vulnerability_id": "VCID-nuek-ypyh-b3dm", "summary": "Extension scripts replace objects not belonging to the extensionmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2625", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76742", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76743", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76755", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76616", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76645", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76627", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.7666", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76671", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76698", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76678", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.7667", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76712", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76717", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76706", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00973", "scoring_system": "epss", "scoring_elements": "0.76737", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2022-2625/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2022-2625/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113825", "reference_id": "2113825", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113825" }, { "reference_url": "https://security.gentoo.org/glsa/202211-04", "reference_id": "GLSA-202211-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202211-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7128", "reference_id": "RHSA-2022:7128", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7128" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0113", "reference_id": "RHSA-2023:0113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0160", "reference_id": "RHSA-2023:0160", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0160" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1576", "reference_id": "RHSA-2023:1576", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1576" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1693", "reference_id": "RHSA-2023:1693", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1693" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7545", "reference_id": "RHSA-2023:7545", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7580", "reference_id": "RHSA-2023:7580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7667", "reference_id": "RHSA-2023:7667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7694", "reference_id": "RHSA-2023:7694", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7694" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7695", "reference_id": "RHSA-2023:7695", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7695" }, { "reference_url": "https://usn.ubuntu.com/5571-1/", "reference_id": "USN-5571-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5571-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/283?format=api", "purl": "pkg:generic/postgresql@11.17.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.17.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/282?format=api", "purl": "pkg:generic/postgresql@12.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/281?format=api", "purl": "pkg:generic/postgresql@13.8.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.8.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/159?format=api", "purl": "pkg:generic/postgresql@14.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.5.0" } ], "aliases": [ "CVE-2022-2625" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nuek-ypyh-b3dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3514?format=api", "vulnerability_id": "VCID-nwfr-t7xn-zuae", "summary": "Role \"pg_signal_backend\" can signal certain superuser processesmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5870.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5870.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5870", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.7002", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.7007", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70113", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70123", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70102", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70153", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.7016", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70161", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70136", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70035", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70011", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70059", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70075", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70098", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70083", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5870" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2023-5870/", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L']" }, { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://www.postgresql.org/support/security/CVE-2023-5870/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283", "reference_id": "1056283", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247170", "reference_id": "2247170", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247170" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8", "reference_id": "cpe:/a:redhat:advanced_cluster_security:3.74::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8", "reference_id": "cpe:/a:redhat:advanced_cluster_security:4.1::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8", "reference_id": "cpe:/a:redhat:advanced_cluster_security:4.2::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.0::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb", "reference_id": "cpe:/a:redhat:rhel_eus:9.0::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb", "reference_id": "cpe:/a:redhat:rhel_eus:9.2::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3", "reference_id": "cpe:/a:redhat:rhel_software_collections:3", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7", "reference_id": "cpe:/a:redhat:rhel_software_collections:3::el7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-5870", "reference_id": "CVE-2023-5870", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-5870" }, { "reference_url": "https://security.gentoo.org/glsa/202408-06", "reference_id": "GLSA-202408-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202408-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7545", "reference_id": "RHSA-2023:7545", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7579", "reference_id": "RHSA-2023:7579", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7579" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7580", "reference_id": "RHSA-2023:7580", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7581", "reference_id": "RHSA-2023:7581", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7581" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7616", "reference_id": "RHSA-2023:7616", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7656", "reference_id": "RHSA-2023:7656", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7656" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7666", "reference_id": "RHSA-2023:7666", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7666" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7667", "reference_id": "RHSA-2023:7667", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7694", "reference_id": "RHSA-2023:7694", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7694" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7695", "reference_id": "RHSA-2023:7695", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7695" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7714", "reference_id": "RHSA-2023:7714", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7714" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7770", "reference_id": "RHSA-2023:7770", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7770" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7772", "reference_id": "RHSA-2023:7772", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7772" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7784", "reference_id": "RHSA-2023:7784", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7784" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7785", "reference_id": "RHSA-2023:7785", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7785" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7883", "reference_id": "RHSA-2023:7883", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7884", "reference_id": "RHSA-2023:7884", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7885", "reference_id": "RHSA-2023:7885", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0304", "reference_id": "RHSA-2024:0304", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0332", "reference_id": "RHSA-2024:0332", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:0332" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0337", "reference_id": "RHSA-2024:0337", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-19T19:42:25Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:0337" }, { "reference_url": "https://usn.ubuntu.com/6538-1/", "reference_id": "USN-6538-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6538-1/" }, { "reference_url": "https://usn.ubuntu.com/6538-2/", "reference_id": "USN-6538-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6538-2/" }, { "reference_url": "https://usn.ubuntu.com/6570-1/", "reference_id": "USN-6570-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6570-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/180?format=api", "purl": "pkg:generic/postgresql@11.22.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.22.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/179?format=api", "purl": "pkg:generic/postgresql@12.17.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.17.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/178?format=api", "purl": "pkg:generic/postgresql@13.13.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.13.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/154?format=api", "purl": "pkg:generic/postgresql@14.10.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.10.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/153?format=api", "purl": "pkg:generic/postgresql@15.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/152?format=api", "purl": "pkg:generic/postgresql@16.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.1.0" } ], "aliases": [ "CVE-2023-5870" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nwfr-t7xn-zuae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3566?format=api", "vulnerability_id": "VCID-pg5v-ux6b-3qdn", "summary": "Selectivity estimators bypass row security policiesmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10130.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10130.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10130", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41713", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41723", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41779", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41808", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41736", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41786", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41795", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41818", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41785", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41821", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41772", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42043", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42273", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.4219", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42278", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10130/", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2019-10130/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707109", "reference_id": "1707109", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707109" }, { "reference_url": "https://security.gentoo.org/glsa/202003-03", "reference_id": "GLSA-202003-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980", "reference_id": "RHSA-2020:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669", "reference_id": "RHSA-2020:3669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295", "reference_id": "RHSA-2020:4295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619", "reference_id": "RHSA-2020:5619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661", "reference_id": "RHSA-2020:5661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164", "reference_id": "RHSA-2021:0164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167", "reference_id": "RHSA-2021:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0167" }, { "reference_url": "https://usn.ubuntu.com/3972-1/", "reference_id": "USN-3972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/322?format=api", "purl": "pkg:generic/postgresql@11.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.3.0" } ], "aliases": [ "CVE-2019-10130" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pg5v-ux6b-3qdn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3516?format=api", "vulnerability_id": "VCID-q5z4-wv12-1fh7", "summary": "Memory disclosure in aggregate function callsmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5868.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5868.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5868", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02718", "scoring_system": "epss", "scoring_elements": "0.85992", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02718", "scoring_system": "epss", "scoring_elements": "0.85972", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02718", "scoring_system": "epss", "scoring_elements": "0.85973", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02718", "scoring_system": "epss", "scoring_elements": "0.85874", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02718", "scoring_system": "epss", "scoring_elements": "0.85891", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02718", "scoring_system": "epss", "scoring_elements": "0.85894", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02718", "scoring_system": "epss", "scoring_elements": "0.85913", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02718", "scoring_system": "epss", "scoring_elements": "0.85923", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02718", "scoring_system": "epss", "scoring_elements": "0.85937", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02718", "scoring_system": "epss", "scoring_elements": "0.85935", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02718", "scoring_system": "epss", "scoring_elements": "0.8593", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02718", "scoring_system": "epss", "scoring_elements": "0.85949", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02718", "scoring_system": "epss", "scoring_elements": "0.85952", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02718", "scoring_system": "epss", "scoring_elements": "0.85943", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02718", "scoring_system": "epss", "scoring_elements": "0.85963", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2023-5868/", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2023-5868/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283", "reference_id": "1056283", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056283" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247168", "reference_id": "2247168", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247168" }, { "reference_url": "https://security.gentoo.org/glsa/202408-06", "reference_id": "GLSA-202408-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202408-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7545", "reference_id": "RHSA-2023:7545", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7579", "reference_id": "RHSA-2023:7579", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7579" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7580", "reference_id": "RHSA-2023:7580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7581", "reference_id": "RHSA-2023:7581", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7581" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7616", "reference_id": "RHSA-2023:7616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7656", "reference_id": "RHSA-2023:7656", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7656" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7666", "reference_id": "RHSA-2023:7666", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7666" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7667", "reference_id": "RHSA-2023:7667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7694", "reference_id": "RHSA-2023:7694", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7694" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7695", "reference_id": "RHSA-2023:7695", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7695" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7714", "reference_id": "RHSA-2023:7714", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7714" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7770", "reference_id": "RHSA-2023:7770", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7770" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7772", "reference_id": "RHSA-2023:7772", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7772" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7784", "reference_id": "RHSA-2023:7784", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7784" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7785", "reference_id": "RHSA-2023:7785", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7785" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7883", "reference_id": "RHSA-2023:7883", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7884", "reference_id": "RHSA-2023:7884", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7885", "reference_id": "RHSA-2023:7885", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0304", "reference_id": "RHSA-2024:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0332", "reference_id": "RHSA-2024:0332", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0332" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0337", "reference_id": "RHSA-2024:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0337" }, { "reference_url": "https://usn.ubuntu.com/6538-1/", "reference_id": "USN-6538-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6538-1/" }, { "reference_url": "https://usn.ubuntu.com/6538-2/", "reference_id": "USN-6538-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6538-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/180?format=api", "purl": "pkg:generic/postgresql@11.22.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.22.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/179?format=api", "purl": "pkg:generic/postgresql@12.17.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.17.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/178?format=api", "purl": "pkg:generic/postgresql@13.13.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.13.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/154?format=api", "purl": "pkg:generic/postgresql@14.10.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.10.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/153?format=api", "purl": "pkg:generic/postgresql@15.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/152?format=api", "purl": "pkg:generic/postgresql@16.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@16.1.0" } ], "aliases": [ "CVE-2023-5868" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5z4-wv12-1fh7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3521?format=api", "vulnerability_id": "VCID-q8ka-5dxw-w7fs", "summary": "Autovacuum, REINDEX, and others omit \"security restricted operation\" sandboxmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1552.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1552.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1552", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84548", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.847", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84675", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84685", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84686", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84563", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84588", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84609", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84616", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84635", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.8463", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84625", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84646", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84647", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02263", "scoring_system": "epss", "scoring_elements": "0.84648", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2022-1552/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2022-1552/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081126", "reference_id": "2081126", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081126" }, { "reference_url": "https://security.archlinux.org/AVG-2719", "reference_id": "AVG-2719", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2719" }, { "reference_url": "https://security.gentoo.org/glsa/202211-04", "reference_id": "GLSA-202211-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202211-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4771", "reference_id": "RHSA-2022:4771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4805", "reference_id": "RHSA-2022:4805", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4805" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4807", "reference_id": "RHSA-2022:4807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4854", "reference_id": "RHSA-2022:4854", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4855", "reference_id": "RHSA-2022:4855", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4855" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4856", "reference_id": "RHSA-2022:4856", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4856" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4857", "reference_id": "RHSA-2022:4857", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4857" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4893", "reference_id": "RHSA-2022:4893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4893" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4894", "reference_id": "RHSA-2022:4894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4895", "reference_id": "RHSA-2022:4895", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4895" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4913", "reference_id": "RHSA-2022:4913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4915", "reference_id": "RHSA-2022:4915", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4915" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4929", "reference_id": "RHSA-2022:4929", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4929" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5162", "reference_id": "RHSA-2022:5162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5162" }, { "reference_url": "https://usn.ubuntu.com/5440-1/", "reference_id": "USN-5440-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5440-1/" }, { "reference_url": "https://usn.ubuntu.com/5676-1/", "reference_id": "USN-5676-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5676-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/287?format=api", "purl": "pkg:generic/postgresql@11.16.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.16.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/286?format=api", "purl": "pkg:generic/postgresql@12.11.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.11.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/285?format=api", "purl": "pkg:generic/postgresql@13.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.7.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/160?format=api", "purl": "pkg:generic/postgresql@14.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.3.0" } ], "aliases": [ "CVE-2022-1552" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q8ka-5dxw-w7fs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3522?format=api", "vulnerability_id": "VCID-qbd9-mpc6-5bap", "summary": "libpq processes unencrypted bytes from man-in-the-middlemore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23222.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23222.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23222", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51475", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51515", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51576", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51555", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51508", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51419", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51602", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51586", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51628", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51624", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51484", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51535", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51562", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51523", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51577", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51574", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2021-23222/", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2021-23222/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022675", "reference_id": "2022675", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022675" }, { "reference_url": "https://security.archlinux.org/AVG-2547", "reference_id": "AVG-2547", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2547" }, { "reference_url": "https://security.gentoo.org/glsa/202211-04", "reference_id": "GLSA-202211-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202211-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5179", "reference_id": "RHSA-2021:5179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5197", "reference_id": "RHSA-2021:5197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1891", "reference_id": "RHSA-2022:1891", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1891" }, { "reference_url": "https://usn.ubuntu.com/5145-1/", "reference_id": "USN-5145-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5145-1/" }, { "reference_url": "https://usn.ubuntu.com/5765-1/", "reference_id": "USN-5765-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5765-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/296?format=api", "purl": "pkg:generic/postgresql@11.14.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.14.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/295?format=api", "purl": "pkg:generic/postgresql@12.9.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.9.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/294?format=api", "purl": "pkg:generic/postgresql@13.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/161?format=api", "purl": "pkg:generic/postgresql@14.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.1.0" } ], "aliases": [ "CVE-2021-23222" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qbd9-mpc6-5bap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3523?format=api", "vulnerability_id": "VCID-srbh-8fdq-bkc2", "summary": "Server processes unencrypted bytes from man-in-the-middlemore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23214.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23214.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23214", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.40816", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41043", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41037", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.40956", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41154", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.4157", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45251", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45245", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.4523", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.4519", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45213", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45155", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45209", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45197", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.452", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2021-23214/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2021-23214/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022666", "reference_id": "2022666", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022666" }, { "reference_url": "https://security.archlinux.org/ASA-202204-1", "reference_id": "ASA-202204-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202204-1" }, { "reference_url": "https://security.archlinux.org/AVG-2546", "reference_id": "AVG-2546", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2546" }, { "reference_url": "https://security.gentoo.org/glsa/202211-04", "reference_id": "GLSA-202211-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202211-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5179", "reference_id": "RHSA-2021:5179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5197", "reference_id": "RHSA-2021:5197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5235", "reference_id": "RHSA-2021:5235", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5235" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5236", "reference_id": "RHSA-2021:5236", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5236" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1830", "reference_id": "RHSA-2022:1830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1830" }, { "reference_url": "https://usn.ubuntu.com/5145-1/", "reference_id": "USN-5145-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5145-1/" }, { "reference_url": "https://usn.ubuntu.com/5645-1/", "reference_id": "USN-5645-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5645-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/296?format=api", "purl": "pkg:generic/postgresql@11.14.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.14.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/295?format=api", "purl": "pkg:generic/postgresql@12.9.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.9.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/294?format=api", "purl": "pkg:generic/postgresql@13.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/161?format=api", "purl": "pkg:generic/postgresql@14.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.1.0" } ], "aliases": [ "CVE-2021-23214" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-srbh-8fdq-bkc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3561?format=api", "vulnerability_id": "VCID-umaz-62cm-bqfe", "summary": "Uncontrolled search path element in CREATE EXTENSIONmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14350", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08621", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08617", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0868", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08683", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08648", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08697", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08618", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08695", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0872", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08682", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0857", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08558", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08713", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08726", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14350" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2020-14350/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2020-14350/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865746", "reference_id": "1865746", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865746" }, { "reference_url": "https://security.gentoo.org/glsa/202008-13", "reference_id": "GLSA-202008-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202008-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669", "reference_id": "RHSA-2020:3669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295", "reference_id": "RHSA-2020:4295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5110", "reference_id": "RHSA-2020:5110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5112", "reference_id": "RHSA-2020:5112", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5112" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619", "reference_id": "RHSA-2020:5619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620", "reference_id": "RHSA-2020:5620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661", "reference_id": "RHSA-2020:5661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163", "reference_id": "RHSA-2021:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164", "reference_id": "RHSA-2021:0164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167", "reference_id": "RHSA-2021:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0988", "reference_id": "RHSA-2021:0988", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0988" }, { "reference_url": "https://usn.ubuntu.com/4472-1/", "reference_id": "USN-4472-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4472-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/306?format=api", "purl": "pkg:generic/postgresql@11.9.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.9.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/305?format=api", "purl": "pkg:generic/postgresql@12.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.4.0" } ], "aliases": [ "CVE-2020-14350" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-umaz-62cm-bqfe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3564?format=api", "vulnerability_id": "VCID-wamn-1as1-qbfa", "summary": "ALTER ... DEPENDS ON EXTENSION is missing authorization checks.more details", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1720", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57428", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57452", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57563", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57543", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57502", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57522", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57501", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57512", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57533", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57509", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57562", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57566", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57581", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57561", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57539", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57567", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1720" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/2011/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/2011/" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2020-1720/", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2020-1720/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798852", "reference_id": "1798852", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798852" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1720", "reference_id": "CVE-2020-1720", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:P/A:N" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1720" }, { "reference_url": "https://security.gentoo.org/glsa/202003-03", "reference_id": "GLSA-202003-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980", "reference_id": "RHSA-2020:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669", "reference_id": "RHSA-2020:3669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4295", "reference_id": "RHSA-2020:4295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5112", "reference_id": "RHSA-2020:5112", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5112" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619", "reference_id": "RHSA-2020:5619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620", "reference_id": "RHSA-2020:5620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661", "reference_id": "RHSA-2020:5661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163", "reference_id": "RHSA-2021:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164", "reference_id": "RHSA-2021:0164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167", "reference_id": "RHSA-2021:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0167" }, { "reference_url": "https://usn.ubuntu.com/4282-1/", "reference_id": "USN-4282-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4282-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/317?format=api", "purl": "pkg:generic/postgresql@11.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.7.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/316?format=api", "purl": "pkg:generic/postgresql@12.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.2.0" } ], "aliases": [ "CVE-2020-1720" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wamn-1as1-qbfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3596?format=api", "vulnerability_id": "VCID-xbd8-nqxx-buhb", "summary": "Memory disclosure in cross-type comparison for hashed subplanmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10209.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10209.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10209", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63167", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63278", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.633", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63298", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63312", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63309", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63227", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63256", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63221", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63272", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.6329", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63307", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63291", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63255", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63292", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10209" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10209", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10209" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209" }, { "reference_url": "https://www.postgresql.org/about/news/1960/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/1960/" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10209/", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2019-10209/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734447", "reference_id": "1734447", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734447" }, { "reference_url": "https://security.archlinux.org/ASA-201908-7", "reference_id": "ASA-201908-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201908-7" }, { "reference_url": "https://security.archlinux.org/ASA-201908-8", "reference_id": "ASA-201908-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201908-8" }, { "reference_url": "https://security.archlinux.org/AVG-1019", "reference_id": "AVG-1019", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1019" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10209", "reference_id": "CVE-2019-10209", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:N/A:N" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10209" }, { "reference_url": "https://usn.ubuntu.com/4090-1/", "reference_id": "USN-4090-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4090-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/200?format=api", "purl": "pkg:generic/postgresql@11.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.5.0" } ], "aliases": [ "CVE-2019-10209" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xbd8-nqxx-buhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3558?format=api", "vulnerability_id": "VCID-xjv3-x91m-qqhn", "summary": "psql's \\gset allows overwriting specially treated variablesmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25696", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64626", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64748", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64757", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.6477", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64766", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64678", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64706", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64665", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64713", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64727", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64744", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64733", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64705", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64741", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64752", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00473", "scoring_system": "epss", "scoring_elements": "0.64739", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2020-25696/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2020-25696/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894430", "reference_id": "1894430", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894430" }, { "reference_url": "https://security.archlinux.org/ASA-202011-14", "reference_id": "ASA-202011-14", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202011-14" }, { "reference_url": "https://security.archlinux.org/AVG-1276", "reference_id": "AVG-1276", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1276" }, { "reference_url": "https://security.gentoo.org/glsa/202012-07", "reference_id": "GLSA-202012-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202012-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5316", "reference_id": "RHSA-2020:5316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5316" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5317", "reference_id": "RHSA-2020:5317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5401", "reference_id": "RHSA-2020:5401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5401" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5567", "reference_id": "RHSA-2020:5567", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5567" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5619", "reference_id": "RHSA-2020:5619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5620", "reference_id": "RHSA-2020:5620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5638", "reference_id": "RHSA-2020:5638", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5638" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5661", "reference_id": "RHSA-2020:5661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0057", "reference_id": "RHSA-2021:0057", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0057" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0161", "reference_id": "RHSA-2021:0161", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0161" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0163", "reference_id": "RHSA-2021:0163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0164", "reference_id": "RHSA-2021:0164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0165", "reference_id": "RHSA-2021:0165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0167", "reference_id": "RHSA-2021:0167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0167" }, { "reference_url": "https://usn.ubuntu.com/4633-1/", "reference_id": "USN-4633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4633-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/301?format=api", "purl": "pkg:generic/postgresql@11.10.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/300?format=api", "purl": "pkg:generic/postgresql@12.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/299?format=api", "purl": "pkg:generic/postgresql@13.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0" } ], "aliases": [ "CVE-2020-25696" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xjv3-x91m-qqhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3597?format=api", "vulnerability_id": "VCID-y23y-qvcc-4qh2", "summary": "Memory disclosure in partition routingmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10129.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10129.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10129", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63198", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63257", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63287", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63251", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63303", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.6332", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63338", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63321", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63322", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63329", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63309", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63328", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63341", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63339", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63311", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10129" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10129/", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2019-10129/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707106", "reference_id": "1707106", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707106" }, { "reference_url": "https://security.gentoo.org/glsa/202003-03", "reference_id": "GLSA-202003-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-03" }, { "reference_url": "https://usn.ubuntu.com/3972-1/", "reference_id": "USN-3972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/322?format=api", "purl": "pkg:generic/postgresql@11.3.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.3.0" } ], "aliases": [ "CVE-2019-10129" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y23y-qvcc-4qh2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3513?format=api", "vulnerability_id": "VCID-y871-sfhf-a7by", "summary": "Extension script @substitutions@ within quoting allow SQL injectionmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39417.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39417.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-39417", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.71012", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.7103", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.71005", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.71047", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.71062", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.71085", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.7107", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.71053", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.711", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.71107", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00659", "scoring_system": "epss", "scoring_elements": "0.71139", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71572", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71579", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71584", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71521", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-39417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-154-149-1312-1216-1121-and-postgresql-16-beta-3-released-2689/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-154-149-1312-1216-1121-and-postgresql-16-beta-3-released-2689/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2023-39417/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2023-39417/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228111", "reference_id": "2228111", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228111" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8", "reference_id": "cpe:/a:redhat:advanced_cluster_security:3.74::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:3.74::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8", "reference_id": "cpe:/a:redhat:advanced_cluster_security:4.1::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.1::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8", "reference_id": "cpe:/a:redhat:advanced_cluster_security:4.2::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_cluster_security:4.2::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.0::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb", "reference_id": "cpe:/a:redhat:rhel_eus:9.0::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb", "reference_id": "cpe:/a:redhat:rhel_eus:9.2::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3", "reference_id": "cpe:/a:redhat:rhel_software_collections:3", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7", "reference_id": "cpe:/a:redhat:rhel_software_collections:3::el7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-39417", "reference_id": "CVE-2023-39417", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-39417" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2023-39417", "reference_id": "CVE-2023-39417", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://www.postgresql.org/support/security/CVE-2023-39417" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7545", "reference_id": "RHSA-2023:7545", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7579", "reference_id": "RHSA-2023:7579", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7579" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7580", "reference_id": "RHSA-2023:7580", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7581", "reference_id": "RHSA-2023:7581", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7581" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7616", "reference_id": "RHSA-2023:7616", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7656", "reference_id": "RHSA-2023:7656", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7656" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7666", "reference_id": "RHSA-2023:7666", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7666" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7667", "reference_id": "RHSA-2023:7667", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7667" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7694", "reference_id": "RHSA-2023:7694", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7694" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7695", "reference_id": "RHSA-2023:7695", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7695" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7714", "reference_id": "RHSA-2023:7714", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7714" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7770", "reference_id": "RHSA-2023:7770", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7770" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7772", "reference_id": "RHSA-2023:7772", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7772" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7784", "reference_id": "RHSA-2023:7784", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7784" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7785", "reference_id": "RHSA-2023:7785", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7785" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7883", "reference_id": "RHSA-2023:7883", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7884", "reference_id": "RHSA-2023:7884", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7884" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7885", "reference_id": "RHSA-2023:7885", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7885" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0304", "reference_id": "RHSA-2024:0304", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0332", "reference_id": "RHSA-2024:0332", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:0332" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0337", "reference_id": "RHSA-2024:0337", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-09T13:38:12Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:0337" }, { "reference_url": "https://usn.ubuntu.com/6296-1/", "reference_id": "USN-6296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6296-1/" }, { "reference_url": "https://usn.ubuntu.com/6366-1/", "reference_id": "USN-6366-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6366-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/177?format=api", "purl": "pkg:generic/postgresql@11.21.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.21.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/176?format=api", "purl": "pkg:generic/postgresql@12.16.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.16.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/175?format=api", "purl": "pkg:generic/postgresql@13.12.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.12.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/151?format=api", "purl": "pkg:generic/postgresql@14.9.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.9.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/150?format=api", "purl": "pkg:generic/postgresql@15.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@15.4.0" } ], "aliases": [ "CVE-2023-39417" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y871-sfhf-a7by" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3565?format=api", "vulnerability_id": "VCID-ybb6-2xrm-7fbk", "summary": "Stack-based buffer overflow via setting a passwordmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10164.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10164.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10164", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05798", "scoring_system": "epss", "scoring_elements": "0.90528", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05798", "scoring_system": "epss", "scoring_elements": "0.90516", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05798", "scoring_system": "epss", "scoring_elements": "0.9051", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.90571", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.90579", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.90591", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.90597", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.90556", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05903", "scoring_system": "epss", "scoring_elements": "0.9056", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13393", "scoring_system": "epss", "scoring_elements": "0.94218", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.13393", "scoring_system": "epss", "scoring_elements": "0.94211", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.13393", "scoring_system": "epss", "scoring_elements": "0.94214", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10164" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-114-109-9614-9518-9423-and-12-beta-2-released-1949/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-114-109-9614-9518-9423-and-12-beta-2-released-1949/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2019-10164/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2019-10164/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719698", "reference_id": "1719698", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719698" }, { "reference_url": "https://security.gentoo.org/glsa/202003-03", "reference_id": "GLSA-202003-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0980", "reference_id": "RHSA-2020:0980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3669", "reference_id": "RHSA-2020:3669", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3669" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5664", "reference_id": "RHSA-2020:5664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0166", "reference_id": "RHSA-2021:0166", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0166" }, { "reference_url": "https://usn.ubuntu.com/4027-1/", "reference_id": "USN-4027-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4027-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/320?format=api", "purl": "pkg:generic/postgresql@11.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.4.0" } ], "aliases": [ "CVE-2019-10164" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ybb6-2xrm-7fbk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3594?format=api", "vulnerability_id": "VCID-yy3k-mszq-cbcs", "summary": "Memory disclosure in certain queriesmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3677.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3677.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3677", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42211", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42323", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42273", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42286", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42314", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42256", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42307", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42301", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42337", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45067", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45223", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.4523", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45171", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45363", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45311", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3677" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-134-128-1113-1018-9623-and-14-beta-3-released-2277/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-134-128-1113-1018-9623-and-14-beta-3-released-2277/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2021-3677/", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2021-3677/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001857", "reference_id": "2001857", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001857" }, { "reference_url": "https://security.archlinux.org/AVG-2290", "reference_id": "AVG-2290", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2290" }, { "reference_url": "https://security.gentoo.org/glsa/202211-04", "reference_id": "GLSA-202211-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202211-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5179", "reference_id": "RHSA-2021:5179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5197", "reference_id": "RHSA-2021:5197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5235", "reference_id": "RHSA-2021:5235", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5235" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5236", "reference_id": "RHSA-2021:5236", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5236" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4931", "reference_id": "RHSA-2022:4931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4931" }, { "reference_url": "https://usn.ubuntu.com/5038-1/", "reference_id": "USN-5038-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5038-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396?format=api", "purl": "pkg:generic/postgresql@11.13.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.13.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/395?format=api", "purl": "pkg:generic/postgresql@12.8.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.8.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/394?format=api", "purl": "pkg:generic/postgresql@13.4.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.4.0" } ], "aliases": [ "CVE-2021-3677" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yy3k-mszq-cbcs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3529?format=api", "vulnerability_id": "VCID-zrcc-w98g-gfhk", "summary": "pg_ctlcluster script in postgresql-common does not drop privileges when creating socket/statistics temporary directoriesmore details", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3466", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.31664", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.3219", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.3202", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.31892", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.31812", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32326", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32364", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32188", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32237", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32265", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32266", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32198", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32231", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.3221", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32181", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3466" }, { "reference_url": "https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466" }, { "reference_url": "https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2019-3466/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2019-3466/" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3466", "reference_id": "CVE-2019-3466", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3466" }, { "reference_url": "https://usn.ubuntu.com/4194-1/", "reference_id": "USN-4194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4194-1/" }, { "reference_url": "https://usn.ubuntu.com/4194-2/", "reference_id": "USN-4194-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4194-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/211?format=api", "purl": "pkg:generic/postgresql@11.6.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.6.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/210?format=api", "purl": "pkg:generic/postgresql@12.1.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.1.0" } ], "aliases": [ "CVE-2019-3466" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zrcc-w98g-gfhk" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.0.0" }