{"url":"http://public2.vulnerablecode.io/api/packages/197?format=json","purl":"pkg:generic/postgresql@9.5.0","type":"generic","namespace":"","name":"postgresql","version":"9.5.0","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"9.5.1","latest_non_vulnerable_version":"18.2.0","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3873?format=json","vulnerability_id":"VCID-235z-6mm1-ryc1","summary":"pageinspect does not check permissions for BRIN indexesmore details","references":[{"reference_url":"http://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=bf78a6f107949fdfb513d1b45e30cefe04e09e4f","reference_id":"","reference_type":"","scores":[],"url":"http://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=bf78a6f107949fdfb513d1b45e30cefe04e09e4f"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3065.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3065.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3065","reference_id":"","reference_type":"","scores":[{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.7837","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78166","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78343","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78359","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78354","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78174","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78204","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78187","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78213","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78219","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78245","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78228","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78224","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78255","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78253","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.7825","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78283","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78289","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78305","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01118","scoring_system":"epss","scoring_elements":"0.78318","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3065"},{"reference_url":"https://www.postgresql.org/about/news/2016-03-31-security-update-release-1656/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/2016-03-31-security-update-release-1656/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2016-3065/","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2016-3065/"},{"reference_url":"http://www.postgresql.org/about/news/1656/","reference_id":"","reference_type":"","scores":[],"url":"http://www.postgresql.org/about/news/1656/"},{"reference_url":"http://www.postgresql.org/docs/current/static/release-9-5-2.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.postgresql.org/docs/current/static/release-9-5-2.html"},{"reference_url":"http://www.securitytracker.com/id/1035468","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035468"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1319810","reference_id":"1319810","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1319810"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3065","reference_id":"CVE-2016-3065","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:C"},{"value":"9.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3065"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571?format=json","purl":"pkg:generic/postgresql@9.5.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.2"}],"aliases":["CVE-2016-3065"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-235z-6mm1-ryc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3560?format=json","vulnerability_id":"VCID-36gv-m96w-47db","summary":"Reconnection can downgrade connection security settingsmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25694","reference_id":"","reference_type":"","scores":[{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58007","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58134","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58092","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58153","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58105","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58091","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58087","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58142","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58145","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.5816","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58137","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58118","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58148","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58149","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58124","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58104","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.5809","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58051","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2020-25694/","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2020-25694/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894423","reference_id":"1894423","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894423"},{"reference_url":"https://security.archlinux.org/ASA-202011-14","reference_id":"ASA-202011-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-14"},{"reference_url":"https://security.archlinux.org/AVG-1276","reference_id":"AVG-1276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1276"},{"reference_url":"https://security.gentoo.org/glsa/202012-07","reference_id":"GLSA-202012-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5316","reference_id":"RHSA-2020:5316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5317","reference_id":"RHSA-2020:5317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5401","reference_id":"RHSA-2020:5401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5401"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5567","reference_id":"RHSA-2020:5567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5620","reference_id":"RHSA-2020:5620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5638","reference_id":"RHSA-2020:5638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0057","reference_id":"RHSA-2021:0057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0161","reference_id":"RHSA-2021:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0163","reference_id":"RHSA-2021:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0165","reference_id":"RHSA-2021:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1512","reference_id":"RHSA-2021:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1512"},{"reference_url":"https://usn.ubuntu.com/4633-1/","reference_id":"USN-4633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4633-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/304?format=json","purl":"pkg:generic/postgresql@9.5.24","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.24"},{"url":"http://public2.vulnerablecode.io/api/packages/303?format=json","purl":"pkg:generic/postgresql@9.6.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.20"},{"url":"http://public2.vulnerablecode.io/api/packages/302?format=json","purl":"pkg:generic/postgresql@10.15.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.15.0"},{"url":"http://public2.vulnerablecode.io/api/packages/301?format=json","purl":"pkg:generic/postgresql@11.10.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0"},{"url":"http://public2.vulnerablecode.io/api/packages/300?format=json","purl":"pkg:generic/postgresql@12.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/299?format=json","purl":"pkg:generic/postgresql@13.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0"}],"aliases":["CVE-2020-25694"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-36gv-m96w-47db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3537?format=json","vulnerability_id":"VCID-3qrq-rc38-13ep","summary":"empty password accepted in some authentication methodsmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7546.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7546.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7546","reference_id":"","reference_type":"","scores":[{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96868","published_at":"2026-04-01T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96943","published_at":"2026-05-12T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96924","published_at":"2026-05-05T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96928","published_at":"2026-05-07T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96935","published_at":"2026-05-09T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96937","published_at":"2026-05-11T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96875","published_at":"2026-04-02T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.9688","published_at":"2026-04-04T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96884","published_at":"2026-04-07T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96893","published_at":"2026-04-08T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96898","published_at":"2026-04-12T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96899","published_at":"2026-04-13T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96911","published_at":"2026-04-18T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96913","published_at":"2026-04-21T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96914","published_at":"2026-04-24T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96916","published_at":"2026-04-26T12:55:00Z"},{"value":"0.33122","scoring_system":"epss","scoring_elements":"0.96921","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/2017-08-10-security-update-release-1772/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/2017-08-10-security-update-release-1772/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2017-7546/","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2017-7546/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1477184","reference_id":"1477184","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1477184"},{"reference_url":"https://security.archlinux.org/ASA-201709-2","reference_id":"ASA-201709-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201709-2"},{"reference_url":"https://security.archlinux.org/AVG-381","reference_id":"AVG-381","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-381"},{"reference_url":"https://security.gentoo.org/glsa/201710-06","reference_id":"GLSA-201710-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2677","reference_id":"RHSA-2017:2677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2678","reference_id":"RHSA-2017:2678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2728","reference_id":"RHSA-2017:2728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2728"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2860","reference_id":"RHSA-2017:2860","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2860"},{"reference_url":"https://usn.ubuntu.com/3390-1/","reference_id":"USN-3390-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3390-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/240?format=json","purl":"pkg:generic/postgresql@9.5.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.8"},{"url":"http://public2.vulnerablecode.io/api/packages/239?format=json","purl":"pkg:generic/postgresql@9.6.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.4"}],"aliases":["CVE-2017-7546"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3qrq-rc38-13ep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3539?format=json","vulnerability_id":"VCID-45vk-2xsq-cffk","summary":"libpq ignores PGREQUIRESSL environment variablemore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7485.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7485.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7485","reference_id":"","reference_type":"","scores":[{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72177","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72329","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72301","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72182","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72203","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72178","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72215","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72227","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.7225","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72234","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.7222","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72263","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72273","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.7226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72305","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72314","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00926","scoring_system":"epss","scoring_elements":"0.7619","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00926","scoring_system":"epss","scoring_elements":"0.76187","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00926","scoring_system":"epss","scoring_elements":"0.76174","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2017-7485/","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2017-7485/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1448086","reference_id":"1448086","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1448086"},{"reference_url":"https://security.archlinux.org/ASA-201705-24","reference_id":"ASA-201705-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201705-24"},{"reference_url":"https://security.archlinux.org/AVG-280","reference_id":"AVG-280","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-280"},{"reference_url":"https://security.gentoo.org/glsa/201710-06","reference_id":"GLSA-201710-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1677","reference_id":"RHSA-2017:1677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1678","reference_id":"RHSA-2017:1678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1838","reference_id":"RHSA-2017:1838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2425","reference_id":"RHSA-2017:2425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2425"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/245?format=json","purl":"pkg:generic/postgresql@9.5.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.7"},{"url":"http://public2.vulnerablecode.io/api/packages/244?format=json","purl":"pkg:generic/postgresql@9.6.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.3"}],"aliases":["CVE-2017-7485"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-45vk-2xsq-cffk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3540?format=json","vulnerability_id":"VCID-723y-bsbd-6kfd","summary":"selectivity estimators bypass SELECT privilege checksmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7484.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7484.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7484","reference_id":"","reference_type":"","scores":[{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78171","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.79807","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.79608","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.7968","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.79664","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.79656","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.79685","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.7978","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.79796","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.79792","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.79614","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.79637","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.79623","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.79651","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.79659","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01325","scoring_system":"epss","scoring_elements":"0.79976","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01325","scoring_system":"epss","scoring_elements":"0.79992","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01325","scoring_system":"epss","scoring_elements":"0.80004","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01325","scoring_system":"epss","scoring_elements":"0.7997","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2017-7484/","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2017-7484/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1448078","reference_id":"1448078","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1448078"},{"reference_url":"https://security.archlinux.org/ASA-201705-23","reference_id":"ASA-201705-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201705-23"},{"reference_url":"https://security.archlinux.org/AVG-272","reference_id":"AVG-272","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-272"},{"reference_url":"https://security.gentoo.org/glsa/201710-06","reference_id":"GLSA-201710-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1677","reference_id":"RHSA-2017:1677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1678","reference_id":"RHSA-2017:1678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1838","reference_id":"RHSA-2017:1838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1983","reference_id":"RHSA-2017:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1983"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2425","reference_id":"RHSA-2017:2425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2425"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/245?format=json","purl":"pkg:generic/postgresql@9.5.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.7"},{"url":"http://public2.vulnerablecode.io/api/packages/244?format=json","purl":"pkg:generic/postgresql@9.6.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.3"}],"aliases":["CVE-2017-7484"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-723y-bsbd-6kfd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3531?format=json","vulnerability_id":"VCID-7xfn-1fv3-1bgv","summary":"Uncontrolled search path element in pg_dump and other client applicationsmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1058.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1058.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1058","reference_id":"","reference_type":"","scores":[{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99229","published_at":"2026-04-01T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99251","published_at":"2026-05-12T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99246","published_at":"2026-04-29T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99249","published_at":"2026-05-05T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.9925","published_at":"2026-05-11T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99231","published_at":"2026-04-02T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99234","published_at":"2026-04-04T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99238","published_at":"2026-04-07T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.9924","published_at":"2026-04-16T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99241","published_at":"2026-04-21T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99245","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1058"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-103-968-9512-9417-and-9322-released-1834/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-103-968-9512-9417-and-9322-released-1834/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2018-1058/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2018-1058/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547044","reference_id":"1547044","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547044"},{"reference_url":"https://security.archlinux.org/ASA-201803-9","reference_id":"ASA-201803-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-9"},{"reference_url":"https://security.archlinux.org/AVG-643","reference_id":"AVG-643","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2511","reference_id":"RHSA-2018:2511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2566","reference_id":"RHSA-2018:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3816","reference_id":"RHSA-2018:3816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3816"},{"reference_url":"https://usn.ubuntu.com/3589-1/","reference_id":"USN-3589-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3589-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/224?format=json","purl":"pkg:generic/postgresql@9.5.12","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.12"},{"url":"http://public2.vulnerablecode.io/api/packages/223?format=json","purl":"pkg:generic/postgresql@9.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.8"},{"url":"http://public2.vulnerablecode.io/api/packages/222?format=json","purl":"pkg:generic/postgresql@10.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.3.0"}],"aliases":["CVE-2018-1058"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7xfn-1fv3-1bgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3542?format=json","vulnerability_id":"VCID-8bu8-zpfv-8bgg","summary":"Exceptional database and role names could enable escalation to superusermore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5424.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5424.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5424","reference_id":"","reference_type":"","scores":[{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82076","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82293","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82281","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82277","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82088","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82105","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82132","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82139","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82158","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82181","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82182","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82184","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82207","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82218","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82221","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82236","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01674","scoring_system":"epss","scoring_elements":"0.82258","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/2016-08-11-security-update-release-1688/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/2016-08-11-security-update-release-1688/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2016-5424/","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2016-5424/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1364002","reference_id":"1364002","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1364002"},{"reference_url":"https://security.gentoo.org/glsa/201701-33","reference_id":"GLSA-201701-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1781","reference_id":"RHSA-2016:1781","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1781"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1820","reference_id":"RHSA-2016:1820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1821","reference_id":"RHSA-2016:1821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2606","reference_id":"RHSA-2016:2606","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2606"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2425","reference_id":"RHSA-2017:2425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2425"},{"reference_url":"https://usn.ubuntu.com/3066-1/","reference_id":"USN-3066-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3066-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/255?format=json","purl":"pkg:generic/postgresql@9.5.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.4"}],"aliases":["CVE-2016-5424"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8bu8-zpfv-8bgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3874?format=json","vulnerability_id":"VCID-99q3-5g9b-xkc3","summary":"Plan cache might use wrong role context for RLS policymore details","references":[{"reference_url":"http://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=db69e58a0642ef7fa46d62f6c4cf2460c3a1b41b","reference_id":"","reference_type":"","scores":[],"url":"http://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=db69e58a0642ef7fa46d62f6c4cf2460c3a1b41b"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2193.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2193.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2193","reference_id":"","reference_type":"","scores":[{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81429","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.8122","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81372","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81392","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81414","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81411","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81229","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81252","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81251","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81279","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81284","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81305","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81291","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81283","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81321","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81322","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81344","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81352","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81356","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2193"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/2016-03-31-security-update-release-1656/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/2016-03-31-security-update-release-1656/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2016-2193/","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2016-2193/"},{"reference_url":"http://www.postgresql.org/about/news/1656/","reference_id":"","reference_type":"","scores":[],"url":"http://www.postgresql.org/about/news/1656/"},{"reference_url":"http://www.postgresql.org/docs/current/static/release-9-5-2.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.postgresql.org/docs/current/static/release-9-5-2.html"},{"reference_url":"http://www.securitytracker.com/id/1035468","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035468"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1319806","reference_id":"1319806","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1319806"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2193","reference_id":"CVE-2016-2193","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2193"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571?format=json","purl":"pkg:generic/postgresql@9.5.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.2"}],"aliases":["CVE-2016-2193"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-99q3-5g9b-xkc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3543?format=json","vulnerability_id":"VCID-9b6v-1bt1-dfgy","summary":"Certain nested CASE/WHEN expressions can crash servermore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5423.json","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5423.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5423","reference_id":"","reference_type":"","scores":[{"value":"0.034","scoring_system":"epss","scoring_elements":"0.87365","published_at":"2026-04-01T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.87508","published_at":"2026-05-12T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.875","published_at":"2026-05-09T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.87494","published_at":"2026-05-11T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.87374","published_at":"2026-04-02T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.8739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.87389","published_at":"2026-04-07T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.87408","published_at":"2026-04-08T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.87415","published_at":"2026-04-09T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.87428","published_at":"2026-04-11T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.87423","published_at":"2026-04-12T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.87419","published_at":"2026-04-13T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.87433","published_at":"2026-04-16T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.87436","published_at":"2026-04-18T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.87431","published_at":"2026-04-21T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.87447","published_at":"2026-04-24T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.87454","published_at":"2026-04-29T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.87468","published_at":"2026-05-05T12:55:00Z"},{"value":"0.034","scoring_system":"epss","scoring_elements":"0.87482","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5423"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/2016-08-11-security-update-release-1688/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/2016-08-11-security-update-release-1688/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2016-5423/","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2016-5423/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1364001","reference_id":"1364001","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1364001"},{"reference_url":"https://security.gentoo.org/glsa/201701-33","reference_id":"GLSA-201701-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1781","reference_id":"RHSA-2016:1781","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1781"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1820","reference_id":"RHSA-2016:1820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1821","reference_id":"RHSA-2016:1821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2606","reference_id":"RHSA-2016:2606","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2606"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2425","reference_id":"RHSA-2017:2425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2425"},{"reference_url":"https://usn.ubuntu.com/3066-1/","reference_id":"USN-3066-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3066-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/255?format=json","purl":"pkg:generic/postgresql@9.5.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.4"}],"aliases":["CVE-2016-5423"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9b6v-1bt1-dfgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3526?format=json","vulnerability_id":"VCID-bb5j-e9vw-mbd1","summary":"TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER executionmore details","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10208.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10208","reference_id":"","reference_type":"","scores":[{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40573","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40239","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40447","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40366","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40225","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40293","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40312","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40214","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40654","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40682","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40653","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40662","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.4068","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40643","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40625","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40671","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.4064","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40563","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40461","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10208"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10208","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/1960/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/1960/"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2019-10208/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2019-10208/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1734416","reference_id":"1734416","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1734416"},{"reference_url":"https://security.archlinux.org/ASA-201908-7","reference_id":"ASA-201908-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201908-7"},{"reference_url":"https://security.archlinux.org/ASA-201908-8","reference_id":"ASA-201908-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201908-8"},{"reference_url":"https://security.archlinux.org/AVG-1019","reference_id":"AVG-1019","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1019"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10208","reference_id":"CVE-2019-10208","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0980","reference_id":"RHSA-2020:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0980"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3669","reference_id":"RHSA-2020:3669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4295","reference_id":"RHSA-2020:4295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4295"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1512","reference_id":"RHSA-2021:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1512"},{"reference_url":"https://usn.ubuntu.com/4090-1/","reference_id":"USN-4090-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4090-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/203?format=json","purl":"pkg:generic/postgresql@9.5.19","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.19"},{"url":"http://public2.vulnerablecode.io/api/packages/202?format=json","purl":"pkg:generic/postgresql@9.6.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.15"},{"url":"http://public2.vulnerablecode.io/api/packages/201?format=json","purl":"pkg:generic/postgresql@10.10.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.10.0"},{"url":"http://public2.vulnerablecode.io/api/packages/200?format=json","purl":"pkg:generic/postgresql@11.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.5.0"}],"aliases":["CVE-2019-10208"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bb5j-e9vw-mbd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3559?format=json","vulnerability_id":"VCID-bdw5-v87c-zyfj","summary":"Multiple features escape \"security restricted operation\" sandboxmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25695","reference_id":"","reference_type":"","scores":[{"value":"0.22672","scoring_system":"epss","scoring_elements":"0.95843","published_at":"2026-04-04T12:55:00Z"},{"value":"0.22672","scoring_system":"epss","scoring_elements":"0.95826","published_at":"2026-04-01T12:55:00Z"},{"value":"0.22672","scoring_system":"epss","scoring_elements":"0.95854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.22672","scoring_system":"epss","scoring_elements":"0.95845","published_at":"2026-04-07T12:55:00Z"},{"value":"0.22672","scoring_system":"epss","scoring_elements":"0.95835","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.9605","published_at":"2026-05-12T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96037","published_at":"2026-05-07T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96042","published_at":"2026-05-09T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96045","published_at":"2026-05-11T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.95999","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96005","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96015","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.9602","published_at":"2026-04-18T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96022","published_at":"2026-04-26T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96021","published_at":"2026-04-29T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96032","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2020-25695/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2020-25695/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894425","reference_id":"1894425","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894425"},{"reference_url":"https://security.archlinux.org/ASA-202011-14","reference_id":"ASA-202011-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-14"},{"reference_url":"https://security.archlinux.org/AVG-1276","reference_id":"AVG-1276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1276"},{"reference_url":"https://security.gentoo.org/glsa/202012-07","reference_id":"GLSA-202012-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5316","reference_id":"RHSA-2020:5316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5317","reference_id":"RHSA-2020:5317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5567","reference_id":"RHSA-2020:5567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5620","reference_id":"RHSA-2020:5620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0161","reference_id":"RHSA-2021:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0163","reference_id":"RHSA-2021:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1512","reference_id":"RHSA-2021:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1512"},{"reference_url":"https://usn.ubuntu.com/4633-1/","reference_id":"USN-4633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4633-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/304?format=json","purl":"pkg:generic/postgresql@9.5.24","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.24"},{"url":"http://public2.vulnerablecode.io/api/packages/303?format=json","purl":"pkg:generic/postgresql@9.6.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.20"},{"url":"http://public2.vulnerablecode.io/api/packages/302?format=json","purl":"pkg:generic/postgresql@10.15.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.15.0"},{"url":"http://public2.vulnerablecode.io/api/packages/301?format=json","purl":"pkg:generic/postgresql@11.10.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0"},{"url":"http://public2.vulnerablecode.io/api/packages/300?format=json","purl":"pkg:generic/postgresql@12.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/299?format=json","purl":"pkg:generic/postgresql@13.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0"}],"aliases":["CVE-2020-25695"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bdw5-v87c-zyfj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3571?format=json","vulnerability_id":"VCID-bq8t-8q8q-dkb6","summary":"INSERT ... ON CONFLICT DO UPDATE fails to enforce SELECT privilegesmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15099.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15099.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15099","reference_id":"","reference_type":"","scores":[{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96376","published_at":"2026-04-12T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.9638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96387","published_at":"2026-04-16T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96391","published_at":"2026-04-18T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96393","published_at":"2026-04-21T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96394","published_at":"2026-04-24T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96405","published_at":"2026-05-05T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96396","published_at":"2026-04-29T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96422","published_at":"2026-05-12T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96417","published_at":"2026-05-11T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96415","published_at":"2026-05-09T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96395","published_at":"2026-04-26T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96409","published_at":"2026-05-07T12:55:00Z"},{"value":"0.30234","scoring_system":"epss","scoring_elements":"0.96677","published_at":"2026-04-11T12:55:00Z"},{"value":"0.30234","scoring_system":"epss","scoring_elements":"0.96647","published_at":"2026-04-01T12:55:00Z"},{"value":"0.30234","scoring_system":"epss","scoring_elements":"0.96656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.30234","scoring_system":"epss","scoring_elements":"0.96661","published_at":"2026-04-04T12:55:00Z"},{"value":"0.30234","scoring_system":"epss","scoring_elements":"0.96665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.30234","scoring_system":"epss","scoring_elements":"0.96673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.30234","scoring_system":"epss","scoring_elements":"0.96674","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.debian.org/security/2017/dsa-4028","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4028"},{"reference_url":"https://www.postgresql.org/about/news/1801/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/1801/"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/"},{"reference_url":"https://www.postgresql.org/support/security/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2017-15099/","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2017-15099/"},{"reference_url":"http://www.securityfocus.com/bid/101781","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101781"},{"reference_url":"http://www.securitytracker.com/id/1039752","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039752"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1508823","reference_id":"1508823","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1508823"},{"reference_url":"https://security.archlinux.org/ASA-201711-17","reference_id":"ASA-201711-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-17"},{"reference_url":"https://security.archlinux.org/ASA-201711-18","reference_id":"ASA-201711-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-18"},{"reference_url":"https://security.archlinux.org/AVG-485","reference_id":"AVG-485","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-485"},{"reference_url":"https://security.archlinux.org/AVG-486","reference_id":"AVG-486","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-486"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15099","reference_id":"CVE-2017-15099","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2511","reference_id":"RHSA-2018:2511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2566","reference_id":"RHSA-2018:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2566"},{"reference_url":"https://usn.ubuntu.com/3479-1/","reference_id":"USN-3479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/234?format=json","purl":"pkg:generic/postgresql@9.5.10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.10"},{"url":"http://public2.vulnerablecode.io/api/packages/233?format=json","purl":"pkg:generic/postgresql@9.6.6","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.6"},{"url":"http://public2.vulnerablecode.io/api/packages/232?format=json","purl":"pkg:generic/postgresql@10.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.1.0"}],"aliases":["CVE-2017-15099"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bq8t-8q8q-dkb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3536?format=json","vulnerability_id":"VCID-csfh-831q-rqfv","summary":"pg_user_mappings view discloses passwords to users lacking server privilegesmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7547.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7547.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7547","reference_id":"","reference_type":"","scores":[{"value":"0.00991","scoring_system":"epss","scoring_elements":"0.76965","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00991","scoring_system":"epss","scoring_elements":"0.76978","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00991","scoring_system":"epss","scoring_elements":"0.76958","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01025","scoring_system":"epss","scoring_elements":"0.77413","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01025","scoring_system":"epss","scoring_elements":"0.77364","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01025","scoring_system":"epss","scoring_elements":"0.77421","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01025","scoring_system":"epss","scoring_elements":"0.77391","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01025","scoring_system":"epss","scoring_elements":"0.77402","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.7816","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.7813","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.7807","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78079","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78108","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78091","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78117","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78148","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78126","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01444","scoring_system":"epss","scoring_elements":"0.80778","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01444","scoring_system":"epss","scoring_elements":"0.80777","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:P/A:N"},{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/2017-08-10-security-update-release-1772/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/2017-08-10-security-update-release-1772/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2017-7547/","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2017-7547/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1477185","reference_id":"1477185","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1477185"},{"reference_url":"https://security.archlinux.org/ASA-201709-2","reference_id":"ASA-201709-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201709-2"},{"reference_url":"https://security.archlinux.org/AVG-381","reference_id":"AVG-381","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-381"},{"reference_url":"https://security.gentoo.org/glsa/201710-06","reference_id":"GLSA-201710-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2677","reference_id":"RHSA-2017:2677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2678","reference_id":"RHSA-2017:2678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2728","reference_id":"RHSA-2017:2728","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2728"},{"reference_url":"https://usn.ubuntu.com/3390-1/","reference_id":"USN-3390-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3390-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/240?format=json","purl":"pkg:generic/postgresql@9.5.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.8"},{"url":"http://public2.vulnerablecode.io/api/packages/239?format=json","purl":"pkg:generic/postgresql@9.6.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.4"}],"aliases":["CVE-2017-7547"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-csfh-831q-rqfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3533?format=json","vulnerability_id":"VCID-d362-bmcf-3kdz","summary":"Memory disclosure in JSON functionsmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15098.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15098.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15098","reference_id":"","reference_type":"","scores":[{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75049","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75226","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75167","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75171","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75174","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75184","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75212","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75236","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75218","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75052","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75082","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75058","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75092","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75103","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75125","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75104","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75094","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75132","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75139","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75128","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"},{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.debian.org/security/2017/dsa-4027","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4027"},{"reference_url":"https://www.debian.org/security/2017/dsa-4028","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4028"},{"reference_url":"https://www.postgresql.org/about/news/1801/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/1801/"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/"},{"reference_url":"https://www.postgresql.org/support/security/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2017-15098/","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2017-15098/"},{"reference_url":"http://www.securityfocus.com/bid/101781","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101781"},{"reference_url":"http://www.securitytracker.com/id/1039752","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039752"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1508820","reference_id":"1508820","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1508820"},{"reference_url":"https://security.archlinux.org/ASA-201711-17","reference_id":"ASA-201711-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-17"},{"reference_url":"https://security.archlinux.org/ASA-201711-18","reference_id":"ASA-201711-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-18"},{"reference_url":"https://security.archlinux.org/AVG-485","reference_id":"AVG-485","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-485"},{"reference_url":"https://security.archlinux.org/AVG-486","reference_id":"AVG-486","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-486"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15098","reference_id":"CVE-2017-15098","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:N/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2511","reference_id":"RHSA-2018:2511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2566","reference_id":"RHSA-2018:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2566"},{"reference_url":"https://usn.ubuntu.com/3479-1/","reference_id":"USN-3479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/234?format=json","purl":"pkg:generic/postgresql@9.5.10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.10"},{"url":"http://public2.vulnerablecode.io/api/packages/233?format=json","purl":"pkg:generic/postgresql@9.6.6","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.6"},{"url":"http://public2.vulnerablecode.io/api/packages/232?format=json","purl":"pkg:generic/postgresql@10.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.1.0"}],"aliases":["CVE-2017-15098"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d362-bmcf-3kdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3568?format=json","vulnerability_id":"VCID-ne9g-k8fz-dkgb","summary":"Memory disclosure and missing authorization in INSERT ... ON CONFLICT DO UPDATE.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10925.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10925.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10925","reference_id":"","reference_type":"","scores":[{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59509","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59677","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59692","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.5965","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59582","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59606","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59576","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59627","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.5964","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.5966","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59643","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59623","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59657","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59664","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59649","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59618","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59638","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59625","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59585","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59633","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2018-10925/","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2018-10925/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612619","reference_id":"1612619","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612619"},{"reference_url":"https://security.gentoo.org/glsa/201810-08","reference_id":"GLSA-201810-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2511","reference_id":"RHSA-2018:2511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2565","reference_id":"RHSA-2018:2565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2566","reference_id":"RHSA-2018:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3816","reference_id":"RHSA-2018:3816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3816"},{"reference_url":"https://usn.ubuntu.com/3744-1/","reference_id":"USN-3744-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3744-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/219?format=json","purl":"pkg:generic/postgresql@9.5.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.14"},{"url":"http://public2.vulnerablecode.io/api/packages/218?format=json","purl":"pkg:generic/postgresql@9.6.10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.10"},{"url":"http://public2.vulnerablecode.io/api/packages/217?format=json","purl":"pkg:generic/postgresql@10.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.5.0"}],"aliases":["CVE-2018-10925"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ne9g-k8fz-dkgb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3566?format=json","vulnerability_id":"VCID-pg5v-ux6b-3qdn","summary":"Selectivity estimators bypass row security policiesmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10130.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10130.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10130","reference_id":"","reference_type":"","scores":[{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41713","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41452","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41772","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41821","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41723","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41501","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41517","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41427","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41779","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41808","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41736","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41786","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41795","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41818","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41785","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42278","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42273","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.4219","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42043","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2019-10130/","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2019-10130/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1707109","reference_id":"1707109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1707109"},{"reference_url":"https://security.gentoo.org/glsa/202003-03","reference_id":"GLSA-202003-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0980","reference_id":"RHSA-2020:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0980"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3669","reference_id":"RHSA-2020:3669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4295","reference_id":"RHSA-2020:4295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4295"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://usn.ubuntu.com/3972-1/","reference_id":"USN-3972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3972-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/325?format=json","purl":"pkg:generic/postgresql@9.5.17","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.17"},{"url":"http://public2.vulnerablecode.io/api/packages/324?format=json","purl":"pkg:generic/postgresql@9.6.13","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.13"},{"url":"http://public2.vulnerablecode.io/api/packages/323?format=json","purl":"pkg:generic/postgresql@10.8.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.8.0"},{"url":"http://public2.vulnerablecode.io/api/packages/322?format=json","purl":"pkg:generic/postgresql@11.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.3.0"}],"aliases":["CVE-2019-10130"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pg5v-ux6b-3qdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3538?format=json","vulnerability_id":"VCID-qn5k-y64c-7ffc","summary":"pg_user_mappings view discloses foreign server passwordsmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7486.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7486.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7486","reference_id":"","reference_type":"","scores":[{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.88653","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.88784","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.88765","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.88777","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.88774","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.88662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.88679","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.8868","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.88697","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.88703","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.88715","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.88709","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.88722","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.8872","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.88718","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.88733","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.88739","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.88738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04182","scoring_system":"epss","scoring_elements":"0.88749","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2017-7486/","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2017-7486/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1448089","reference_id":"1448089","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1448089"},{"reference_url":"https://security.archlinux.org/ASA-201705-23","reference_id":"ASA-201705-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201705-23"},{"reference_url":"https://security.archlinux.org/AVG-272","reference_id":"AVG-272","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-272"},{"reference_url":"https://security.gentoo.org/glsa/201710-06","reference_id":"GLSA-201710-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1677","reference_id":"RHSA-2017:1677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1678","reference_id":"RHSA-2017:1678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1678"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1838","reference_id":"RHSA-2017:1838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1983","reference_id":"RHSA-2017:1983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1983"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2425","reference_id":"RHSA-2017:2425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2425"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/245?format=json","purl":"pkg:generic/postgresql@9.5.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.7"},{"url":"http://public2.vulnerablecode.io/api/packages/244?format=json","purl":"pkg:generic/postgresql@9.6.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.3"}],"aliases":["CVE-2017-7486"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qn5k-y64c-7ffc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3534?format=json","vulnerability_id":"VCID-qnt9-qr7p-wkhy","summary":"Start scripts permit database administrator to modify root-owned filesmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12172.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12172.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12172","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16401","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16402","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1636","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16359","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16314","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1618","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16298","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16404","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16369","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16583","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16646","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16446","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16532","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16586","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16567","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16527","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16469","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1641","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1643","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16467","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12172"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:C/I:C/A:C"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/1801/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/1801/"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/"},{"reference_url":"https://www.postgresql.org/support/security/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2017-12172/","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2017-12172/"},{"reference_url":"http://www.securityfocus.com/bid/101949","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101949"},{"reference_url":"http://www.securitytracker.com/id/1039752","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039752"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1498394","reference_id":"1498394","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1498394"},{"reference_url":"https://security.archlinux.org/AVG-487","reference_id":"AVG-487","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-487"},{"reference_url":"https://security.archlinux.org/AVG-488","reference_id":"AVG-488","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-488"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12172","reference_id":"CVE-2017-12172","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3402","reference_id":"RHSA-2017:3402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3403","reference_id":"RHSA-2017:3403","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3403"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3404","reference_id":"RHSA-2017:3404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3405","reference_id":"RHSA-2017:3405","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3405"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/234?format=json","purl":"pkg:generic/postgresql@9.5.10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.10"},{"url":"http://public2.vulnerablecode.io/api/packages/233?format=json","purl":"pkg:generic/postgresql@9.6.6","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.6"},{"url":"http://public2.vulnerablecode.io/api/packages/232?format=json","purl":"pkg:generic/postgresql@10.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.1.0"}],"aliases":["CVE-2017-12172"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qnt9-qr7p-wkhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3530?format=json","vulnerability_id":"VCID-sq2s-cvrs-7uhh","summary":"Certain host connection parameters defeat client-side security defensesmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10915.json","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10915.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10915","reference_id":"","reference_type":"","scores":[{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82502","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82721","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82707","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82706","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82516","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82531","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82527","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82553","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.8256","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82579","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82572","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82566","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82603","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82629","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82639","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82645","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82665","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82686","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10915"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2018-10915/","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2018-10915/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1609891","reference_id":"1609891","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1609891"},{"reference_url":"https://security.gentoo.org/glsa/201810-08","reference_id":"GLSA-201810-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2511","reference_id":"RHSA-2018:2511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2557","reference_id":"RHSA-2018:2557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2565","reference_id":"RHSA-2018:2565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2566","reference_id":"RHSA-2018:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3816","reference_id":"RHSA-2018:3816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3816"},{"reference_url":"https://usn.ubuntu.com/3744-1/","reference_id":"USN-3744-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3744-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/219?format=json","purl":"pkg:generic/postgresql@9.5.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.14"},{"url":"http://public2.vulnerablecode.io/api/packages/218?format=json","purl":"pkg:generic/postgresql@9.6.10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.10"},{"url":"http://public2.vulnerablecode.io/api/packages/217?format=json","purl":"pkg:generic/postgresql@10.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.5.0"}],"aliases":["CVE-2018-10915"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sq2s-cvrs-7uhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3544?format=json","vulnerability_id":"VCID-t864-ytjh-nyg1","summary":"Unchecked regex can crash the servermore details","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177820.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177820.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177878.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177878.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1060.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1060.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0773.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0773.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0773","reference_id":"","reference_type":"","scores":[{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.93977","published_at":"2026-05-12T12:55:00Z"},{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.9387","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.93945","published_at":"2026-05-05T12:55:00Z"},{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.93957","published_at":"2026-05-07T12:55:00Z"},{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.93967","published_at":"2026-05-09T12:55:00Z"},{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.93972","published_at":"2026-05-11T12:55:00Z"},{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.93879","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.93888","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.93891","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.939","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.93904","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.93907","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.93908","published_at":"2026-04-12T12:55:00Z"},{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.93929","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.93934","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.93935","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.93937","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12452","scoring_system":"epss","scoring_elements":"0.93936","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10152","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10152"},{"reference_url":"https://puppet.com/security/cve/CVE-2016-0773","reference_id":"","reference_type":"","scores":[],"url":"https://puppet.com/security/cve/CVE-2016-0773"},{"reference_url":"https://www.postgresql.org/about/news/2016-02-11-security-update-release-1644/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/2016-02-11-security-update-release-1644/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2016-0773/","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2016-0773/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3475","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3475"},{"reference_url":"http://www.debian.org/security/2016/dsa-3476","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3476"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.postgresql.org/about/news/1644/","reference_id":"","reference_type":"","scores":[],"url":"http://www.postgresql.org/about/news/1644/"},{"reference_url":"http://www.postgresql.org/docs/current/static/release-9-1-20.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.postgresql.org/docs/current/static/release-9-1-20.html"},{"reference_url":"http://www.postgresql.org/docs/current/static/release-9-2-15.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.postgresql.org/docs/current/static/release-9-2-15.html"},{"reference_url":"http://www.postgresql.org/docs/current/static/release-9-3-11.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.postgresql.org/docs/current/static/release-9-3-11.html"},{"reference_url":"http://www.postgresql.org/docs/current/static/release-9-4-6.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.postgresql.org/docs/current/static/release-9-4-6.html"},{"reference_url":"http://www.postgresql.org/docs/current/static/release-9-5-1.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.postgresql.org/docs/current/static/release-9-5-1.html"},{"reference_url":"http://www.securityfocus.com/bid/83184","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83184"},{"reference_url":"http://www.securitytracker.com/id/1035005","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035005"},{"reference_url":"http://www.ubuntu.com/usn/USN-2894-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2894-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1303832","reference_id":"1303832","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1303832"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0773","reference_id":"CVE-2016-0773","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0773"},{"reference_url":"https://security.gentoo.org/glsa/201701-33","reference_id":"GLSA-201701-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0346","reference_id":"RHSA-2016:0346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0347","reference_id":"RHSA-2016:0347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0348","reference_id":"RHSA-2016:0348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0349","reference_id":"RHSA-2016:0349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1060","reference_id":"RHSA-2016:1060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1060"},{"reference_url":"https://usn.ubuntu.com/2894-1/","reference_id":"USN-2894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2894-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/260?format=json","purl":"pkg:generic/postgresql@9.5.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.1"}],"aliases":["CVE-2016-0773"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t864-ytjh-nyg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3535?format=json","vulnerability_id":"VCID-um7d-pzhb-n3c9","summary":"lo_put() function ignores ACLsmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7548.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7548.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7548","reference_id":"","reference_type":"","scores":[{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73074","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.7317","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73178","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73168","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73083","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73104","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73078","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73114","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73127","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73152","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73125","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73132","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01125","scoring_system":"epss","scoring_elements":"0.78419","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01125","scoring_system":"epss","scoring_elements":"0.78366","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01125","scoring_system":"epss","scoring_elements":"0.78391","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01125","scoring_system":"epss","scoring_elements":"0.78408","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01125","scoring_system":"epss","scoring_elements":"0.78403","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0137","scoring_system":"epss","scoring_elements":"0.80293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0137","scoring_system":"epss","scoring_elements":"0.80271","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0137","scoring_system":"epss","scoring_elements":"0.80277","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:C/I:C/A:N"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2017-7548/","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2017-7548/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1477187","reference_id":"1477187","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1477187"},{"reference_url":"https://security.archlinux.org/ASA-201709-2","reference_id":"ASA-201709-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201709-2"},{"reference_url":"https://security.archlinux.org/AVG-381","reference_id":"AVG-381","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-381"},{"reference_url":"https://security.gentoo.org/glsa/201710-06","reference_id":"GLSA-201710-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2677","reference_id":"RHSA-2017:2677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2678","reference_id":"RHSA-2017:2678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2678"},{"reference_url":"https://usn.ubuntu.com/3390-1/","reference_id":"USN-3390-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3390-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/240?format=json","purl":"pkg:generic/postgresql@9.5.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.8"},{"url":"http://public2.vulnerablecode.io/api/packages/239?format=json","purl":"pkg:generic/postgresql@9.6.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.4"}],"aliases":["CVE-2017-7548"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-um7d-pzhb-n3c9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3561?format=json","vulnerability_id":"VCID-umaz-62cm-bqfe","summary":"Uncontrolled search path element in CREATE EXTENSIONmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14350","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08621","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08838","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08847","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08812","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08648","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08697","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08695","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0872","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08682","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0857","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08558","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08726","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08617","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0876","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14350"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2020-14350/","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2020-14350/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1865746","reference_id":"1865746","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1865746"},{"reference_url":"https://security.gentoo.org/glsa/202008-13","reference_id":"GLSA-202008-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3669","reference_id":"RHSA-2020:3669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4295","reference_id":"RHSA-2020:4295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4295"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5110","reference_id":"RHSA-2020:5110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5112","reference_id":"RHSA-2020:5112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5620","reference_id":"RHSA-2020:5620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0163","reference_id":"RHSA-2021:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0988","reference_id":"RHSA-2021:0988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0988"},{"reference_url":"https://usn.ubuntu.com/4472-1/","reference_id":"USN-4472-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4472-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/309?format=json","purl":"pkg:generic/postgresql@9.5.23","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.23"},{"url":"http://public2.vulnerablecode.io/api/packages/308?format=json","purl":"pkg:generic/postgresql@9.6.19","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.19"},{"url":"http://public2.vulnerablecode.io/api/packages/307?format=json","purl":"pkg:generic/postgresql@10.14.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.14.0"},{"url":"http://public2.vulnerablecode.io/api/packages/306?format=json","purl":"pkg:generic/postgresql@11.9.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.9.0"},{"url":"http://public2.vulnerablecode.io/api/packages/305?format=json","purl":"pkg:generic/postgresql@12.4.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.4.0"}],"aliases":["CVE-2020-14350"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-umaz-62cm-bqfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3532?format=json","vulnerability_id":"VCID-wcsh-zz5q-qqbf","summary":"pg_upgrade creates file of sensitive metadata under prevailing umaskmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1053.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1053.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1053","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22014","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22172","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2222","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22003","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22139","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24121","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24155","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24101","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24419","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24377","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24321","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24338","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24327","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24301","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24176","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24163","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24008","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24089","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1053"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2018-1053/","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"['AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2018-1053/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1539619","reference_id":"1539619","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1539619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2511","reference_id":"RHSA-2018:2511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2566","reference_id":"RHSA-2018:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3816","reference_id":"RHSA-2018:3816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3816"},{"reference_url":"https://usn.ubuntu.com/3564-1/","reference_id":"USN-3564-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3564-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/229?format=json","purl":"pkg:generic/postgresql@9.5.11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.11"},{"url":"http://public2.vulnerablecode.io/api/packages/228?format=json","purl":"pkg:generic/postgresql@9.6.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.7"},{"url":"http://public2.vulnerablecode.io/api/packages/227?format=json","purl":"pkg:generic/postgresql@10.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.2.0"}],"aliases":["CVE-2018-1053"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wcsh-zz5q-qqbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3558?format=json","vulnerability_id":"VCID-xjv3-x91m-qqhn","summary":"psql's \\gset allows overwriting specially treated variablesmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25696","reference_id":"","reference_type":"","scores":[{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64626","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64831","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64795","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64839","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.6481","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64678","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64706","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64727","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64744","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64733","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64705","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64741","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64752","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64739","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64757","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.6477","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64766","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64748","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2020-25696/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2020-25696/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894430","reference_id":"1894430","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894430"},{"reference_url":"https://security.archlinux.org/ASA-202011-14","reference_id":"ASA-202011-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-14"},{"reference_url":"https://security.archlinux.org/AVG-1276","reference_id":"AVG-1276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1276"},{"reference_url":"https://security.gentoo.org/glsa/202012-07","reference_id":"GLSA-202012-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5316","reference_id":"RHSA-2020:5316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5317","reference_id":"RHSA-2020:5317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5401","reference_id":"RHSA-2020:5401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5401"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5567","reference_id":"RHSA-2020:5567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5620","reference_id":"RHSA-2020:5620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5638","reference_id":"RHSA-2020:5638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0057","reference_id":"RHSA-2021:0057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0161","reference_id":"RHSA-2021:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0163","reference_id":"RHSA-2021:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0165","reference_id":"RHSA-2021:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://usn.ubuntu.com/4633-1/","reference_id":"USN-4633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4633-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/304?format=json","purl":"pkg:generic/postgresql@9.5.24","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.24"},{"url":"http://public2.vulnerablecode.io/api/packages/303?format=json","purl":"pkg:generic/postgresql@9.6.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.20"},{"url":"http://public2.vulnerablecode.io/api/packages/302?format=json","purl":"pkg:generic/postgresql@10.15.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.15.0"},{"url":"http://public2.vulnerablecode.io/api/packages/301?format=json","purl":"pkg:generic/postgresql@11.10.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0"},{"url":"http://public2.vulnerablecode.io/api/packages/300?format=json","purl":"pkg:generic/postgresql@12.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/299?format=json","purl":"pkg:generic/postgresql@13.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0"}],"aliases":["CVE-2020-25696"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xjv3-x91m-qqhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3541?format=json","vulnerability_id":"VCID-z4t8-c8vc-ayhd","summary":"Interactive installer downloads software over plain HTTP, then executes itmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7048.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7048.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7048","reference_id":"","reference_type":"","scores":[{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.93747","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.93757","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.93767","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.9377","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.93779","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.93782","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.93786","published_at":"2026-04-11T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.93787","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.93809","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.93814","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.93816","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.9382","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.93817","published_at":"2026-04-26T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.93815","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.93825","published_at":"2026-05-05T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.93835","published_at":"2026-05-07T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.93845","published_at":"2026-05-09T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.93848","published_at":"2026-05-11T12:55:00Z"},{"value":"0.12058","scoring_system":"epss","scoring_elements":"0.93852","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7048"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-961-955-9410-9315-9219-and-9124-released-1712/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-961-955-9410-9315-9219-and-9124-released-1712/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2016-7048/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2016-7048/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1378043","reference_id":"1378043","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1378043"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/250?format=json","purl":"pkg:generic/postgresql@9.5.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.5"}],"aliases":["CVE-2016-7048"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z4t8-c8vc-ayhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3529?format=json","vulnerability_id":"VCID-zrcc-w98g-gfhk","summary":"pg_ctlcluster script in postgresql-common does not drop privileges when creating socket/statistics temporary directoriesmore details","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3466","reference_id":"","reference_type":"","scores":[{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31674","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3219","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31738","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31745","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31652","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32326","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32364","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32188","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32265","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32266","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32228","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32198","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32231","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3221","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32181","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3202","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31892","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31812","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31664","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3466"},{"reference_url":"https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/","reference_id":"","reference_type":"","scores":[],"url":"https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466"},{"reference_url":"https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2019-3466/","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2019-3466/"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3466","reference_id":"CVE-2019-3466","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3466"},{"reference_url":"https://usn.ubuntu.com/4194-1/","reference_id":"USN-4194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4194-1/"},{"reference_url":"https://usn.ubuntu.com/4194-2/","reference_id":"USN-4194-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4194-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/214?format=json","purl":"pkg:generic/postgresql@9.5.20","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.20"},{"url":"http://public2.vulnerablecode.io/api/packages/213?format=json","purl":"pkg:generic/postgresql@9.6.16","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.16"},{"url":"http://public2.vulnerablecode.io/api/packages/212?format=json","purl":"pkg:generic/postgresql@10.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.11.0"},{"url":"http://public2.vulnerablecode.io/api/packages/211?format=json","purl":"pkg:generic/postgresql@11.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/210?format=json","purl":"pkg:generic/postgresql@12.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.1.0"}],"aliases":["CVE-2019-3466"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zrcc-w98g-gfhk"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.0"}