{"url":"http://public2.vulnerablecode.io/api/packages/199?format=json","purl":"pkg:generic/postgresql@10.0.0","type":"generic","namespace":"","name":"postgresql","version":"10.0.0","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"10.1.0","latest_non_vulnerable_version":"18.2.0","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3567?format=json","vulnerability_id":"VCID-1rgq-t3wa-2fck","summary":"SQL injection in pg_upgrade and pg_dump, via CREATE TRIGGER ... REFERENCING.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16850.json","reference_id":"","reference_type":"","scores":[{"value":"8.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16850.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16850","reference_id":"","reference_type":"","scores":[{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.79805","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.79813","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.79834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.79822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.79851","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.79859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.7988","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.79863","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.79856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.79884","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.79885","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.79888","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.79916","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.79923","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.7994","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.79955","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.79977","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16850"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-111-106-9611-9515-9420-and-9325-released-1905/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-111-106-9611-9515-9420-and-9325-released-1905/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2018-16850/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2018-16850/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1645937","reference_id":"1645937","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1645937"},{"reference_url":"https://security.gentoo.org/glsa/201811-24","reference_id":"GLSA-201811-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3757","reference_id":"RHSA-2018:3757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3757"},{"reference_url":"https://usn.ubuntu.com/3818-1/","reference_id":"USN-3818-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3818-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/327?format=json","purl":"pkg:generic/postgresql@10.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/326?format=json","purl":"pkg:generic/postgresql@11.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.1.0"}],"aliases":["CVE-2018-16850"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1rgq-t3wa-2fck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3560?format=json","vulnerability_id":"VCID-36gv-m96w-47db","summary":"Reconnection can downgrade connection security settingsmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25694.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25694","reference_id":"","reference_type":"","scores":[{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58007","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58092","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58104","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.5809","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58051","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58091","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58087","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58142","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58145","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.5816","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58137","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58118","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58148","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58149","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58124","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2020-25694/","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2020-25694/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894423","reference_id":"1894423","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894423"},{"reference_url":"https://security.archlinux.org/ASA-202011-14","reference_id":"ASA-202011-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-14"},{"reference_url":"https://security.archlinux.org/AVG-1276","reference_id":"AVG-1276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1276"},{"reference_url":"https://security.gentoo.org/glsa/202012-07","reference_id":"GLSA-202012-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5316","reference_id":"RHSA-2020:5316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5317","reference_id":"RHSA-2020:5317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5401","reference_id":"RHSA-2020:5401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5401"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5567","reference_id":"RHSA-2020:5567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5620","reference_id":"RHSA-2020:5620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5638","reference_id":"RHSA-2020:5638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0057","reference_id":"RHSA-2021:0057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0161","reference_id":"RHSA-2021:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0163","reference_id":"RHSA-2021:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0165","reference_id":"RHSA-2021:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1512","reference_id":"RHSA-2021:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1512"},{"reference_url":"https://usn.ubuntu.com/4633-1/","reference_id":"USN-4633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4633-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/302?format=json","purl":"pkg:generic/postgresql@10.15.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.15.0"},{"url":"http://public2.vulnerablecode.io/api/packages/301?format=json","purl":"pkg:generic/postgresql@11.10.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0"},{"url":"http://public2.vulnerablecode.io/api/packages/300?format=json","purl":"pkg:generic/postgresql@12.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/299?format=json","purl":"pkg:generic/postgresql@13.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0"}],"aliases":["CVE-2020-25694"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-36gv-m96w-47db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3557?format=json","vulnerability_id":"VCID-4jdp-3xqp-ufap","summary":"Buffer overrun from integer overflow in array subscripting calculationsmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32027.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32027","reference_id":"","reference_type":"","scores":[{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65502","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.6567","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65645","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65644","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65621","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.6555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.6558","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65599","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65611","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.6563","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65616","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65587","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65623","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65635","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65619","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00491","scoring_system":"epss","scoring_elements":"0.65634","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32027"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2021-32027/","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2021-32027/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1956876","reference_id":"1956876","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1956876"},{"reference_url":"https://security.archlinux.org/ASA-202106-15","reference_id":"ASA-202106-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-15"},{"reference_url":"https://security.archlinux.org/AVG-1956","reference_id":"AVG-1956","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1956"},{"reference_url":"https://security.gentoo.org/glsa/202211-04","reference_id":"GLSA-202211-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2360","reference_id":"RHSA-2021:2360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2361","reference_id":"RHSA-2021:2361","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2361"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2372","reference_id":"RHSA-2021:2372","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2372"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2375","reference_id":"RHSA-2021:2375","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2389","reference_id":"RHSA-2021:2389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2390","reference_id":"RHSA-2021:2390","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2390"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2391","reference_id":"RHSA-2021:2391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2392","reference_id":"RHSA-2021:2392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2393","reference_id":"RHSA-2021:2393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2394","reference_id":"RHSA-2021:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2395","reference_id":"RHSA-2021:2395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2396","reference_id":"RHSA-2021:2396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2397","reference_id":"RHSA-2021:2397","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2397"},{"reference_url":"https://usn.ubuntu.com/4972-1/","reference_id":"USN-4972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4972-1/"},{"reference_url":"https://usn.ubuntu.com/5645-1/","reference_id":"USN-5645-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5645-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/292?format=json","purl":"pkg:generic/postgresql@10.17.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.17.0"},{"url":"http://public2.vulnerablecode.io/api/packages/291?format=json","purl":"pkg:generic/postgresql@11.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/290?format=json","purl":"pkg:generic/postgresql@12.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0"},{"url":"http://public2.vulnerablecode.io/api/packages/289?format=json","purl":"pkg:generic/postgresql@13.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0"}],"aliases":["CVE-2021-32027"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4jdp-3xqp-ufap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3570?format=json","vulnerability_id":"VCID-4jnn-un4y-qkbr","summary":"Memory disclosure in table partitioningmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1052.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1052.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1052","reference_id":"","reference_type":"","scores":[{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64587","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.6464","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64669","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64626","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64674","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.6469","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64707","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64695","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64703","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64714","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64701","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64721","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64734","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64731","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.6471","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64758","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1052"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2018-1052/","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2018-1052/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1539613","reference_id":"1539613","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1539613"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/227?format=json","purl":"pkg:generic/postgresql@10.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.2.0"}],"aliases":["CVE-2018-1052"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4jnn-un4y-qkbr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3531?format=json","vulnerability_id":"VCID-7xfn-1fv3-1bgv","summary":"Uncontrolled search path element in pg_dump and other client applicationsmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1058.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1058.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1058","reference_id":"","reference_type":"","scores":[{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99229","published_at":"2026-04-01T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.9925","published_at":"2026-05-07T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99245","published_at":"2026-04-26T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99246","published_at":"2026-04-29T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99249","published_at":"2026-05-05T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99231","published_at":"2026-04-02T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99234","published_at":"2026-04-04T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99238","published_at":"2026-04-07T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.9924","published_at":"2026-04-16T12:55:00Z"},{"value":"0.82687","scoring_system":"epss","scoring_elements":"0.99241","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1058"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-103-968-9512-9417-and-9322-released-1834/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-103-968-9512-9417-and-9322-released-1834/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2018-1058/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2018-1058/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547044","reference_id":"1547044","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547044"},{"reference_url":"https://security.archlinux.org/ASA-201803-9","reference_id":"ASA-201803-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-9"},{"reference_url":"https://security.archlinux.org/AVG-643","reference_id":"AVG-643","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2511","reference_id":"RHSA-2018:2511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2566","reference_id":"RHSA-2018:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3816","reference_id":"RHSA-2018:3816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3816"},{"reference_url":"https://usn.ubuntu.com/3589-1/","reference_id":"USN-3589-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3589-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/222?format=json","purl":"pkg:generic/postgresql@10.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.3.0"}],"aliases":["CVE-2018-1058"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7xfn-1fv3-1bgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3556?format=json","vulnerability_id":"VCID-8p8h-jdyq-vfek","summary":"Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATEmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32028.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32028","reference_id":"","reference_type":"","scores":[{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64362","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64534","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.645","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64512","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64445","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64405","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64453","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64481","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64441","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64475","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64487","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64479","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32029"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-133-127-1112-1017-and-9622-released-2210/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2021-32028/","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2021-32028/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1956877","reference_id":"1956877","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1956877"},{"reference_url":"https://security.archlinux.org/ASA-202106-15","reference_id":"ASA-202106-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-15"},{"reference_url":"https://security.archlinux.org/AVG-1956","reference_id":"AVG-1956","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1956"},{"reference_url":"https://security.gentoo.org/glsa/202211-04","reference_id":"GLSA-202211-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2360","reference_id":"RHSA-2021:2360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2361","reference_id":"RHSA-2021:2361","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2361"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2372","reference_id":"RHSA-2021:2372","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2372"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2375","reference_id":"RHSA-2021:2375","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2375"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2389","reference_id":"RHSA-2021:2389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2390","reference_id":"RHSA-2021:2390","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2390"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2391","reference_id":"RHSA-2021:2391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2392","reference_id":"RHSA-2021:2392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2393","reference_id":"RHSA-2021:2393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2394","reference_id":"RHSA-2021:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2395","reference_id":"RHSA-2021:2395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2396","reference_id":"RHSA-2021:2396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2396"},{"reference_url":"https://usn.ubuntu.com/4972-1/","reference_id":"USN-4972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4972-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/292?format=json","purl":"pkg:generic/postgresql@10.17.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.17.0"},{"url":"http://public2.vulnerablecode.io/api/packages/291?format=json","purl":"pkg:generic/postgresql@11.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/290?format=json","purl":"pkg:generic/postgresql@12.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.7.0"},{"url":"http://public2.vulnerablecode.io/api/packages/289?format=json","purl":"pkg:generic/postgresql@13.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.3.0"}],"aliases":["CVE-2021-32028"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8p8h-jdyq-vfek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3569?format=json","vulnerability_id":"VCID-a28t-r5gf-bkhx","summary":"Too-permissive access control list on function pg_logfile_rotate()more details","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1115.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1115.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1115","reference_id":"","reference_type":"","scores":[{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71823","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71969","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.7194","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71945","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71942","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71933","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71832","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71851","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71863","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71874","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71881","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71906","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71911","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00694","scoring_system":"epss","scoring_elements":"0.71894","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1115"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115"},{"reference_url":"https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740","reference_id":"","reference_type":"","scores":[],"url":"https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-104-969-9513-9418-and-9323-released-1851/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-104-969-9513-9418-and-9323-released-1851/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2018-1115/","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2018-1115/"},{"reference_url":"http://www.securityfocus.com/bid/104285","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104285"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1573276","reference_id":"1573276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1573276"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1115","reference_id":"CVE-2018-1115","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:P"},{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"},{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1115"},{"reference_url":"https://security.gentoo.org/glsa/201810-08","reference_id":"GLSA-201810-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2565","reference_id":"RHSA-2018:2565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2566","reference_id":"RHSA-2018:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2566"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/328?format=json","purl":"pkg:generic/postgresql@10.4.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.4.0"}],"aliases":["CVE-2018-1115"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a28t-r5gf-bkhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3526?format=json","vulnerability_id":"VCID-bb5j-e9vw-mbd1","summary":"TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER executionmore details","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10208.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10208","reference_id":"","reference_type":"","scores":[{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40573","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40293","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.4064","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40563","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40461","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40447","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40366","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40225","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40654","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40682","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40653","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40662","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.4068","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40643","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40625","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40671","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10208"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10208","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/1960/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/1960/"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2019-10208/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2019-10208/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1734416","reference_id":"1734416","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1734416"},{"reference_url":"https://security.archlinux.org/ASA-201908-7","reference_id":"ASA-201908-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201908-7"},{"reference_url":"https://security.archlinux.org/ASA-201908-8","reference_id":"ASA-201908-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201908-8"},{"reference_url":"https://security.archlinux.org/AVG-1019","reference_id":"AVG-1019","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1019"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10208","reference_id":"CVE-2019-10208","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0980","reference_id":"RHSA-2020:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0980"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3669","reference_id":"RHSA-2020:3669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4295","reference_id":"RHSA-2020:4295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4295"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1512","reference_id":"RHSA-2021:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1512"},{"reference_url":"https://usn.ubuntu.com/4090-1/","reference_id":"USN-4090-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4090-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/201?format=json","purl":"pkg:generic/postgresql@10.10.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.10.0"},{"url":"http://public2.vulnerablecode.io/api/packages/200?format=json","purl":"pkg:generic/postgresql@11.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.5.0"}],"aliases":["CVE-2019-10208"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bb5j-e9vw-mbd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3559?format=json","vulnerability_id":"VCID-bdw5-v87c-zyfj","summary":"Multiple features escape \"security restricted operation\" sandboxmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25695.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25695","reference_id":"","reference_type":"","scores":[{"value":"0.22672","scoring_system":"epss","scoring_elements":"0.95843","published_at":"2026-04-04T12:55:00Z"},{"value":"0.22672","scoring_system":"epss","scoring_elements":"0.95826","published_at":"2026-04-01T12:55:00Z"},{"value":"0.22672","scoring_system":"epss","scoring_elements":"0.95854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.22672","scoring_system":"epss","scoring_elements":"0.95845","published_at":"2026-04-07T12:55:00Z"},{"value":"0.22672","scoring_system":"epss","scoring_elements":"0.95835","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96037","published_at":"2026-05-07T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96022","published_at":"2026-04-26T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96021","published_at":"2026-04-29T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96032","published_at":"2026-05-05T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.95999","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96005","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.96015","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23757","scoring_system":"epss","scoring_elements":"0.9602","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2020-25695/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2020-25695/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894425","reference_id":"1894425","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894425"},{"reference_url":"https://security.archlinux.org/ASA-202011-14","reference_id":"ASA-202011-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-14"},{"reference_url":"https://security.archlinux.org/AVG-1276","reference_id":"AVG-1276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1276"},{"reference_url":"https://security.gentoo.org/glsa/202012-07","reference_id":"GLSA-202012-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5316","reference_id":"RHSA-2020:5316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5317","reference_id":"RHSA-2020:5317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5567","reference_id":"RHSA-2020:5567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5620","reference_id":"RHSA-2020:5620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0161","reference_id":"RHSA-2021:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0163","reference_id":"RHSA-2021:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1512","reference_id":"RHSA-2021:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1512"},{"reference_url":"https://usn.ubuntu.com/4633-1/","reference_id":"USN-4633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4633-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/302?format=json","purl":"pkg:generic/postgresql@10.15.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.15.0"},{"url":"http://public2.vulnerablecode.io/api/packages/301?format=json","purl":"pkg:generic/postgresql@11.10.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0"},{"url":"http://public2.vulnerablecode.io/api/packages/300?format=json","purl":"pkg:generic/postgresql@12.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/299?format=json","purl":"pkg:generic/postgresql@13.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0"}],"aliases":["CVE-2020-25695"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bdw5-v87c-zyfj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3571?format=json","vulnerability_id":"VCID-bq8t-8q8q-dkb6","summary":"INSERT ... ON CONFLICT DO UPDATE fails to enforce SELECT privilegesmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15099.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15099.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15099","reference_id":"","reference_type":"","scores":[{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96391","published_at":"2026-04-18T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96396","published_at":"2026-04-29T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96395","published_at":"2026-04-26T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96376","published_at":"2026-04-12T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.9638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96387","published_at":"2026-04-16T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96394","published_at":"2026-04-24T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96393","published_at":"2026-04-21T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96405","published_at":"2026-05-05T12:55:00Z"},{"value":"0.27111","scoring_system":"epss","scoring_elements":"0.96409","published_at":"2026-05-07T12:55:00Z"},{"value":"0.30234","scoring_system":"epss","scoring_elements":"0.96673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.30234","scoring_system":"epss","scoring_elements":"0.96647","published_at":"2026-04-01T12:55:00Z"},{"value":"0.30234","scoring_system":"epss","scoring_elements":"0.96656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.30234","scoring_system":"epss","scoring_elements":"0.96661","published_at":"2026-04-04T12:55:00Z"},{"value":"0.30234","scoring_system":"epss","scoring_elements":"0.96665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.30234","scoring_system":"epss","scoring_elements":"0.96674","published_at":"2026-04-09T12:55:00Z"},{"value":"0.30234","scoring_system":"epss","scoring_elements":"0.96677","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.debian.org/security/2017/dsa-4028","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4028"},{"reference_url":"https://www.postgresql.org/about/news/1801/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/1801/"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/"},{"reference_url":"https://www.postgresql.org/support/security/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2017-15099/","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2017-15099/"},{"reference_url":"http://www.securityfocus.com/bid/101781","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101781"},{"reference_url":"http://www.securitytracker.com/id/1039752","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039752"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1508823","reference_id":"1508823","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1508823"},{"reference_url":"https://security.archlinux.org/ASA-201711-17","reference_id":"ASA-201711-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-17"},{"reference_url":"https://security.archlinux.org/ASA-201711-18","reference_id":"ASA-201711-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-18"},{"reference_url":"https://security.archlinux.org/AVG-485","reference_id":"AVG-485","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-485"},{"reference_url":"https://security.archlinux.org/AVG-486","reference_id":"AVG-486","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-486"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15099","reference_id":"CVE-2017-15099","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2511","reference_id":"RHSA-2018:2511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2566","reference_id":"RHSA-2018:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2566"},{"reference_url":"https://usn.ubuntu.com/3479-1/","reference_id":"USN-3479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/232?format=json","purl":"pkg:generic/postgresql@10.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.1.0"}],"aliases":["CVE-2017-15099"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bq8t-8q8q-dkb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3562?format=json","vulnerability_id":"VCID-cegf-gbkv-aqab","summary":"Uncontrolled search path element in logical replicationmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14349.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14349.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14349","reference_id":"","reference_type":"","scores":[{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81342","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81515","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81478","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81496","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81373","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81371","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81399","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81404","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81425","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81413","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81442","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81443","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81445","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81466","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81474","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14349"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2020-14349/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2020-14349/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1865744","reference_id":"1865744","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1865744"},{"reference_url":"https://security.gentoo.org/glsa/202008-13","reference_id":"GLSA-202008-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3669","reference_id":"RHSA-2020:3669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5110","reference_id":"RHSA-2020:5110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5112","reference_id":"RHSA-2020:5112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5620","reference_id":"RHSA-2020:5620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0163","reference_id":"RHSA-2021:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0988","reference_id":"RHSA-2021:0988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0988"},{"reference_url":"https://usn.ubuntu.com/4472-1/","reference_id":"USN-4472-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4472-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/307?format=json","purl":"pkg:generic/postgresql@10.14.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.14.0"},{"url":"http://public2.vulnerablecode.io/api/packages/306?format=json","purl":"pkg:generic/postgresql@11.9.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.9.0"},{"url":"http://public2.vulnerablecode.io/api/packages/305?format=json","purl":"pkg:generic/postgresql@12.4.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.4.0"}],"aliases":["CVE-2020-14349"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cegf-gbkv-aqab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3533?format=json","vulnerability_id":"VCID-d362-bmcf-3kdz","summary":"Memory disclosure in JSON functionsmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15098.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15098.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15098","reference_id":"","reference_type":"","scores":[{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75049","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75212","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75132","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75139","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75128","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75167","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75171","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75174","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75184","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75052","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75082","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75058","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75092","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75103","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75125","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75104","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75094","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"},{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.debian.org/security/2017/dsa-4027","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4027"},{"reference_url":"https://www.debian.org/security/2017/dsa-4028","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4028"},{"reference_url":"https://www.postgresql.org/about/news/1801/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/1801/"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/"},{"reference_url":"https://www.postgresql.org/support/security/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2017-15098/","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2017-15098/"},{"reference_url":"http://www.securityfocus.com/bid/101781","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101781"},{"reference_url":"http://www.securitytracker.com/id/1039752","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039752"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1508820","reference_id":"1508820","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1508820"},{"reference_url":"https://security.archlinux.org/ASA-201711-17","reference_id":"ASA-201711-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-17"},{"reference_url":"https://security.archlinux.org/ASA-201711-18","reference_id":"ASA-201711-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-18"},{"reference_url":"https://security.archlinux.org/AVG-485","reference_id":"AVG-485","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-485"},{"reference_url":"https://security.archlinux.org/AVG-486","reference_id":"AVG-486","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-486"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15098","reference_id":"CVE-2017-15098","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:N/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2511","reference_id":"RHSA-2018:2511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2566","reference_id":"RHSA-2018:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2566"},{"reference_url":"https://usn.ubuntu.com/3479-1/","reference_id":"USN-3479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/232?format=json","purl":"pkg:generic/postgresql@10.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.1.0"}],"aliases":["CVE-2017-15098"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d362-bmcf-3kdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3568?format=json","vulnerability_id":"VCID-ne9g-k8fz-dkgb","summary":"Memory disclosure and missing authorization in INSERT ... ON CONFLICT DO UPDATE.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10925.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10925.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10925","reference_id":"","reference_type":"","scores":[{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59509","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59633","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59625","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59585","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59582","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59606","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59576","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59627","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.5964","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.5966","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59643","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59623","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59657","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59664","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59649","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59618","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59638","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2018-10925/","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2018-10925/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612619","reference_id":"1612619","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612619"},{"reference_url":"https://security.gentoo.org/glsa/201810-08","reference_id":"GLSA-201810-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2511","reference_id":"RHSA-2018:2511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2565","reference_id":"RHSA-2018:2565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2566","reference_id":"RHSA-2018:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3816","reference_id":"RHSA-2018:3816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3816"},{"reference_url":"https://usn.ubuntu.com/3744-1/","reference_id":"USN-3744-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3744-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/217?format=json","purl":"pkg:generic/postgresql@10.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.5.0"}],"aliases":["CVE-2018-10925"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ne9g-k8fz-dkgb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3520?format=json","vulnerability_id":"VCID-nuek-ypyh-b3dm","summary":"Extension scripts replace objects not belonging to the extensionmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2625","reference_id":"","reference_type":"","scores":[{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76773","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76755","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76742","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76616","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76645","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.7666","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76671","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76698","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76678","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.7667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76712","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76717","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76706","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76737","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00973","scoring_system":"epss","scoring_elements":"0.76743","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2022-2625/","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2022-2625/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2113825","reference_id":"2113825","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2113825"},{"reference_url":"https://security.gentoo.org/glsa/202211-04","reference_id":"GLSA-202211-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7128","reference_id":"RHSA-2022:7128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0113","reference_id":"RHSA-2023:0113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0160","reference_id":"RHSA-2023:0160","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0160"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1576","reference_id":"RHSA-2023:1576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1693","reference_id":"RHSA-2023:1693","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1693"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7545","reference_id":"RHSA-2023:7545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7580","reference_id":"RHSA-2023:7580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7667","reference_id":"RHSA-2023:7667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7694","reference_id":"RHSA-2023:7694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7694"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7695","reference_id":"RHSA-2023:7695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7695"},{"reference_url":"https://usn.ubuntu.com/5571-1/","reference_id":"USN-5571-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5571-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/284?format=json","purl":"pkg:generic/postgresql@10.22.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.22.0"},{"url":"http://public2.vulnerablecode.io/api/packages/283?format=json","purl":"pkg:generic/postgresql@11.17.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.17.0"},{"url":"http://public2.vulnerablecode.io/api/packages/282?format=json","purl":"pkg:generic/postgresql@12.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/281?format=json","purl":"pkg:generic/postgresql@13.8.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.8.0"},{"url":"http://public2.vulnerablecode.io/api/packages/159?format=json","purl":"pkg:generic/postgresql@14.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.5.0"}],"aliases":["CVE-2022-2625"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nuek-ypyh-b3dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3566?format=json","vulnerability_id":"VCID-pg5v-ux6b-3qdn","summary":"Selectivity estimators bypass row security policiesmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10130.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10130.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10130","reference_id":"","reference_type":"","scores":[{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41713","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41501","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41795","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41818","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41785","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41772","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41821","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41723","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41779","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41808","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41736","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41786","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42278","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42273","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.4219","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42043","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-113-108-9613-9517-and-9422-released-1939/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2019-10130/","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2019-10130/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1707109","reference_id":"1707109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1707109"},{"reference_url":"https://security.gentoo.org/glsa/202003-03","reference_id":"GLSA-202003-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0980","reference_id":"RHSA-2020:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0980"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3669","reference_id":"RHSA-2020:3669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4295","reference_id":"RHSA-2020:4295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4295"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://usn.ubuntu.com/3972-1/","reference_id":"USN-3972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3972-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/323?format=json","purl":"pkg:generic/postgresql@10.8.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.8.0"},{"url":"http://public2.vulnerablecode.io/api/packages/322?format=json","purl":"pkg:generic/postgresql@11.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.3.0"}],"aliases":["CVE-2019-10130"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pg5v-ux6b-3qdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3521?format=json","vulnerability_id":"VCID-q8ka-5dxw-w7fs","summary":"Autovacuum, REINDEX, and others omit \"security restricted operation\" sandboxmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1552.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1552.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1552","reference_id":"","reference_type":"","scores":[{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84548","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84726","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84685","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84686","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.847","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84563","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84585","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84588","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84609","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84616","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84635","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.8463","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84625","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84646","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84647","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84648","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02263","scoring_system":"epss","scoring_elements":"0.84675","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2022-1552/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2022-1552/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2081126","reference_id":"2081126","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2081126"},{"reference_url":"https://security.archlinux.org/AVG-2719","reference_id":"AVG-2719","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2719"},{"reference_url":"https://security.gentoo.org/glsa/202211-04","reference_id":"GLSA-202211-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4771","reference_id":"RHSA-2022:4771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4805","reference_id":"RHSA-2022:4805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4807","reference_id":"RHSA-2022:4807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4854","reference_id":"RHSA-2022:4854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4855","reference_id":"RHSA-2022:4855","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4855"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4856","reference_id":"RHSA-2022:4856","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4856"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4857","reference_id":"RHSA-2022:4857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4893","reference_id":"RHSA-2022:4893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4894","reference_id":"RHSA-2022:4894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4895","reference_id":"RHSA-2022:4895","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4895"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4913","reference_id":"RHSA-2022:4913","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4913"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4915","reference_id":"RHSA-2022:4915","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4915"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4929","reference_id":"RHSA-2022:4929","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4929"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5162","reference_id":"RHSA-2022:5162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5162"},{"reference_url":"https://usn.ubuntu.com/5440-1/","reference_id":"USN-5440-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5440-1/"},{"reference_url":"https://usn.ubuntu.com/5676-1/","reference_id":"USN-5676-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5676-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/288?format=json","purl":"pkg:generic/postgresql@10.21.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.21.0"},{"url":"http://public2.vulnerablecode.io/api/packages/287?format=json","purl":"pkg:generic/postgresql@11.16.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.16.0"},{"url":"http://public2.vulnerablecode.io/api/packages/286?format=json","purl":"pkg:generic/postgresql@12.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.11.0"},{"url":"http://public2.vulnerablecode.io/api/packages/285?format=json","purl":"pkg:generic/postgresql@13.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.7.0"},{"url":"http://public2.vulnerablecode.io/api/packages/160?format=json","purl":"pkg:generic/postgresql@14.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.3.0"}],"aliases":["CVE-2022-1552"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q8ka-5dxw-w7fs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3522?format=json","vulnerability_id":"VCID-qbd9-mpc6-5bap","summary":"libpq processes unencrypted bytes from man-in-the-middlemore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23222.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23222.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23222","reference_id":"","reference_type":"","scores":[{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51419","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51469","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51576","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51555","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51508","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51475","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51515","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51586","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51628","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51624","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51484","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51535","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51562","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51577","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51574","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51602","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2021-23222/","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2021-23222/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2022675","reference_id":"2022675","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2022675"},{"reference_url":"https://security.archlinux.org/AVG-2547","reference_id":"AVG-2547","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2547"},{"reference_url":"https://security.gentoo.org/glsa/202211-04","reference_id":"GLSA-202211-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5179","reference_id":"RHSA-2021:5179","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5197","reference_id":"RHSA-2021:5197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1891","reference_id":"RHSA-2022:1891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1891"},{"reference_url":"https://usn.ubuntu.com/5145-1/","reference_id":"USN-5145-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5145-1/"},{"reference_url":"https://usn.ubuntu.com/5765-1/","reference_id":"USN-5765-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5765-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/297?format=json","purl":"pkg:generic/postgresql@10.19.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.19.0"},{"url":"http://public2.vulnerablecode.io/api/packages/296?format=json","purl":"pkg:generic/postgresql@11.14.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.14.0"},{"url":"http://public2.vulnerablecode.io/api/packages/295?format=json","purl":"pkg:generic/postgresql@12.9.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.9.0"},{"url":"http://public2.vulnerablecode.io/api/packages/294?format=json","purl":"pkg:generic/postgresql@13.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/161?format=json","purl":"pkg:generic/postgresql@14.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.1.0"}],"aliases":["CVE-2021-23222"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qbd9-mpc6-5bap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3534?format=json","vulnerability_id":"VCID-qnt9-qr7p-wkhy","summary":"Start scripts permit database administrator to modify root-owned filesmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12172.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12172.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12172","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16401","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16298","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1641","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1643","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16467","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1636","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16359","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16314","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1618","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16583","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16646","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16446","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16532","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16586","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16567","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16527","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16469","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12172"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:C/I:C/A:C"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/1801/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/1801/"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/"},{"reference_url":"https://www.postgresql.org/support/security/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2017-12172/","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2017-12172/"},{"reference_url":"http://www.securityfocus.com/bid/101949","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101949"},{"reference_url":"http://www.securitytracker.com/id/1039752","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039752"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1498394","reference_id":"1498394","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1498394"},{"reference_url":"https://security.archlinux.org/AVG-487","reference_id":"AVG-487","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-487"},{"reference_url":"https://security.archlinux.org/AVG-488","reference_id":"AVG-488","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-488"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12172","reference_id":"CVE-2017-12172","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3402","reference_id":"RHSA-2017:3402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3403","reference_id":"RHSA-2017:3403","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3403"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3404","reference_id":"RHSA-2017:3404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3405","reference_id":"RHSA-2017:3405","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3405"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/232?format=json","purl":"pkg:generic/postgresql@10.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.1.0"}],"aliases":["CVE-2017-12172"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qnt9-qr7p-wkhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3530?format=json","vulnerability_id":"VCID-sq2s-cvrs-7uhh","summary":"Certain host connection parameters defeat client-side security defensesmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10915.json","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10915.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10915","reference_id":"","reference_type":"","scores":[{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82502","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82686","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82645","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82665","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82516","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82531","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82527","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82553","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.8256","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82579","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82572","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82566","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82603","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82629","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01753","scoring_system":"epss","scoring_elements":"0.82639","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10915"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2018-10915/","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2018-10915/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1609891","reference_id":"1609891","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1609891"},{"reference_url":"https://security.gentoo.org/glsa/201810-08","reference_id":"GLSA-201810-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2511","reference_id":"RHSA-2018:2511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2557","reference_id":"RHSA-2018:2557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2565","reference_id":"RHSA-2018:2565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2566","reference_id":"RHSA-2018:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3816","reference_id":"RHSA-2018:3816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3816"},{"reference_url":"https://usn.ubuntu.com/3744-1/","reference_id":"USN-3744-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3744-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/217?format=json","purl":"pkg:generic/postgresql@10.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.5.0"}],"aliases":["CVE-2018-10915"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sq2s-cvrs-7uhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3523?format=json","vulnerability_id":"VCID-srbh-8fdq-bkc2","summary":"Server processes unencrypted bytes from man-in-the-middlemore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23214.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23214.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23214","reference_id":"","reference_type":"","scores":[{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.40956","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.40891","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.40816","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41043","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41037","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.4157","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45245","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45197","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4519","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45213","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45155","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45209","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4523","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.452","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45251","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2021-23214/","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2021-23214/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2022666","reference_id":"2022666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2022666"},{"reference_url":"https://security.archlinux.org/ASA-202204-1","reference_id":"ASA-202204-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202204-1"},{"reference_url":"https://security.archlinux.org/AVG-2546","reference_id":"AVG-2546","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2546"},{"reference_url":"https://security.gentoo.org/glsa/202211-04","reference_id":"GLSA-202211-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5179","reference_id":"RHSA-2021:5179","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5197","reference_id":"RHSA-2021:5197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5235","reference_id":"RHSA-2021:5235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:5236","reference_id":"RHSA-2021:5236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:5236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1830","reference_id":"RHSA-2022:1830","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1830"},{"reference_url":"https://usn.ubuntu.com/5145-1/","reference_id":"USN-5145-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5145-1/"},{"reference_url":"https://usn.ubuntu.com/5645-1/","reference_id":"USN-5645-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5645-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/297?format=json","purl":"pkg:generic/postgresql@10.19.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.19.0"},{"url":"http://public2.vulnerablecode.io/api/packages/296?format=json","purl":"pkg:generic/postgresql@11.14.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.14.0"},{"url":"http://public2.vulnerablecode.io/api/packages/295?format=json","purl":"pkg:generic/postgresql@12.9.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.9.0"},{"url":"http://public2.vulnerablecode.io/api/packages/294?format=json","purl":"pkg:generic/postgresql@13.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/161?format=json","purl":"pkg:generic/postgresql@14.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@14.1.0"}],"aliases":["CVE-2021-23214"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-srbh-8fdq-bkc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3561?format=json","vulnerability_id":"VCID-umaz-62cm-bqfe","summary":"Uncontrolled search path element in CREATE EXTENSIONmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14350.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14350","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08621","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0876","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08617","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08648","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08697","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08695","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0872","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08682","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0857","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08558","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08726","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0868","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14350"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-124-119-1014-9619-9523-and-13-beta-3-released-2060/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2020-14350/","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2020-14350/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1865746","reference_id":"1865746","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1865746"},{"reference_url":"https://security.gentoo.org/glsa/202008-13","reference_id":"GLSA-202008-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3669","reference_id":"RHSA-2020:3669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4295","reference_id":"RHSA-2020:4295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4295"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5110","reference_id":"RHSA-2020:5110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5112","reference_id":"RHSA-2020:5112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5620","reference_id":"RHSA-2020:5620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0163","reference_id":"RHSA-2021:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0988","reference_id":"RHSA-2021:0988","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0988"},{"reference_url":"https://usn.ubuntu.com/4472-1/","reference_id":"USN-4472-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4472-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/307?format=json","purl":"pkg:generic/postgresql@10.14.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.14.0"},{"url":"http://public2.vulnerablecode.io/api/packages/306?format=json","purl":"pkg:generic/postgresql@11.9.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.9.0"},{"url":"http://public2.vulnerablecode.io/api/packages/305?format=json","purl":"pkg:generic/postgresql@12.4.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.4.0"}],"aliases":["CVE-2020-14350"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-umaz-62cm-bqfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3564?format=json","vulnerability_id":"VCID-wamn-1as1-qbfa","summary":"ALTER ... DEPENDS ON EXTENSION is missing authorization checks.more details","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1720.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1720","reference_id":"","reference_type":"","scores":[{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57428","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57497","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57543","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57502","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57522","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57501","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57452","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57512","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57509","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57562","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57566","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57581","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57561","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57539","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57567","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57563","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1720"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/2011/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/2011/"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-122-117-1012-9617-9521-and-9426-released-2011/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2020-1720/","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N']"}],"url":"https://www.postgresql.org/support/security/CVE-2020-1720/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1798852","reference_id":"1798852","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1798852"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1720","reference_id":"CVE-2020-1720","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:P/A:N"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1720"},{"reference_url":"https://security.gentoo.org/glsa/202003-03","reference_id":"GLSA-202003-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0980","reference_id":"RHSA-2020:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0980"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3669","reference_id":"RHSA-2020:3669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4295","reference_id":"RHSA-2020:4295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4295"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5112","reference_id":"RHSA-2020:5112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5620","reference_id":"RHSA-2020:5620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0163","reference_id":"RHSA-2021:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://usn.ubuntu.com/4282-1/","reference_id":"USN-4282-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4282-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/318?format=json","purl":"pkg:generic/postgresql@10.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/317?format=json","purl":"pkg:generic/postgresql@11.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.7.0"},{"url":"http://public2.vulnerablecode.io/api/packages/316?format=json","purl":"pkg:generic/postgresql@12.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.2.0"}],"aliases":["CVE-2020-1720"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wamn-1as1-qbfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3532?format=json","vulnerability_id":"VCID-wcsh-zz5q-qqbf","summary":"pg_upgrade creates file of sensitive metadata under prevailing umaskmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1053.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1053.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1053","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22014","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22172","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2222","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22003","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22139","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24089","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24008","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24419","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24377","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24321","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24338","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24327","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24301","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24176","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24163","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1053"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2018-1053/","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"['AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2018-1053/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1539619","reference_id":"1539619","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1539619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2511","reference_id":"RHSA-2018:2511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2566","reference_id":"RHSA-2018:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3816","reference_id":"RHSA-2018:3816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3816"},{"reference_url":"https://usn.ubuntu.com/3564-1/","reference_id":"USN-3564-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3564-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/227?format=json","purl":"pkg:generic/postgresql@10.2.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.2.0"}],"aliases":["CVE-2018-1053"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wcsh-zz5q-qqbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3558?format=json","vulnerability_id":"VCID-xjv3-x91m-qqhn","summary":"psql's \\gset allows overwriting specially treated variablesmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25696.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25696","reference_id":"","reference_type":"","scores":[{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64626","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64795","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.6477","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64766","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64748","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64678","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64706","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64727","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64744","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64733","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64705","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64741","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64752","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64739","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00473","scoring_system":"epss","scoring_elements":"0.64757","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2020-25696/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2020-25696/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894430","reference_id":"1894430","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894430"},{"reference_url":"https://security.archlinux.org/ASA-202011-14","reference_id":"ASA-202011-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-14"},{"reference_url":"https://security.archlinux.org/AVG-1276","reference_id":"AVG-1276","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1276"},{"reference_url":"https://security.gentoo.org/glsa/202012-07","reference_id":"GLSA-202012-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5316","reference_id":"RHSA-2020:5316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5317","reference_id":"RHSA-2020:5317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5401","reference_id":"RHSA-2020:5401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5401"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5567","reference_id":"RHSA-2020:5567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5567"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5619","reference_id":"RHSA-2020:5619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5620","reference_id":"RHSA-2020:5620","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5620"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5638","reference_id":"RHSA-2020:5638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5661","reference_id":"RHSA-2020:5661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0057","reference_id":"RHSA-2021:0057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0161","reference_id":"RHSA-2021:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0163","reference_id":"RHSA-2021:0163","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0164","reference_id":"RHSA-2021:0164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0165","reference_id":"RHSA-2021:0165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0167","reference_id":"RHSA-2021:0167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0167"},{"reference_url":"https://usn.ubuntu.com/4633-1/","reference_id":"USN-4633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4633-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/302?format=json","purl":"pkg:generic/postgresql@10.15.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.15.0"},{"url":"http://public2.vulnerablecode.io/api/packages/301?format=json","purl":"pkg:generic/postgresql@11.10.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.10.0"},{"url":"http://public2.vulnerablecode.io/api/packages/300?format=json","purl":"pkg:generic/postgresql@12.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/299?format=json","purl":"pkg:generic/postgresql@13.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@13.1.0"}],"aliases":["CVE-2020-25696"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xjv3-x91m-qqhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3565?format=json","vulnerability_id":"VCID-ybb6-2xrm-7fbk","summary":"Stack-based buffer overflow via setting a passwordmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10164.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10164.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10164","reference_id":"","reference_type":"","scores":[{"value":"0.05798","scoring_system":"epss","scoring_elements":"0.90528","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05798","scoring_system":"epss","scoring_elements":"0.90516","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05798","scoring_system":"epss","scoring_elements":"0.9051","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05903","scoring_system":"epss","scoring_elements":"0.90571","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05903","scoring_system":"epss","scoring_elements":"0.90579","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05903","scoring_system":"epss","scoring_elements":"0.90591","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05903","scoring_system":"epss","scoring_elements":"0.90597","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05903","scoring_system":"epss","scoring_elements":"0.90556","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05903","scoring_system":"epss","scoring_elements":"0.9056","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13393","scoring_system":"epss","scoring_elements":"0.94229","published_at":"2026-05-07T12:55:00Z"},{"value":"0.13393","scoring_system":"epss","scoring_elements":"0.94211","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13393","scoring_system":"epss","scoring_elements":"0.94214","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13393","scoring_system":"epss","scoring_elements":"0.94218","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10164"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-114-109-9614-9518-9423-and-12-beta-2-released-1949/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-114-109-9614-9518-9423-and-12-beta-2-released-1949/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2019-10164/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2019-10164/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1719698","reference_id":"1719698","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1719698"},{"reference_url":"https://security.gentoo.org/glsa/202003-03","reference_id":"GLSA-202003-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0980","reference_id":"RHSA-2020:0980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0980"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3669","reference_id":"RHSA-2020:3669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5664","reference_id":"RHSA-2020:5664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0166","reference_id":"RHSA-2021:0166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0166"},{"reference_url":"https://usn.ubuntu.com/4027-1/","reference_id":"USN-4027-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4027-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/321?format=json","purl":"pkg:generic/postgresql@10.9.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.9.0"},{"url":"http://public2.vulnerablecode.io/api/packages/320?format=json","purl":"pkg:generic/postgresql@11.4.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.4.0"}],"aliases":["CVE-2019-10164"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ybb6-2xrm-7fbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3529?format=json","vulnerability_id":"VCID-zrcc-w98g-gfhk","summary":"pg_ctlcluster script in postgresql-common does not drop privileges when creating socket/statistics temporary directoriesmore details","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3466","reference_id":"","reference_type":"","scores":[{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31738","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3219","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31892","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31812","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31664","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32326","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32364","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32188","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32265","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32266","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32228","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32198","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32231","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3221","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32181","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3202","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3466"},{"reference_url":"https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/","reference_id":"","reference_type":"","scores":[],"url":"https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466"},{"reference_url":"https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2019-3466/","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H']"}],"url":"https://www.postgresql.org/support/security/CVE-2019-3466/"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3466","reference_id":"CVE-2019-3466","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3466"},{"reference_url":"https://usn.ubuntu.com/4194-1/","reference_id":"USN-4194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4194-1/"},{"reference_url":"https://usn.ubuntu.com/4194-2/","reference_id":"USN-4194-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4194-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/212?format=json","purl":"pkg:generic/postgresql@10.11.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.11.0"},{"url":"http://public2.vulnerablecode.io/api/packages/211?format=json","purl":"pkg:generic/postgresql@11.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/210?format=json","purl":"pkg:generic/postgresql@12.1.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.1.0"}],"aliases":["CVE-2019-3466"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zrcc-w98g-gfhk"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.0.0"}