{"url":"http://public2.vulnerablecode.io/api/packages/356?format=json","purl":"pkg:generic/postgresql@8.3.8","type":"generic","namespace":"","name":"postgresql","version":"8.3.8","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"8.3.9","latest_non_vulnerable_version":"18.2.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3627?format=json","vulnerability_id":"VCID-6dmy-t1qp-nuf3","summary":"If PostgreSQL is configured with LDAP authentication, and your LDAP configuration allows anonymous binds, it is possible for a user to authenticate themselves with an empty password.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3231.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3231.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3231","reference_id":"","reference_type":"","scores":[{"value":"0.04962","scoring_system":"epss","scoring_elements":"0.89626","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04962","scoring_system":"epss","scoring_elements":"0.89629","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04962","scoring_system":"epss","scoring_elements":"0.89643","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04962","scoring_system":"epss","scoring_elements":"0.89644","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04962","scoring_system":"epss","scoring_elements":"0.89661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04962","scoring_system":"epss","scoring_elements":"0.89667","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04962","scoring_system":"epss","scoring_elements":"0.89674","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04962","scoring_system":"epss","scoring_elements":"0.89672","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04962","scoring_system":"epss","scoring_elements":"0.89666","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04962","scoring_system":"epss","scoring_elements":"0.89681","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04962","scoring_system":"epss","scoring_elements":"0.89682","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04962","scoring_system":"epss","scoring_elements":"0.89676","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04962","scoring_system":"epss","scoring_elements":"0.89691","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04962","scoring_system":"epss","scoring_elements":"0.89693","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04962","scoring_system":"epss","scoring_elements":"0.89704","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04962","scoring_system":"epss","scoring_elements":"0.8972","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3231"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2009-3231/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2009-3231/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=522084","reference_id":"522084","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=522084"},{"reference_url":"https://security.gentoo.org/glsa/201110-22","reference_id":"GLSA-201110-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201110-22"},{"reference_url":"https://usn.ubuntu.com/834-1/","reference_id":"USN-834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/834-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/357?format=json","purl":"pkg:generic/postgresql@8.2.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.14"},{"url":"http://public2.vulnerablecode.io/api/packages/356?format=json","purl":"pkg:generic/postgresql@8.3.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.3.8"}],"aliases":["CVE-2009-3231"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6dmy-t1qp-nuf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3578?format=json","vulnerability_id":"VCID-721k-9zdg-buhv","summary":"The fix for issue CVE-2007-6600 (below) failed to include protection against misuse of RESET SESSION AUTHORIZATION.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3230.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3230.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3230","reference_id":"","reference_type":"","scores":[{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74875","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74876","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74904","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74878","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74911","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74924","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74947","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74925","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74916","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74952","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.7496","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74988","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74994","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74998","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.75005","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.75032","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3230"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2009-3230/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2009-3230/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=522085","reference_id":"522085","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=522085"},{"reference_url":"https://security.gentoo.org/glsa/201110-22","reference_id":"GLSA-201110-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201110-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1484","reference_id":"RHSA-2009:1484","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1484"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1485","reference_id":"RHSA-2009:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1485"},{"reference_url":"https://usn.ubuntu.com/834-1/","reference_id":"USN-834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/834-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/360?format=json","purl":"pkg:generic/postgresql@7.4.26","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.26"},{"url":"http://public2.vulnerablecode.io/api/packages/359?format=json","purl":"pkg:generic/postgresql@8.0.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.22"},{"url":"http://public2.vulnerablecode.io/api/packages/358?format=json","purl":"pkg:generic/postgresql@8.1.18","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.18"},{"url":"http://public2.vulnerablecode.io/api/packages/357?format=json","purl":"pkg:generic/postgresql@8.2.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.14"},{"url":"http://public2.vulnerablecode.io/api/packages/356?format=json","purl":"pkg:generic/postgresql@8.3.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.3.8"},{"url":"http://public2.vulnerablecode.io/api/packages/355?format=json","purl":"pkg:generic/postgresql@8.4.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.4.1"}],"aliases":["CVE-2009-3230"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-721k-9zdg-buhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3624?format=json","vulnerability_id":"VCID-s8a2-wbb4-dyda","summary":"Authenticated non-superusers can shut down the backend server by re-LOAD-ing libraries in $libdir/plugins, if any libraries are present there.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3229.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3229.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3229","reference_id":"","reference_type":"","scores":[{"value":"0.01327","scoring_system":"epss","scoring_elements":"0.79871","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01327","scoring_system":"epss","scoring_elements":"0.79878","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01327","scoring_system":"epss","scoring_elements":"0.799","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01327","scoring_system":"epss","scoring_elements":"0.79887","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01327","scoring_system":"epss","scoring_elements":"0.79916","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01327","scoring_system":"epss","scoring_elements":"0.79924","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01327","scoring_system":"epss","scoring_elements":"0.79945","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01327","scoring_system":"epss","scoring_elements":"0.79928","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01327","scoring_system":"epss","scoring_elements":"0.7992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01327","scoring_system":"epss","scoring_elements":"0.79949","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01327","scoring_system":"epss","scoring_elements":"0.7995","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01327","scoring_system":"epss","scoring_elements":"0.79952","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01327","scoring_system":"epss","scoring_elements":"0.79981","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01327","scoring_system":"epss","scoring_elements":"0.79987","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01327","scoring_system":"epss","scoring_elements":"0.80003","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01327","scoring_system":"epss","scoring_elements":"0.80015","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01327","scoring_system":"epss","scoring_elements":"0.80038","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3229"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2009-3229/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2009-3229/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=522092","reference_id":"522092","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=522092"},{"reference_url":"https://security.gentoo.org/glsa/201110-22","reference_id":"GLSA-201110-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201110-22"},{"reference_url":"https://usn.ubuntu.com/834-1/","reference_id":"USN-834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/834-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/357?format=json","purl":"pkg:generic/postgresql@8.2.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.14"},{"url":"http://public2.vulnerablecode.io/api/packages/356?format=json","purl":"pkg:generic/postgresql@8.3.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.3.8"},{"url":"http://public2.vulnerablecode.io/api/packages/355?format=json","purl":"pkg:generic/postgresql@8.4.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.4.1"}],"aliases":["CVE-2009-3229"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s8a2-wbb4-dyda"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.3.8"}