{"url":"http://public2.vulnerablecode.io/api/packages/366?format=json","purl":"pkg:generic/postgresql@7.3.0","type":"generic","namespace":"","name":"postgresql","version":"7.3.0","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"7.3.8","latest_non_vulnerable_version":"18.2.0","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3580?format=json","vulnerability_id":"VCID-5zj2-a3y7-zueh","summary":"DBLink functions combined with local trust or ident access control could be used by a malicious user togain superuser privileges. A valid login is required to exploit this vulnerability.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6601.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6601","reference_id":"","reference_type":"","scores":[{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75128","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75131","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75162","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75138","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75173","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75206","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75172","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.7521","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75216","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75205","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75247","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.7525","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.7526","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75287","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6601"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2007-6601/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2007-6601/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=427128","reference_id":"427128","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=427128"},{"reference_url":"https://security.gentoo.org/glsa/200801-15","reference_id":"GLSA-200801-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0038","reference_id":"RHSA-2008:0038","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0039","reference_id":"RHSA-2008:0039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0040","reference_id":"RHSA-2008:0040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0040"},{"reference_url":"https://usn.ubuntu.com/568-1/","reference_id":"USN-568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/568-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371?format=json","purl":"pkg:generic/postgresql@7.3.21","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.21"},{"url":"http://public2.vulnerablecode.io/api/packages/370?format=json","purl":"pkg:generic/postgresql@7.4.19","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.19"},{"url":"http://public2.vulnerablecode.io/api/packages/369?format=json","purl":"pkg:generic/postgresql@8.0.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.15"},{"url":"http://public2.vulnerablecode.io/api/packages/368?format=json","purl":"pkg:generic/postgresql@8.1.11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.11"},{"url":"http://public2.vulnerablecode.io/api/packages/367?format=json","purl":"pkg:generic/postgresql@8.2.6","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.6"}],"aliases":["CVE-2007-6601"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5zj2-a3y7-zueh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3598?format=json","vulnerability_id":"VCID-6ppw-nxh2-2bfs","summary":"A bug in the handling of SET SESSION AUTHORIZATION can cause a backend crash in Assert enabled builds. This will cause the postmaster to restart all backend, resulting in a denial of service. A valid login is required to exploit this vulnerability.more details","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0678","reference_id":"","reference_type":"","scores":[{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25364","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25433","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25468","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25241","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2531","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25355","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25367","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25324","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25271","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25278","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25269","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25238","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25197","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25186","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2514","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2502","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25084","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0678"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2006-0678/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2006-0678/"},{"reference_url":"https://usn.ubuntu.com/258-1/","reference_id":"USN-258-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/258-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/402?format=json","purl":"pkg:generic/postgresql@7.3.14","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.14"},{"url":"http://public2.vulnerablecode.io/api/packages/401?format=json","purl":"pkg:generic/postgresql@7.4.12","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.12"},{"url":"http://public2.vulnerablecode.io/api/packages/400?format=json","purl":"pkg:generic/postgresql@8.0.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.7"}],"aliases":["CVE-2006-0678"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ppw-nxh2-2bfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3604?format=json","vulnerability_id":"VCID-8753-jd2h-8yhw","summary":"EXECUTE permissions are not properly checked when creating aggregates. A valid login is required to exploit this vulnerability.more details","references":[{"reference_url":"http://archives.postgresql.org/pgsql-hackers/2005-01/msg00922.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-hackers/2005-01/msg00922.php"},{"reference_url":"http://marc.info/?l=bugtraq&m=110806034116082&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=110806034116082&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0244.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0244.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0244","reference_id":"","reference_type":"","scores":[{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74755","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74596","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.746","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74627","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74601","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74633","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74647","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.7467","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.7465","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74642","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74679","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74687","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74714","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.7472","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74722","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74726","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0244"},{"reference_url":"http://secunia.com/advisories/12948","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/12948"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19184","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19184"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10927","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10927"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2005-0244/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2005-0244/"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-138.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-138.html"},{"reference_url":"http://www.securityfocus.com/bid/12417","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617505","reference_id":"1617505","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617505"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0244","reference_id":"CVE-2005-0244","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0244"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:138","reference_id":"RHSA-2005:138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:141","reference_id":"RHSA-2005:141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:141"},{"reference_url":"https://usn.ubuntu.com/79-1/","reference_id":"USN-79-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/79-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/409?format=json","purl":"pkg:generic/postgresql@7.3.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.9"},{"url":"http://public2.vulnerablecode.io/api/packages/408?format=json","purl":"pkg:generic/postgresql@7.4.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.7"},{"url":"http://public2.vulnerablecode.io/api/packages/407?format=json","purl":"pkg:generic/postgresql@8.0.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.1"}],"aliases":["CVE-2005-0244"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8753-jd2h-8yhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3589?format=json","vulnerability_id":"VCID-8z74-udgw-kue3","summary":"The widely-used practice of escaping ASCII single quote \"'\" by turning it into \"\\'\" is unsafe when operating in multibyte encodings that allow 0x5c (ASCII code for backslash) as the trailing byte of a multibyte character.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2314.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2314.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2314","reference_id":"","reference_type":"","scores":[{"value":"0.02162","scoring_system":"epss","scoring_elements":"0.84308","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02162","scoring_system":"epss","scoring_elements":"0.84309","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02162","scoring_system":"epss","scoring_elements":"0.84312","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02162","scoring_system":"epss","scoring_elements":"0.84338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02162","scoring_system":"epss","scoring_elements":"0.84346","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02162","scoring_system":"epss","scoring_elements":"0.84351","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02162","scoring_system":"epss","scoring_elements":"0.84371","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02162","scoring_system":"epss","scoring_elements":"0.84395","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02168","scoring_system":"epss","scoring_elements":"0.84243","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02168","scoring_system":"epss","scoring_elements":"0.84311","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02168","scoring_system":"epss","scoring_elements":"0.84255","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02168","scoring_system":"epss","scoring_elements":"0.84274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02168","scoring_system":"epss","scoring_elements":"0.84276","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02168","scoring_system":"epss","scoring_elements":"0.84298","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02168","scoring_system":"epss","scoring_elements":"0.84303","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02168","scoring_system":"epss","scoring_elements":"0.84321","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02168","scoring_system":"epss","scoring_elements":"0.84315","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2314"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2006-2314/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2006-2314/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618101","reference_id":"1618101","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618101"},{"reference_url":"https://security.gentoo.org/glsa/200607-04","reference_id":"GLSA-200607-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200607-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0526","reference_id":"RHSA-2006:0526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0526"},{"reference_url":"https://usn.ubuntu.com/288-1/","reference_id":"USN-288-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/288-1/"},{"reference_url":"https://usn.ubuntu.com/288-2/","reference_id":"USN-288-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/288-2/"},{"reference_url":"https://usn.ubuntu.com/288-3/","reference_id":"USN-288-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/288-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/388?format=json","purl":"pkg:generic/postgresql@7.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/387?format=json","purl":"pkg:generic/postgresql@7.4.13","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.13"},{"url":"http://public2.vulnerablecode.io/api/packages/386?format=json","purl":"pkg:generic/postgresql@8.0.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.8"},{"url":"http://public2.vulnerablecode.io/api/packages/385?format=json","purl":"pkg:generic/postgresql@8.1.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.4"}],"aliases":["CVE-2006-2314"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8z74-udgw-kue3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3590?format=json","vulnerability_id":"VCID-dema-khb4-d7c3","summary":"An attacker able to submit crafted strings to an application that will embed those strings in SQL commands can use invalidly-encoded multibyte characters to bypass standard string-escaping methods, resulting in possible SQL injection.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2313.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2313.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2313","reference_id":"","reference_type":"","scores":[{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81146","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81147","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81144","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81167","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81175","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81181","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81195","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81216","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83698","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83765","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83726","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83729","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83753","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83759","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02022","scoring_system":"epss","scoring_elements":"0.83769","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2313"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2006-2313/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2006-2313/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618100","reference_id":"1618100","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618100"},{"reference_url":"https://security.gentoo.org/glsa/200607-04","reference_id":"GLSA-200607-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200607-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0526","reference_id":"RHSA-2006:0526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0526"},{"reference_url":"https://usn.ubuntu.com/288-1/","reference_id":"USN-288-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/288-1/"},{"reference_url":"https://usn.ubuntu.com/288-2/","reference_id":"USN-288-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/288-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/388?format=json","purl":"pkg:generic/postgresql@7.3.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.15"},{"url":"http://public2.vulnerablecode.io/api/packages/387?format=json","purl":"pkg:generic/postgresql@7.4.13","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.13"},{"url":"http://public2.vulnerablecode.io/api/packages/386?format=json","purl":"pkg:generic/postgresql@8.0.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.8"},{"url":"http://public2.vulnerablecode.io/api/packages/385?format=json","purl":"pkg:generic/postgresql@8.1.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.4"}],"aliases":["CVE-2006-2313"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dema-khb4-d7c3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3606?format=json","vulnerability_id":"VCID-dwxv-7v5k-pbgt","summary":"Contrib script make_oidjoins_check uses unsafe temporary files. This script is not a user-facing script.more details","references":[{"reference_url":"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136300","reference_id":"","reference_type":"","scores":[],"url":"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136300"},{"reference_url":"http://marc.info/?l=bugtraq&m=109910073808903&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=109910073808903&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0977.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0977.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0977","reference_id":"","reference_type":"","scores":[{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25009","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25282","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25356","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25392","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25169","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25238","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25283","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25297","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25255","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25202","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25212","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25171","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25124","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25113","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25068","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.24946","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0977"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200410-16.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200410-16.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11360","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11360"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2004-0977/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2004-0977/"},{"reference_url":"https://www.ubuntu.com/usn/usn-6-1/","reference_id":"","reference_type":"","scores":[],"url":"https://www.ubuntu.com/usn/usn-6-1/"},{"reference_url":"http://www.debian.org/security/2004/dsa-577","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2004/dsa-577"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:149","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:149"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2004-489.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2004-489.html"},{"reference_url":"http://www.securityfocus.com/bid/11295","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/11295"},{"reference_url":"http://www.trustix.org/errata/2004/0050","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2004/0050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617340","reference_id":"1617340","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617340"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0977","reference_id":"CVE-2004-0977","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0977"},{"reference_url":"https://security.gentoo.org/glsa/200410-16","reference_id":"GLSA-200410-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200410-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:489","reference_id":"RHSA-2004:489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:489"},{"reference_url":"https://usn.ubuntu.com/6-1/","reference_id":"USN-6-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/411?format=json","purl":"pkg:generic/postgresql@7.3.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.8"},{"url":"http://public2.vulnerablecode.io/api/packages/410?format=json","purl":"pkg:generic/postgresql@7.4.6","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.6"}],"aliases":["CVE-2004-0977"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dwxv-7v5k-pbgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3581?format=json","vulnerability_id":"VCID-f89t-37f7-hbau","summary":"Two vulnerabilities in how ANALYZE executes user defined functions that are part of expression indexes allows users to gain superuser privileges. A valid login that has permissions to create functions and tables is required to exploit this vulnearbility.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6600.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6600","reference_id":"","reference_type":"","scores":[{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74165","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.7417","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74196","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74169","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74202","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74217","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.7422","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74213","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74251","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.7426","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74286","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74294","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74288","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74316","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6600"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2007-6600/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2007-6600/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=427127","reference_id":"427127","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=427127"},{"reference_url":"https://security.gentoo.org/glsa/200801-15","reference_id":"GLSA-200801-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0038","reference_id":"RHSA-2008:0038","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0039","reference_id":"RHSA-2008:0039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0040","reference_id":"RHSA-2008:0040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0040"},{"reference_url":"https://usn.ubuntu.com/568-1/","reference_id":"USN-568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/568-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371?format=json","purl":"pkg:generic/postgresql@7.3.21","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.21"},{"url":"http://public2.vulnerablecode.io/api/packages/370?format=json","purl":"pkg:generic/postgresql@7.4.19","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.19"},{"url":"http://public2.vulnerablecode.io/api/packages/369?format=json","purl":"pkg:generic/postgresql@8.0.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.15"},{"url":"http://public2.vulnerablecode.io/api/packages/368?format=json","purl":"pkg:generic/postgresql@8.1.11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.11"},{"url":"http://public2.vulnerablecode.io/api/packages/367?format=json","purl":"pkg:generic/postgresql@8.2.6","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.6"}],"aliases":["CVE-2007-6600"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f89t-37f7-hbau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3583?format=json","vulnerability_id":"VCID-g5yd-z8gh-pbc4","summary":"A vulnerability involving insecure search_path settings allows unprivileged users to gain the SQL privileges of the owner of any SECURITY DEFINER function they are allowed to call. Securing such a function requires both a software update and changes to the function definition.more details","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0336.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0336.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2138.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2138.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2138","reference_id":"","reference_type":"","scores":[{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81778","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81595","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81606","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81627","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81652","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81657","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81677","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81664","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81696","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81695","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81699","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81724","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81733","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81739","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01593","scoring_system":"epss","scoring_elements":"0.81757","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2138"},{"reference_url":"http://secunia.com/advisories/24989","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24989"},{"reference_url":"http://secunia.com/advisories/24999","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24999"},{"reference_url":"http://secunia.com/advisories/25005","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25005"},{"reference_url":"http://secunia.com/advisories/25019","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25019"},{"reference_url":"http://secunia.com/advisories/25037","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25037"},{"reference_url":"http://secunia.com/advisories/25058","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25058"},{"reference_url":"http://secunia.com/advisories/25184","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25184"},{"reference_url":"http://secunia.com/advisories/25238","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25238"},{"reference_url":"http://secunia.com/advisories/25334","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25334"},{"reference_url":"http://secunia.com/advisories/25717","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25717"},{"reference_url":"http://secunia.com/advisories/25720","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25720"},{"reference_url":"http://secunia.com/advisories/25725","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25725"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200705-12.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200705-12.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33842","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33842"},{"reference_url":"https://issues.rpath.com/browse/RPL-1292","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1292"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10090","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10090"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102894-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102894-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-190.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-190.htm"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2007-2138/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2007-2138/"},{"reference_url":"http://www.debian.org/security/2007/dsa-1309","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1309"},{"reference_url":"http://www.debian.org/security/2007/dsa-1311","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1311"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:094","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:094"},{"reference_url":"http://www.postgresql.org/about/news.791","reference_id":"","reference_type":"","scores":[],"url":"http://www.postgresql.org/about/news.791"},{"reference_url":"http://www.postgresql.org/support/security.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.postgresql.org/support/security.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0337.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0337.html"},{"reference_url":"http://www.securityfocus.com/bid/23618","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23618"},{"reference_url":"http://www.securitytracker.com/id?1017974","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017974"},{"reference_url":"http://www.trustix.org/errata/2007/0015/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0015/"},{"reference_url":"http://www.ubuntu.com/usn/usn-454-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-454-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1497","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1497"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1549","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1549"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=237682","reference_id":"237682","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=237682"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2138","reference_id":"CVE-2007-2138","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2138"},{"reference_url":"https://security.gentoo.org/glsa/200705-12","reference_id":"GLSA-200705-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200705-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0336","reference_id":"RHSA-2007:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0336"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0337","reference_id":"RHSA-2007:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0337"},{"reference_url":"https://usn.ubuntu.com/454-1/","reference_id":"USN-454-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/454-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/376?format=json","purl":"pkg:generic/postgresql@7.3.19","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.19"},{"url":"http://public2.vulnerablecode.io/api/packages/375?format=json","purl":"pkg:generic/postgresql@7.4.17","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.17"},{"url":"http://public2.vulnerablecode.io/api/packages/374?format=json","purl":"pkg:generic/postgresql@8.0.13","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.13"},{"url":"http://public2.vulnerablecode.io/api/packages/373?format=json","purl":"pkg:generic/postgresql@8.1.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.9"},{"url":"http://public2.vulnerablecode.io/api/packages/372?format=json","purl":"pkg:generic/postgresql@8.2.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.4"}],"aliases":["CVE-2007-2138"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g5yd-z8gh-pbc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3602?format=json","vulnerability_id":"VCID-hase-39jj-6khk","summary":"The intagg contrib module allows attackers to cause a denial of service. A valid login is required to exploit this vulnerability.more details","references":[{"reference_url":"http://archives.postgresql.org/pgsql-committers/2005-01/msg00401.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-committers/2005-01/msg00401.php"},{"reference_url":"http://marc.info/?l=bugtraq&m=110806034116082&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=110806034116082&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0246.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0246.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0246","reference_id":"","reference_type":"","scores":[{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83394","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83204","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83221","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83235","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83234","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83258","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83283","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83277","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83273","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83309","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.8331","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83312","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83335","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83342","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83348","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01907","scoring_system":"epss","scoring_elements":"0.83373","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0246"},{"reference_url":"http://secunia.com/advisories/12948","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/12948"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19185","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19185"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10148","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10148"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2005-0246/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2005-0246/"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-138.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-138.html"},{"reference_url":"http://www.securityfocus.com/bid/12417","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617507","reference_id":"1617507","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617507"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0246","reference_id":"CVE-2005-0246","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:138","reference_id":"RHSA-2005:138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:141","reference_id":"RHSA-2005:141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:141"},{"reference_url":"https://usn.ubuntu.com/79-1/","reference_id":"USN-79-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/79-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/409?format=json","purl":"pkg:generic/postgresql@7.3.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.9"},{"url":"http://public2.vulnerablecode.io/api/packages/408?format=json","purl":"pkg:generic/postgresql@7.4.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.7"},{"url":"http://public2.vulnerablecode.io/api/packages/407?format=json","purl":"pkg:generic/postgresql@8.0.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.1"}],"aliases":["CVE-2005-0246"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hase-39jj-6khk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3585?format=json","vulnerability_id":"VCID-nj9p-fdc9-m7fu","summary":"A vulnerability allows suppressing the normal checks that a SQL function returns the data type it's declared to do. These errors can easily be exploited to cause a backend crash, and in principle might be used to read database content that the user should not be able to access.more details","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"},{"reference_url":"http://fedoranews.org/cms/node/2554","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2554"},{"reference_url":"http://lists.rpath.com/pipermail/security-announce/2007-February/000141.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.rpath.com/pipermail/security-announce/2007-February/000141.html"},{"reference_url":"http://osvdb.org/33087","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/33087"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0555.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0555.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0555","reference_id":"","reference_type":"","scores":[{"value":"0.01905","scoring_system":"epss","scoring_elements":"0.83373","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01905","scoring_system":"epss","scoring_elements":"0.83185","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01905","scoring_system":"epss","scoring_elements":"0.83201","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01905","scoring_system":"epss","scoring_elements":"0.83215","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01905","scoring_system":"epss","scoring_elements":"0.83214","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01905","scoring_system":"epss","scoring_elements":"0.83238","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01905","scoring_system":"epss","scoring_elements":"0.83245","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01905","scoring_system":"epss","scoring_elements":"0.83261","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01905","scoring_system":"epss","scoring_elements":"0.83255","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01905","scoring_system":"epss","scoring_elements":"0.83251","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01905","scoring_system":"epss","scoring_elements":"0.83287","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01905","scoring_system":"epss","scoring_elements":"0.83288","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01905","scoring_system":"epss","scoring_elements":"0.8329","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01905","scoring_system":"epss","scoring_elements":"0.83313","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01905","scoring_system":"epss","scoring_elements":"0.8332","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01905","scoring_system":"epss","scoring_elements":"0.83327","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01905","scoring_system":"epss","scoring_elements":"0.83352","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0555"},{"reference_url":"http://secunia.com/advisories/24028","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24028"},{"reference_url":"http://secunia.com/advisories/24033","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24033"},{"reference_url":"http://secunia.com/advisories/24042","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24042"},{"reference_url":"http://secunia.com/advisories/24050","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24050"},{"reference_url":"http://secunia.com/advisories/24057","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24057"},{"reference_url":"http://secunia.com/advisories/24094","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24094"},{"reference_url":"http://secunia.com/advisories/24151","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24151"},{"reference_url":"http://secunia.com/advisories/24158","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24158"},{"reference_url":"http://secunia.com/advisories/24284","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24284"},{"reference_url":"http://secunia.com/advisories/24315","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24315"},{"reference_url":"http://secunia.com/advisories/24513","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24513"},{"reference_url":"http://secunia.com/advisories/24577","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24577"},{"reference_url":"http://secunia.com/advisories/25220","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25220"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-15.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-15.xml"},{"reference_url":"http://securitytracker.com/id?1017597","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1017597"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32195","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32195"},{"reference_url":"https://issues.rpath.com/browse/RPL-1025","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1025"},{"reference_url":"https://issues.rpath.com/browse/RPL-830","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-830"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9739","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9739"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102825-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102825-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2007-0555/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2007-0555/"},{"reference_url":"http://www.debian.org/security/2007/dsa-1261","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1261"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:037","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:037"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_10_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_10_sr.html"},{"reference_url":"http://www.postgresql.org/support/security","reference_id":"","reference_type":"","scores":[],"url":"http://www.postgresql.org/support/security"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0064.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0064.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0067.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0067.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0068.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0068.html"},{"reference_url":"http://www.securityfocus.com/archive/1/459280/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/459280/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/459448/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/459448/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/22387","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22387"},{"reference_url":"http://www.trustix.org/errata/2007/0007","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0007"},{"reference_url":"http://www.ubuntu.com/usn/usn-417-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-417-2"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0478","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0478"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0774","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0774"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618367","reference_id":"1618367","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618367"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0555","reference_id":"CVE-2007-0555","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:C/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0555"},{"reference_url":"https://security.gentoo.org/glsa/200703-15","reference_id":"GLSA-200703-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0064","reference_id":"RHSA-2007:0064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0067","reference_id":"RHSA-2007:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0068","reference_id":"RHSA-2007:0068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0068"},{"reference_url":"https://usn.ubuntu.com/417-1/","reference_id":"USN-417-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/417-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/381?format=json","purl":"pkg:generic/postgresql@7.3.13","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.13"},{"url":"http://public2.vulnerablecode.io/api/packages/380?format=json","purl":"pkg:generic/postgresql@7.4.16","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.16"},{"url":"http://public2.vulnerablecode.io/api/packages/379?format=json","purl":"pkg:generic/postgresql@8.0.11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.11"},{"url":"http://public2.vulnerablecode.io/api/packages/378?format=json","purl":"pkg:generic/postgresql@8.1.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.7"},{"url":"http://public2.vulnerablecode.io/api/packages/377?format=json","purl":"pkg:generic/postgresql@8.2.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.2"}],"aliases":["CVE-2007-0555"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nj9p-fdc9-m7fu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3600?format=json","vulnerability_id":"VCID-qw91-9hzj-2bbd","summary":"Public EXECUTE access is given to certain character conversion functions that are not designed to be safe against malicious arguments. This can cause at least a denial of service. A valid login is required to exploit this vulnerability.Note! See the announcement for special upgrade instructions.more details","references":[{"reference_url":"http://archives.postgresql.org/pgsql-announce/2005-05/msg00001.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-announce/2005-05/msg00001.php"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1409.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1409.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-1409","reference_id":"","reference_type":"","scores":[{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.81101","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.80929","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.80938","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.8096","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.80958","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.80986","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.80993","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.81009","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.80995","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.80988","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.81025","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.81026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.81047","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.81056","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.81063","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.81079","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-1409"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10050","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10050"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A676","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A676"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2005-1409/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2005-1409/"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html"},{"reference_url":"http://www.postgresql.org/about/news.315","reference_id":"","reference_type":"","scores":[],"url":"http://www.postgresql.org/about/news.315"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-433.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-433.html"},{"reference_url":"http://www.securityfocus.com/archive/1/426302/30/6680/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/426302/30/6680/threaded"},{"reference_url":"http://www.securityfocus.com/bid/13476","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/13476"},{"reference_url":"http://www.vupen.com/english/advisories/2005/0453","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/0453"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617632","reference_id":"1617632","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617632"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-1409","reference_id":"CVE-2005-1409","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-1409"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:433","reference_id":"RHSA-2005:433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:433"},{"reference_url":"https://usn.ubuntu.com/118-1/","reference_id":"USN-118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/118-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/405?format=json","purl":"pkg:generic/postgresql@7.3.10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.10"},{"url":"http://public2.vulnerablecode.io/api/packages/404?format=json","purl":"pkg:generic/postgresql@7.4.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.8"},{"url":"http://public2.vulnerablecode.io/api/packages/403?format=json","purl":"pkg:generic/postgresql@8.0.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.3"}],"aliases":["CVE-2005-1409"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qw91-9hzj-2bbd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3603?format=json","vulnerability_id":"VCID-s1hd-1asy-q3dd","summary":"Multiple buffer overflows in the PL/PGSQL parser may allow attackers to execute arbitrary code. A valid login is required to exploit this vulnerability.more details","references":[{"reference_url":"http://archives.postgresql.org/pgsql-committers/2005-01/msg00298.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-committers/2005-01/msg00298.php"},{"reference_url":"http://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php"},{"reference_url":"http://archives.postgresql.org/pgsql-patches/2005-01/msg00216.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-patches/2005-01/msg00216.php"},{"reference_url":"http://marc.info/?l=bugtraq&m=110806034116082&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=110806034116082&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0245.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0245.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0245","reference_id":"","reference_type":"","scores":[{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95962","published_at":"2026-05-07T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95889","published_at":"2026-04-01T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95897","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95906","published_at":"2026-04-04T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.9591","published_at":"2026-04-07T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95918","published_at":"2026-04-08T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95921","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95925","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95926","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95938","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95943","published_at":"2026-04-18T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95944","published_at":"2026-04-21T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95945","published_at":"2026-04-29T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95956","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0245"},{"reference_url":"http://secunia.com/advisories/12948","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/12948"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19188","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19188"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10175","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10175"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2005-0245/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2005-0245/"},{"reference_url":"http://www.debian.org/security/2005/dsa-683","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-683"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-138.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-138.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-150.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-150.html"},{"reference_url":"http://www.securityfocus.com/bid/12417","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617506","reference_id":"1617506","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617506"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0245","reference_id":"CVE-2005-0245","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0245"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/25076.c","reference_id":"CVE-2005-0245;OSVDB-13774","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/25076.c"},{"reference_url":"https://www.securityfocus.com/bid/12417/info","reference_id":"CVE-2005-0245;OSVDB-13774","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/12417/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:138","reference_id":"RHSA-2005:138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:141","reference_id":"RHSA-2005:141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:150","reference_id":"RHSA-2005:150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:150"},{"reference_url":"https://usn.ubuntu.com/79-1/","reference_id":"USN-79-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/79-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/405?format=json","purl":"pkg:generic/postgresql@7.3.10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.10"},{"url":"http://public2.vulnerablecode.io/api/packages/408?format=json","purl":"pkg:generic/postgresql@7.4.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.7"},{"url":"http://public2.vulnerablecode.io/api/packages/407?format=json","purl":"pkg:generic/postgresql@8.0.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.1"}],"aliases":["CVE-2005-0245"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s1hd-1asy-q3dd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3605?format=json","vulnerability_id":"VCID-swbt-7zch-sbcp","summary":"Any database user is permitted to load arbitrary shared libraries using the LOAD command. A valid login is required to exploit this vulnerability.more details","references":[{"reference_url":"http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php"},{"reference_url":"http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php"},{"reference_url":"http://marc.info/?l=bugtraq&m=110726899107148&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=110726899107148&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0227.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0227.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0227","reference_id":"","reference_type":"","scores":[{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29864","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30335","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30365","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30413","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30228","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30288","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30322","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30326","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30281","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30235","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.3025","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30232","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30186","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30122","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30007","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29929","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29794","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0227"},{"reference_url":"http://secunia.com/advisories/12948","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/12948"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200502-08.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200502-08.xml"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10234","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10234"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2005-0227/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2005-0227/"},{"reference_url":"http://www.debian.org/security/2005/dsa-668","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-668"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-138.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-138.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-150.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-150.html"},{"reference_url":"http://www.securityfocus.com/bid/12411","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12411"},{"reference_url":"http://www.trustix.org/errata/2005/0003/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2005/0003/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617499","reference_id":"1617499","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617499"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0227","reference_id":"CVE-2005-0227","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0227"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:138","reference_id":"RHSA-2005:138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:141","reference_id":"RHSA-2005:141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:150","reference_id":"RHSA-2005:150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:150"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/409?format=json","purl":"pkg:generic/postgresql@7.3.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.9"},{"url":"http://public2.vulnerablecode.io/api/packages/408?format=json","purl":"pkg:generic/postgresql@7.4.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.7"},{"url":"http://public2.vulnerablecode.io/api/packages/407?format=json","purl":"pkg:generic/postgresql@8.0.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.1"}],"aliases":["CVE-2005-0227"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-swbt-7zch-sbcp"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.0"}