{"url":"http://public2.vulnerablecode.io/api/packages/369?format=json","purl":"pkg:generic/postgresql@8.0.15","type":"generic","namespace":"","name":"postgresql","version":"8.0.15","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"8.0.21","latest_non_vulnerable_version":"18.2.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3580?format=json","vulnerability_id":"VCID-5zj2-a3y7-zueh","summary":"DBLink functions combined with local trust or ident access control could be used by a malicious user togain superuser privileges. A valid login is required to exploit this vulnerability.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6601.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6601","reference_id":"","reference_type":"","scores":[{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75128","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75131","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75162","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75138","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75173","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75206","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75172","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.7521","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75216","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75205","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75247","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.7525","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.7526","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6601"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2007-6601/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2007-6601/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=427128","reference_id":"427128","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=427128"},{"reference_url":"https://security.gentoo.org/glsa/200801-15","reference_id":"GLSA-200801-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0038","reference_id":"RHSA-2008:0038","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0039","reference_id":"RHSA-2008:0039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0040","reference_id":"RHSA-2008:0040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0040"},{"reference_url":"https://usn.ubuntu.com/568-1/","reference_id":"USN-568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/568-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371?format=json","purl":"pkg:generic/postgresql@7.3.21","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.21"},{"url":"http://public2.vulnerablecode.io/api/packages/370?format=json","purl":"pkg:generic/postgresql@7.4.19","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.19"},{"url":"http://public2.vulnerablecode.io/api/packages/369?format=json","purl":"pkg:generic/postgresql@8.0.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.15"},{"url":"http://public2.vulnerablecode.io/api/packages/368?format=json","purl":"pkg:generic/postgresql@8.1.11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.11"},{"url":"http://public2.vulnerablecode.io/api/packages/367?format=json","purl":"pkg:generic/postgresql@8.2.6","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.6"}],"aliases":["CVE-2007-6601"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5zj2-a3y7-zueh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3581?format=json","vulnerability_id":"VCID-f89t-37f7-hbau","summary":"Two vulnerabilities in how ANALYZE executes user defined functions that are part of expression indexes allows users to gain superuser privileges. A valid login that has permissions to create functions and tables is required to exploit this vulnearbility.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6600.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6600","reference_id":"","reference_type":"","scores":[{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74165","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.7417","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74196","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74169","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74202","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74217","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.7422","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74213","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74251","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.7426","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74286","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74294","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00809","scoring_system":"epss","scoring_elements":"0.74288","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6600"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2007-6600/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2007-6600/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=427127","reference_id":"427127","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=427127"},{"reference_url":"https://security.gentoo.org/glsa/200801-15","reference_id":"GLSA-200801-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0038","reference_id":"RHSA-2008:0038","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0039","reference_id":"RHSA-2008:0039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0040","reference_id":"RHSA-2008:0040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0040"},{"reference_url":"https://usn.ubuntu.com/568-1/","reference_id":"USN-568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/568-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371?format=json","purl":"pkg:generic/postgresql@7.3.21","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.21"},{"url":"http://public2.vulnerablecode.io/api/packages/370?format=json","purl":"pkg:generic/postgresql@7.4.19","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.19"},{"url":"http://public2.vulnerablecode.io/api/packages/369?format=json","purl":"pkg:generic/postgresql@8.0.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.15"},{"url":"http://public2.vulnerablecode.io/api/packages/368?format=json","purl":"pkg:generic/postgresql@8.1.11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.11"},{"url":"http://public2.vulnerablecode.io/api/packages/367?format=json","purl":"pkg:generic/postgresql@8.2.6","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.6"}],"aliases":["CVE-2007-6600"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f89t-37f7-hbau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3582?format=json","vulnerability_id":"VCID-h86x-6j3b-eqfh","summary":"Three vulnearbilities in the regular expression handling libraries can be exploited to cause a backend crash, infinite loops or memory exhaustion. This vulnearbility can be exploited through frontend applications that allow unfiltered regular expressions to be passed in queries.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4769.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4769.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4769","reference_id":"","reference_type":"","scores":[{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78808","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78814","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78844","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78827","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78853","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78882","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78866","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78885","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78879","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78908","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78916","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78933","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01194","scoring_system":"epss","scoring_elements":"0.78949","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4769"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2007-4769/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2007-4769/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=315231","reference_id":"315231","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=315231"},{"reference_url":"https://security.gentoo.org/glsa/200801-15","reference_id":"GLSA-200801-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0038","reference_id":"RHSA-2008:0038","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0040","reference_id":"RHSA-2008:0040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0040"},{"reference_url":"https://usn.ubuntu.com/568-1/","reference_id":"USN-568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/568-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370?format=json","purl":"pkg:generic/postgresql@7.4.19","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.19"},{"url":"http://public2.vulnerablecode.io/api/packages/369?format=json","purl":"pkg:generic/postgresql@8.0.15","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.15"},{"url":"http://public2.vulnerablecode.io/api/packages/368?format=json","purl":"pkg:generic/postgresql@8.1.11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.11"},{"url":"http://public2.vulnerablecode.io/api/packages/367?format=json","purl":"pkg:generic/postgresql@8.2.6","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.6"}],"aliases":["CVE-2007-4769"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h86x-6j3b-eqfh"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.15"}