{"url":"http://public2.vulnerablecode.io/api/packages/405?format=json","purl":"pkg:generic/postgresql@7.3.10","type":"generic","namespace":"","name":"postgresql","version":"7.3.10","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"7.3.13","latest_non_vulnerable_version":"18.2.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3600?format=json","vulnerability_id":"VCID-qw91-9hzj-2bbd","summary":"Public EXECUTE access is given to certain character conversion functions that are not designed to be safe against malicious arguments. This can cause at least a denial of service. A valid login is required to exploit this vulnerability.Note! See the announcement for special upgrade instructions.more details","references":[{"reference_url":"http://archives.postgresql.org/pgsql-announce/2005-05/msg00001.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-announce/2005-05/msg00001.php"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1409.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1409.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-1409","reference_id":"","reference_type":"","scores":[{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.81101","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.80929","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.80938","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.8096","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.80958","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.80986","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.80993","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.81009","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.80995","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.80988","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.81025","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.81026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.81047","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.81056","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.81063","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0148","scoring_system":"epss","scoring_elements":"0.81079","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-1409"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10050","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10050"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A676","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A676"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2005-1409/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2005-1409/"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html"},{"reference_url":"http://www.postgresql.org/about/news.315","reference_id":"","reference_type":"","scores":[],"url":"http://www.postgresql.org/about/news.315"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-433.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-433.html"},{"reference_url":"http://www.securityfocus.com/archive/1/426302/30/6680/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/426302/30/6680/threaded"},{"reference_url":"http://www.securityfocus.com/bid/13476","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/13476"},{"reference_url":"http://www.vupen.com/english/advisories/2005/0453","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/0453"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617632","reference_id":"1617632","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617632"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-1409","reference_id":"CVE-2005-1409","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-1409"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:433","reference_id":"RHSA-2005:433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:433"},{"reference_url":"https://usn.ubuntu.com/118-1/","reference_id":"USN-118-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/118-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/405?format=json","purl":"pkg:generic/postgresql@7.3.10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.10"},{"url":"http://public2.vulnerablecode.io/api/packages/404?format=json","purl":"pkg:generic/postgresql@7.4.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.8"},{"url":"http://public2.vulnerablecode.io/api/packages/403?format=json","purl":"pkg:generic/postgresql@8.0.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.3"}],"aliases":["CVE-2005-1409"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qw91-9hzj-2bbd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3603?format=json","vulnerability_id":"VCID-s1hd-1asy-q3dd","summary":"Multiple buffer overflows in the PL/PGSQL parser may allow attackers to execute arbitrary code. A valid login is required to exploit this vulnerability.more details","references":[{"reference_url":"http://archives.postgresql.org/pgsql-committers/2005-01/msg00298.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-committers/2005-01/msg00298.php"},{"reference_url":"http://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php"},{"reference_url":"http://archives.postgresql.org/pgsql-patches/2005-01/msg00216.php","reference_id":"","reference_type":"","scores":[],"url":"http://archives.postgresql.org/pgsql-patches/2005-01/msg00216.php"},{"reference_url":"http://marc.info/?l=bugtraq&m=110806034116082&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=110806034116082&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0245.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0245.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0245","reference_id":"","reference_type":"","scores":[{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95962","published_at":"2026-05-07T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95889","published_at":"2026-04-01T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95897","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95906","published_at":"2026-04-04T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.9591","published_at":"2026-04-07T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95918","published_at":"2026-04-08T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95921","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95925","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95926","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95938","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95943","published_at":"2026-04-18T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95944","published_at":"2026-04-21T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95945","published_at":"2026-04-29T12:55:00Z"},{"value":"0.23114","scoring_system":"epss","scoring_elements":"0.95956","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0245"},{"reference_url":"http://secunia.com/advisories/12948","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/12948"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19188","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19188"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10175","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10175"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2005-0245/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2005-0245/"},{"reference_url":"http://www.debian.org/security/2005/dsa-683","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-683"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:040"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_36_sudo.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-138.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-138.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-150.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-150.html"},{"reference_url":"http://www.securityfocus.com/bid/12417","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617506","reference_id":"1617506","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617506"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0245","reference_id":"CVE-2005-0245","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0245"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/25076.c","reference_id":"CVE-2005-0245;OSVDB-13774","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/25076.c"},{"reference_url":"https://www.securityfocus.com/bid/12417/info","reference_id":"CVE-2005-0245;OSVDB-13774","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/12417/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:138","reference_id":"RHSA-2005:138","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:138"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:141","reference_id":"RHSA-2005:141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:150","reference_id":"RHSA-2005:150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:150"},{"reference_url":"https://usn.ubuntu.com/79-1/","reference_id":"USN-79-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/79-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/405?format=json","purl":"pkg:generic/postgresql@7.3.10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.10"},{"url":"http://public2.vulnerablecode.io/api/packages/408?format=json","purl":"pkg:generic/postgresql@7.4.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.7"},{"url":"http://public2.vulnerablecode.io/api/packages/407?format=json","purl":"pkg:generic/postgresql@8.0.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.1"}],"aliases":["CVE-2005-0245"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s1hd-1asy-q3dd"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.10"}