{"url":"http://public2.vulnerablecode.io/api/packages/421528?format=json","purl":"pkg:apk/alpine/postgresql15@15.17-r0?arch=x86_64&distroversion=v3.21&reponame=community","type":"apk","namespace":"alpine","name":"postgresql15","version":"15.17-r0","qualifiers":{"arch":"x86_64","distroversion":"v3.21","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3502?format=json","vulnerability_id":"VCID-6fq5-826e-fkeq","summary":"PostgreSQL optimizer statistics can expose sampled data within a view, partition, or child tablemore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8713.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8713.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-8713","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09307","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09358","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09305","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09408","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09441","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09428","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09454","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10356","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1044","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10423","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10412","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-8713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8713"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-176-1610-1514-1419-1322-and-18-beta-3-released-3118/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-176-1610-1514-1419-1322-and-18-beta-3-released-3118/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2025-8713/","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']"},{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-14T19:50:52Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2025-8713/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2388550","reference_id":"2388550","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2388550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14827","reference_id":"RHSA-2025:14827","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14827"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14862","reference_id":"RHSA-2025:14862","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14869","reference_id":"RHSA-2025:14869","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14869"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14870","reference_id":"RHSA-2025:14870","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14878","reference_id":"RHSA-2025:14878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14878"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15013","reference_id":"RHSA-2025:15013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15014","reference_id":"RHSA-2025:15014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15014"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15015","reference_id":"RHSA-2025:15015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15031","reference_id":"RHSA-2025:15031","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15057","reference_id":"RHSA-2025:15057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15062","reference_id":"RHSA-2025:15062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15114","reference_id":"RHSA-2025:15114","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15114"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15359","reference_id":"RHSA-2025:15359","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15359"},{"reference_url":"https://usn.ubuntu.com/7741-1/","reference_id":"USN-7741-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7741-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/421528?format=json","purl":"pkg:apk/alpine/postgresql15@15.17-r0?arch=x86_64&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql15@15.17-r0%3Farch=x86_64&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2025-8713"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6fq5-826e-fkeq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3494?format=json","vulnerability_id":"VCID-b13k-m1w4-1faz","summary":"PostgreSQL missing validation of multibyte character length executes arbitrary codemore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2006.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2006.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2006","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09681","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09711","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09828","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09844","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0988","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0975","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09874","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09821","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11616","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11765","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11733","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11694","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12386","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1243","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2006"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2026-2006/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T04:56:31Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2026-2006/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439324","reference_id":"2439324","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3730","reference_id":"RHSA-2026:3730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3887","reference_id":"RHSA-2026:3887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3896","reference_id":"RHSA-2026:3896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3896"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4024","reference_id":"RHSA-2026:4024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4059","reference_id":"RHSA-2026:4059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4059"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4063","reference_id":"RHSA-2026:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4064","reference_id":"RHSA-2026:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4074","reference_id":"RHSA-2026:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4075","reference_id":"RHSA-2026:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4110","reference_id":"RHSA-2026:4110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4254","reference_id":"RHSA-2026:4254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4441","reference_id":"RHSA-2026:4441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4475","reference_id":"RHSA-2026:4475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4504","reference_id":"RHSA-2026:4504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4505","reference_id":"RHSA-2026:4505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4506","reference_id":"RHSA-2026:4506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4509","reference_id":"RHSA-2026:4509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4515","reference_id":"RHSA-2026:4515","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4516","reference_id":"RHSA-2026:4516","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4516"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4518","reference_id":"RHSA-2026:4518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4524","reference_id":"RHSA-2026:4524","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4524"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4528","reference_id":"RHSA-2026:4528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4528"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4544","reference_id":"RHSA-2026:4544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4546","reference_id":"RHSA-2026:4546","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4546"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4547","reference_id":"RHSA-2026:4547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4548","reference_id":"RHSA-2026:4548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4943","reference_id":"RHSA-2026:4943","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8756","reference_id":"RHSA-2026:8756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8756"},{"reference_url":"https://usn.ubuntu.com/8072-1/","reference_id":"USN-8072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8072-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/421528?format=json","purl":"pkg:apk/alpine/postgresql15@15.17-r0?arch=x86_64&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql15@15.17-r0%3Farch=x86_64&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2026-2006"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b13k-m1w4-1faz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3501?format=json","vulnerability_id":"VCID-h5sa-959y-6fh4","summary":"PostgreSQL pg_dump lets superuser of origin server execute arbitrary code in psql clientmore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8714.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8714.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-8714","reference_id":"","reference_type":"","scores":[{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07776","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07837","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07793","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07878","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07885","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07897","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07921","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07892","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07908","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08709","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08739","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0875","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08705","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-8714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8714"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-176-1610-1514-1419-1322-and-18-beta-3-released-3118/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-176-1610-1514-1419-1322-and-18-beta-3-released-3118/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2025-8714/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H']"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-15T03:55:55Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2025-8714/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2388553","reference_id":"2388553","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2388553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14826","reference_id":"RHSA-2025:14826","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14827","reference_id":"RHSA-2025:14827","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14827"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14862","reference_id":"RHSA-2025:14862","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14869","reference_id":"RHSA-2025:14869","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14869"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14870","reference_id":"RHSA-2025:14870","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14878","reference_id":"RHSA-2025:14878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14878"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14899","reference_id":"RHSA-2025:14899","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14899"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15006","reference_id":"RHSA-2025:15006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15012","reference_id":"RHSA-2025:15012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15013","reference_id":"RHSA-2025:15013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15014","reference_id":"RHSA-2025:15014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15014"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15015","reference_id":"RHSA-2025:15015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15021","reference_id":"RHSA-2025:15021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15022","reference_id":"RHSA-2025:15022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15031","reference_id":"RHSA-2025:15031","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15034","reference_id":"RHSA-2025:15034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15057","reference_id":"RHSA-2025:15057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15062","reference_id":"RHSA-2025:15062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15114","reference_id":"RHSA-2025:15114","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15114"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15115","reference_id":"RHSA-2025:15115","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15359","reference_id":"RHSA-2025:15359","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15359"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15361","reference_id":"RHSA-2025:15361","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15361"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16099","reference_id":"RHSA-2025:16099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16099"},{"reference_url":"https://usn.ubuntu.com/7741-1/","reference_id":"USN-7741-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7741-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/421528?format=json","purl":"pkg:apk/alpine/postgresql15@15.17-r0?arch=x86_64&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql15@15.17-r0%3Farch=x86_64&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2025-8714"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h5sa-959y-6fh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3493?format=json","vulnerability_id":"VCID-npaz-u5a8-17bs","summary":"PostgreSQL pg_trgm heap buffer overflow writes pattern onto server memorymore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2007.json","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2007.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2007","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05248","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05241","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05246","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.053","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05273","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05298","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05332","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05354","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0531","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05322","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05744","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05666","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05701","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05737","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2007"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2026-2007/","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H']"},{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T14:18:10Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2026-2007/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439320","reference_id":"2439320","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439320"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8756","reference_id":"RHSA-2026:8756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8756"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/421528?format=json","purl":"pkg:apk/alpine/postgresql15@15.17-r0?arch=x86_64&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql15@15.17-r0%3Farch=x86_64&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2026-2007"],"risk_score":3.7,"exploitability":"0.5","weighted_severity":"7.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-npaz-u5a8-17bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3500?format=json","vulnerability_id":"VCID-wetm-n31c-e3as","summary":"PostgreSQL pg_dump newline in object name executes arbitrary code in psql client and in restore target servermore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8715.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8715.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-8715","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1498","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15194","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14971","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15072","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15262","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15065","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15154","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15205","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15136","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15174","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16627","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16767","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16674","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16662","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-8715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8715"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-176-1610-1514-1419-1322-and-18-beta-3-released-3118/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-176-1610-1514-1419-1322-and-18-beta-3-released-3118/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2025-8715/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H']"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-15T03:55:57Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2025-8715/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2388551","reference_id":"2388551","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2388551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14826","reference_id":"RHSA-2025:14826","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14827","reference_id":"RHSA-2025:14827","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14827"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14862","reference_id":"RHSA-2025:14862","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14869","reference_id":"RHSA-2025:14869","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14869"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14870","reference_id":"RHSA-2025:14870","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14878","reference_id":"RHSA-2025:14878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14878"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14899","reference_id":"RHSA-2025:14899","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14899"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15006","reference_id":"RHSA-2025:15006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15012","reference_id":"RHSA-2025:15012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15013","reference_id":"RHSA-2025:15013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15014","reference_id":"RHSA-2025:15014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15014"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15015","reference_id":"RHSA-2025:15015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15015"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15021","reference_id":"RHSA-2025:15021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15022","reference_id":"RHSA-2025:15022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15031","reference_id":"RHSA-2025:15031","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15034","reference_id":"RHSA-2025:15034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15057","reference_id":"RHSA-2025:15057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15062","reference_id":"RHSA-2025:15062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15114","reference_id":"RHSA-2025:15114","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15114"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15115","reference_id":"RHSA-2025:15115","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15359","reference_id":"RHSA-2025:15359","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15359"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15361","reference_id":"RHSA-2025:15361","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15361"},{"reference_url":"https://usn.ubuntu.com/7741-1/","reference_id":"USN-7741-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7741-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/421528?format=json","purl":"pkg:apk/alpine/postgresql15@15.17-r0?arch=x86_64&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql15@15.17-r0%3Farch=x86_64&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2025-8715"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wetm-n31c-e3as"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql15@15.17-r0%3Farch=x86_64&distroversion=v3.21&reponame=community"}