{"url":"http://public2.vulnerablecode.io/api/packages/435?format=json","purl":"pkg:generic/postgresql@9.0.7","type":"generic","namespace":"","name":"postgresql","version":"9.0.7","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"9.0.8","latest_non_vulnerable_version":"18.2.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3622?format=json","vulnerability_id":"VCID-811b-x31n-tfch","summary":"Permissions on a function called by a trigger are not properly checked.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0866.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0866.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0866","reference_id":"","reference_type":"","scores":[{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75678","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00905","scoring_system":"epss","scoring_elements":"0.75711","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77655","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77683","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77688","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77715","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77698","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77697","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77758","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77768","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01067","scoring_system":"epss","scoring_elements":"0.77783","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0866"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2012-0866/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2012-0866/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=797222","reference_id":"797222","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=797222"},{"reference_url":"https://security.gentoo.org/glsa/201209-24","reference_id":"GLSA-201209-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0677","reference_id":"RHSA-2012:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0678","reference_id":"RHSA-2012:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0678"},{"reference_url":"https://usn.ubuntu.com/1378-1/","reference_id":"USN-1378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1378-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/437?format=json","purl":"pkg:generic/postgresql@8.3.18","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.3.18"},{"url":"http://public2.vulnerablecode.io/api/packages/436?format=json","purl":"pkg:generic/postgresql@8.4.11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.4.11"},{"url":"http://public2.vulnerablecode.io/api/packages/435?format=json","purl":"pkg:generic/postgresql@9.0.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.0.7"},{"url":"http://public2.vulnerablecode.io/api/packages/434?format=json","purl":"pkg:generic/postgresql@9.1.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.1.3"}],"aliases":["CVE-2012-0866"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-811b-x31n-tfch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3620?format=json","vulnerability_id":"VCID-quqr-bg9k-7yb5","summary":"Line breaks in object names can be exploited to execute arbitrary SQL when reloading a pg_dump file.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0868.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0868.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0868","reference_id":"","reference_type":"","scores":[{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88583","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88592","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88609","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04372","scoring_system":"epss","scoring_elements":"0.88943","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04372","scoring_system":"epss","scoring_elements":"0.88961","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04372","scoring_system":"epss","scoring_elements":"0.88966","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04372","scoring_system":"epss","scoring_elements":"0.88978","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04372","scoring_system":"epss","scoring_elements":"0.88973","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04372","scoring_system":"epss","scoring_elements":"0.88971","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04372","scoring_system":"epss","scoring_elements":"0.88984","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04372","scoring_system":"epss","scoring_elements":"0.88983","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04372","scoring_system":"epss","scoring_elements":"0.88995","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04372","scoring_system":"epss","scoring_elements":"0.89003","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0868"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2012-0868/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2012-0868/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=797917","reference_id":"797917","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=797917"},{"reference_url":"https://security.gentoo.org/glsa/201209-24","reference_id":"GLSA-201209-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0677","reference_id":"RHSA-2012:0677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0678","reference_id":"RHSA-2012:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0678"},{"reference_url":"https://usn.ubuntu.com/1378-1/","reference_id":"USN-1378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1378-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/437?format=json","purl":"pkg:generic/postgresql@8.3.18","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.3.18"},{"url":"http://public2.vulnerablecode.io/api/packages/436?format=json","purl":"pkg:generic/postgresql@8.4.11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.4.11"},{"url":"http://public2.vulnerablecode.io/api/packages/435?format=json","purl":"pkg:generic/postgresql@9.0.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.0.7"},{"url":"http://public2.vulnerablecode.io/api/packages/434?format=json","purl":"pkg:generic/postgresql@9.1.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.1.3"}],"aliases":["CVE-2012-0868"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-quqr-bg9k-7yb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3621?format=json","vulnerability_id":"VCID-ux6m-dn6j-37dc","summary":"SSL certificate name checks are truncated to 32 characters, allowing connection spoofing under some circumstances when using third party certificate authorities.more details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0867.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0867.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0867","reference_id":"","reference_type":"","scores":[{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83153","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83116","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83139","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83146","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83061","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83069","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83084","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83078","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83074","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83112","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83113","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02051","scoring_system":"epss","scoring_elements":"0.83813","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02051","scoring_system":"epss","scoring_elements":"0.83828","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02051","scoring_system":"epss","scoring_elements":"0.838","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0867"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2012-0867/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/support/security/CVE-2012-0867/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=797915","reference_id":"797915","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=797915"},{"reference_url":"https://security.gentoo.org/glsa/201209-24","reference_id":"GLSA-201209-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0678","reference_id":"RHSA-2012:0678","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0678"},{"reference_url":"https://usn.ubuntu.com/1378-1/","reference_id":"USN-1378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1378-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/436?format=json","purl":"pkg:generic/postgresql@8.4.11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.4.11"},{"url":"http://public2.vulnerablecode.io/api/packages/435?format=json","purl":"pkg:generic/postgresql@9.0.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.0.7"},{"url":"http://public2.vulnerablecode.io/api/packages/434?format=json","purl":"pkg:generic/postgresql@9.1.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.1.3"}],"aliases":["CVE-2012-0867"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ux6m-dn6j-37dc"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.0.7"}