{"url":"http://public2.vulnerablecode.io/api/packages/475682?format=json","purl":"pkg:apk/alpine/postgresql16@16.12-r0?arch=loongarch64&distroversion=v3.22&reponame=main","type":"apk","namespace":"alpine","name":"postgresql16","version":"16.12-r0","qualifiers":{"arch":"loongarch64","distroversion":"v3.22","reponame":"main"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"16.13-r0","latest_non_vulnerable_version":"16.13-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3497?format=json","vulnerability_id":"VCID-4d43-twjt-v7hs","summary":"PostgreSQL oidvector discloses a few bytes of memorymore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2003.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2003.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2003","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04814","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04865","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04883","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04866","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04921","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04904","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06363","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06308","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06326","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06351","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2003"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2003","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2003"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2026-2003/","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T14:33:29Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2026-2003/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439322","reference_id":"2439322","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3730","reference_id":"RHSA-2026:3730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3887","reference_id":"RHSA-2026:3887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3896","reference_id":"RHSA-2026:3896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3896"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4059","reference_id":"RHSA-2026:4059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4059"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4063","reference_id":"RHSA-2026:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4110","reference_id":"RHSA-2026:4110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4254","reference_id":"RHSA-2026:4254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4441","reference_id":"RHSA-2026:4441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4515","reference_id":"RHSA-2026:4515","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4544","reference_id":"RHSA-2026:4544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4546","reference_id":"RHSA-2026:4546","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4546"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4547","reference_id":"RHSA-2026:4547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4548","reference_id":"RHSA-2026:4548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4943","reference_id":"RHSA-2026:4943","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8756","reference_id":"RHSA-2026:8756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8756"},{"reference_url":"https://usn.ubuntu.com/8072-1/","reference_id":"USN-8072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8072-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/475682?format=json","purl":"pkg:apk/alpine/postgresql16@16.12-r0?arch=loongarch64&distroversion=v3.22&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql16@16.12-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main"}],"aliases":["CVE-2026-2003"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4d43-twjt-v7hs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3495?format=json","vulnerability_id":"VCID-7asd-nhem-wbbr","summary":"PostgreSQL pgcrypto heap buffer overflow executes arbitrary codemore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2005.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2005.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2005","reference_id":"","reference_type":"","scores":[{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07719","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07785","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07744","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07831","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07832","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07788","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07846","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07865","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07844","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07857","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0998","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10079","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10057","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10035","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2005"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2026-2005/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T04:56:32Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2026-2005/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439326","reference_id":"2439326","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3730","reference_id":"RHSA-2026:3730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3887","reference_id":"RHSA-2026:3887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3896","reference_id":"RHSA-2026:3896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3896"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4024","reference_id":"RHSA-2026:4024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4059","reference_id":"RHSA-2026:4059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4059"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4063","reference_id":"RHSA-2026:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4064","reference_id":"RHSA-2026:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4074","reference_id":"RHSA-2026:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4075","reference_id":"RHSA-2026:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4110","reference_id":"RHSA-2026:4110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4254","reference_id":"RHSA-2026:4254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4441","reference_id":"RHSA-2026:4441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4475","reference_id":"RHSA-2026:4475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4504","reference_id":"RHSA-2026:4504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4505","reference_id":"RHSA-2026:4505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4506","reference_id":"RHSA-2026:4506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4509","reference_id":"RHSA-2026:4509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4515","reference_id":"RHSA-2026:4515","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4516","reference_id":"RHSA-2026:4516","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4516"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4518","reference_id":"RHSA-2026:4518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4524","reference_id":"RHSA-2026:4524","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4524"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4528","reference_id":"RHSA-2026:4528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4528"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4544","reference_id":"RHSA-2026:4544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4546","reference_id":"RHSA-2026:4546","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4546"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4547","reference_id":"RHSA-2026:4547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4548","reference_id":"RHSA-2026:4548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4943","reference_id":"RHSA-2026:4943","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8756","reference_id":"RHSA-2026:8756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8756"},{"reference_url":"https://usn.ubuntu.com/8072-1/","reference_id":"USN-8072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8072-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/475682?format=json","purl":"pkg:apk/alpine/postgresql16@16.12-r0?arch=loongarch64&distroversion=v3.22&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql16@16.12-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main"}],"aliases":["CVE-2026-2005"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7asd-nhem-wbbr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3494?format=json","vulnerability_id":"VCID-b13k-m1w4-1faz","summary":"PostgreSQL missing validation of multibyte character length executes arbitrary codemore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2006.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2006.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2006","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09681","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09711","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09828","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09844","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0988","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0975","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09874","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09821","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11616","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11765","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11733","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11694","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12386","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1243","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2006"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2026-2006/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T04:56:31Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2026-2006/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439324","reference_id":"2439324","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3730","reference_id":"RHSA-2026:3730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3887","reference_id":"RHSA-2026:3887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3896","reference_id":"RHSA-2026:3896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3896"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4024","reference_id":"RHSA-2026:4024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4059","reference_id":"RHSA-2026:4059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4059"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4063","reference_id":"RHSA-2026:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4064","reference_id":"RHSA-2026:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4074","reference_id":"RHSA-2026:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4075","reference_id":"RHSA-2026:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4110","reference_id":"RHSA-2026:4110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4254","reference_id":"RHSA-2026:4254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4441","reference_id":"RHSA-2026:4441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4475","reference_id":"RHSA-2026:4475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4504","reference_id":"RHSA-2026:4504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4505","reference_id":"RHSA-2026:4505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4506","reference_id":"RHSA-2026:4506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4509","reference_id":"RHSA-2026:4509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4515","reference_id":"RHSA-2026:4515","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4516","reference_id":"RHSA-2026:4516","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4516"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4518","reference_id":"RHSA-2026:4518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4524","reference_id":"RHSA-2026:4524","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4524"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4528","reference_id":"RHSA-2026:4528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4528"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4544","reference_id":"RHSA-2026:4544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4546","reference_id":"RHSA-2026:4546","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4546"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4547","reference_id":"RHSA-2026:4547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4548","reference_id":"RHSA-2026:4548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4943","reference_id":"RHSA-2026:4943","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8756","reference_id":"RHSA-2026:8756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8756"},{"reference_url":"https://usn.ubuntu.com/8072-1/","reference_id":"USN-8072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8072-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/475682?format=json","purl":"pkg:apk/alpine/postgresql16@16.12-r0?arch=loongarch64&distroversion=v3.22&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql16@16.12-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main"},{"url":"http://public2.vulnerablecode.io/api/packages/988629?format=json","purl":"pkg:apk/alpine/postgresql16@16.13-r0?arch=loongarch64&distroversion=v3.22&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql16@16.13-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main"}],"aliases":["CVE-2026-2006"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b13k-m1w4-1faz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3493?format=json","vulnerability_id":"VCID-npaz-u5a8-17bs","summary":"PostgreSQL pg_trgm heap buffer overflow writes pattern onto server memorymore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2007.json","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2007.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2007","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05248","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05241","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05246","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.053","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05273","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05298","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05332","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05354","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0531","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05322","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05744","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05666","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05701","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05737","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2007"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2026-2007/","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H']"},{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T14:18:10Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2026-2007/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439320","reference_id":"2439320","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439320"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8756","reference_id":"RHSA-2026:8756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8756"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/475682?format=json","purl":"pkg:apk/alpine/postgresql16@16.12-r0?arch=loongarch64&distroversion=v3.22&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql16@16.12-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main"},{"url":"http://public2.vulnerablecode.io/api/packages/988629?format=json","purl":"pkg:apk/alpine/postgresql16@16.13-r0?arch=loongarch64&distroversion=v3.22&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql16@16.13-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main"}],"aliases":["CVE-2026-2007"],"risk_score":3.7,"exploitability":"0.5","weighted_severity":"7.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-npaz-u5a8-17bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3496?format=json","vulnerability_id":"VCID-ucu8-nb95-hfca","summary":"PostgreSQL intarray missing validation of type of input to selectivity estimator executes arbitrary codemore details","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2004.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2004.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2004","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14715","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14921","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14707","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1481","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14998","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14802","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14891","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14942","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14869","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14907","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18428","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1859","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18483","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1847","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-2004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2004"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/","reference_id":"","reference_type":"","scores":[],"url":"https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/"},{"reference_url":"https://www.postgresql.org/support/security/CVE-2026-2004/","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T04:56:33Z/"}],"url":"https://www.postgresql.org/support/security/CVE-2026-2004/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439325","reference_id":"2439325","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2439325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3730","reference_id":"RHSA-2026:3730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3887","reference_id":"RHSA-2026:3887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3896","reference_id":"RHSA-2026:3896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3896"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4024","reference_id":"RHSA-2026:4024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4059","reference_id":"RHSA-2026:4059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4059"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4063","reference_id":"RHSA-2026:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4064","reference_id":"RHSA-2026:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4074","reference_id":"RHSA-2026:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4075","reference_id":"RHSA-2026:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4110","reference_id":"RHSA-2026:4110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4254","reference_id":"RHSA-2026:4254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4441","reference_id":"RHSA-2026:4441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4475","reference_id":"RHSA-2026:4475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4504","reference_id":"RHSA-2026:4504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4505","reference_id":"RHSA-2026:4505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4506","reference_id":"RHSA-2026:4506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4509","reference_id":"RHSA-2026:4509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4515","reference_id":"RHSA-2026:4515","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4516","reference_id":"RHSA-2026:4516","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4516"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4518","reference_id":"RHSA-2026:4518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4524","reference_id":"RHSA-2026:4524","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4524"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4528","reference_id":"RHSA-2026:4528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4528"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4544","reference_id":"RHSA-2026:4544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4546","reference_id":"RHSA-2026:4546","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4546"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4547","reference_id":"RHSA-2026:4547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4548","reference_id":"RHSA-2026:4548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4943","reference_id":"RHSA-2026:4943","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8756","reference_id":"RHSA-2026:8756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8756"},{"reference_url":"https://usn.ubuntu.com/8072-1/","reference_id":"USN-8072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8072-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/475682?format=json","purl":"pkg:apk/alpine/postgresql16@16.12-r0?arch=loongarch64&distroversion=v3.22&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql16@16.12-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main"}],"aliases":["CVE-2026-2004"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ucu8-nb95-hfca"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql16@16.12-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main"}