Lookup for vulnerable packages by Package URL.

GET /api/packages/72082?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/72082?format=api",
    "purl": "pkg:ebuild/dev-db/postgresql-server@9.1.5",
    "type": "ebuild",
    "namespace": "dev-db",
    "name": "postgresql-server",
    "version": "9.1.5",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "9.3.3",
    "latest_non_vulnerable_version": "9.3.3",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3618?format=api",
            "vulnerability_id": "VCID-2nve-471m-17h6",
            "summary": "SECURITY DEFINER and SET attributes on procedural call handlers are not ignored and can be used to crash the servermore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2655.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2655.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2655",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80425",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80432",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80453",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80442",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80472",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80481",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.805",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80485",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80478",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80506",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80507",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8051",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80536",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80539",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80557",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80576",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80598",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80617",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80612",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8063",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8067",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2655"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2012-2655/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/support/security/CVE-2012-2655/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=825995",
                    "reference_id": "825995",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=825995"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-24",
                    "reference_id": "GLSA-201209-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-24"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1037",
                    "reference_id": "RHSA-2012:1037",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1037"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1461-1/",
                    "reference_id": "USN-1461-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1461-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/72082?format=api",
                    "purl": "pkg:ebuild/dev-db/postgresql-server@9.1.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.1.5"
                }
            ],
            "aliases": [
                "CVE-2012-2655"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2nve-471m-17h6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3619?format=api",
            "vulnerability_id": "VCID-35a3-5eq3-8bep",
            "summary": "Passwords containing the byte 0x80 passed to the crypt() function in pgcrypto are incorrectly truncated if DES encryption was usedmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2143.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2143.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2143",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86493",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86503",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86522",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86521",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86541",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8655",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86565",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86562",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86555",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86569",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86574",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86567",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86585",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86594",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86593",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86614",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86632",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86649",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86645",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86657",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.02995",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86689",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2143"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2012-2143/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/support/security/CVE-2012-2143/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=816956",
                    "reference_id": "816956",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=816956"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-03",
                    "reference_id": "GLSA-201209-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-24",
                    "reference_id": "GLSA-201209-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-24"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1036",
                    "reference_id": "RHSA-2012:1036",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1036"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1037",
                    "reference_id": "RHSA-2012:1037",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1037"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1046",
                    "reference_id": "RHSA-2012:1046",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1047",
                    "reference_id": "RHSA-2012:1047",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1047"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1461-1/",
                    "reference_id": "USN-1461-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1461-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1481-1/",
                    "reference_id": "USN-1481-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1481-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/72082?format=api",
                    "purl": "pkg:ebuild/dev-db/postgresql-server@9.1.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.1.5"
                }
            ],
            "aliases": [
                "CVE-2012-2143"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-35a3-5eq3-8bep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3616?format=api",
            "vulnerability_id": "VCID-7jb6-q4x1-cfbw",
            "summary": "xml_parse() DTD validation can be used to read arbitrary filesmore details",
            "references": [
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1263.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3489.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3489.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76604",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76554",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76373",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76376",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76406",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76388",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7642",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76434",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76459",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76437",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76432",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76472",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76477",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76462",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76496",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76503",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76515",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76502",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76531",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76549",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76537",
                            "published_at": "2026-05-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3489"
                },
                {
                    "reference_url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_postgresql2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_postgresql2"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50635",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50635"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50718"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50859",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50859"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50946"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2012-3489/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/support/security/CVE-2012-3489/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2012/dsa-2534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2012/dsa-2534"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:139",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:139"
                },
                {
                    "reference_url": "http://www.postgresql.org/about/news/1407/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.postgresql.org/about/news/1407/"
                },
                {
                    "reference_url": "http://www.postgresql.org/docs/8.3/static/release-8-3-20.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.postgresql.org/docs/8.3/static/release-8-3-20.html"
                },
                {
                    "reference_url": "http://www.postgresql.org/docs/8.4/static/release-8-4-13.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.postgresql.org/docs/8.4/static/release-8-4-13.html"
                },
                {
                    "reference_url": "http://www.postgresql.org/docs/9.0/static/release-9-0-9.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.postgresql.org/docs/9.0/static/release-9-0-9.html"
                },
                {
                    "reference_url": "http://www.postgresql.org/docs/9.1/static/release-9-1-5.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.postgresql.org/docs/9.1/static/release-9-1-5.html"
                },
                {
                    "reference_url": "http://www.postgresql.org/support/security/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.postgresql.org/support/security/"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/55074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/55074"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1542-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1542-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=849173",
                    "reference_id": "849173",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849173"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3489",
                    "reference_id": "CVE-2012-3489",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3489"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-24",
                    "reference_id": "GLSA-201209-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-24"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1263",
                    "reference_id": "RHSA-2012:1263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1263"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1542-1/",
                    "reference_id": "USN-1542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1542-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/72082?format=api",
                    "purl": "pkg:ebuild/dev-db/postgresql-server@9.1.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.1.5"
                }
            ],
            "aliases": [
                "CVE-2012-3489"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7jb6-q4x1-cfbw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3622?format=api",
            "vulnerability_id": "VCID-811b-x31n-tfch",
            "summary": "Permissions on a function called by a trigger are not properly checked.more details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0866.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0866.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0866",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00905",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75678",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00905",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75681",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00905",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75711",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77655",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77683",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77688",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77715",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77698",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77697",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77734",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77733",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77727",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77758",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77768",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77783",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77795",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77825",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77844",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77832",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77851",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77895",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0866"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2012-0866/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/support/security/CVE-2012-0866/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=797222",
                    "reference_id": "797222",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=797222"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-24",
                    "reference_id": "GLSA-201209-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-24"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0677",
                    "reference_id": "RHSA-2012:0677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0678",
                    "reference_id": "RHSA-2012:0678",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0678"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1378-1/",
                    "reference_id": "USN-1378-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1378-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/72082?format=api",
                    "purl": "pkg:ebuild/dev-db/postgresql-server@9.1.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.1.5"
                }
            ],
            "aliases": [
                "CVE-2012-0866"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-811b-x31n-tfch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3617?format=api",
            "vulnerability_id": "VCID-bdq4-br3j-7kb8",
            "summary": "contrib/xml2's xslt_process() can be used to read and write arbitrary filesmore details",
            "references": [
                {
                    "reference_url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1263.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1263.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1264.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1264.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3488.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3488.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41825",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42014",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42074",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42102",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42039",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42091",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42103",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42126",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42089",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42064",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42115",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42088",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42017",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41957",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41952",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41868",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41727",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41794",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41812",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41725",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41751",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3488"
                },
                {
                    "reference_url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_postgresql2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_postgresql2"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50635",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50635"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50636"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50718"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50859",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50859"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50946"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2012-3488/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/support/security/CVE-2012-3488/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2012/dsa-2534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2012/dsa-2534"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:139",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:139"
                },
                {
                    "reference_url": "http://www.postgresql.org/about/news/1407/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.postgresql.org/about/news/1407/"
                },
                {
                    "reference_url": "http://www.postgresql.org/docs/8.3/static/release-8-3-20.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.postgresql.org/docs/8.3/static/release-8-3-20.html"
                },
                {
                    "reference_url": "http://www.postgresql.org/docs/8.4/static/release-8-4-13.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.postgresql.org/docs/8.4/static/release-8-4-13.html"
                },
                {
                    "reference_url": "http://www.postgresql.org/docs/9.0/static/release-9-0-9.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.postgresql.org/docs/9.0/static/release-9-0-9.html"
                },
                {
                    "reference_url": "http://www.postgresql.org/docs/9.1/static/release-9-1-5.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.postgresql.org/docs/9.1/static/release-9-1-5.html"
                },
                {
                    "reference_url": "http://www.postgresql.org/support/security/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.postgresql.org/support/security/"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/55072",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/55072"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1542-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1542-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=849172",
                    "reference_id": "849172",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849172"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.14:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.14:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.14:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.15:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.15:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.15:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.16:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.16:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.16:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.17:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.17:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.17:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.18:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.18:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.18:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.19:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.19:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.19:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3488",
                    "reference_id": "CVE-2012-3488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3488"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-24",
                    "reference_id": "GLSA-201209-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-24"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1263",
                    "reference_id": "RHSA-2012:1263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1263"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1264",
                    "reference_id": "RHSA-2012:1264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1264"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1542-1/",
                    "reference_id": "USN-1542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1542-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/72082?format=api",
                    "purl": "pkg:ebuild/dev-db/postgresql-server@9.1.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.1.5"
                }
            ],
            "aliases": [
                "CVE-2012-3488"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bdq4-br3j-7kb8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3620?format=api",
            "vulnerability_id": "VCID-quqr-bg9k-7yb5",
            "summary": "Line breaks in object names can be exploited to execute arbitrary SQL when reloading a pg_dump file.more details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0868.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0868.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88583",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88592",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88609",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88943",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88961",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88966",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88978",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88973",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88971",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88984",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88983",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88995",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89003",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.04372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8901",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.04372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89024",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.04372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89035",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.04372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89029",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.04372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89039",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.04372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89057",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0868"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2012-0868/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/support/security/CVE-2012-0868/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=797917",
                    "reference_id": "797917",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=797917"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-24",
                    "reference_id": "GLSA-201209-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-24"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0677",
                    "reference_id": "RHSA-2012:0677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0678",
                    "reference_id": "RHSA-2012:0678",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0678"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1378-1/",
                    "reference_id": "USN-1378-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1378-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/72082?format=api",
                    "purl": "pkg:ebuild/dev-db/postgresql-server@9.1.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.1.5"
                }
            ],
            "aliases": [
                "CVE-2012-0868"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-quqr-bg9k-7yb5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3621?format=api",
            "vulnerability_id": "VCID-ux6m-dn6j-37dc",
            "summary": "SSL certificate name checks are truncated to 32 characters, allowing connection spoofing under some circumstances when using third party certificate authorities.more details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0867.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0867.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0867",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8327",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83219",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8322",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83236",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83036",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83061",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83069",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83084",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83078",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83074",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83112",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83113",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83116",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83139",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83146",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83153",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83177",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83199",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.02051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83813",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83828",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.838",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0867"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2012-0867/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/support/security/CVE-2012-0867/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=797915",
                    "reference_id": "797915",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=797915"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-24",
                    "reference_id": "GLSA-201209-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-24"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0678",
                    "reference_id": "RHSA-2012:0678",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0678"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1378-1/",
                    "reference_id": "USN-1378-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1378-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/72082?format=api",
                    "purl": "pkg:ebuild/dev-db/postgresql-server@9.1.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.1.5"
                }
            ],
            "aliases": [
                "CVE-2012-0867"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ux6m-dn6j-37dc"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.1.5"
}