Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/75972?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/75972?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.4.3", "type": "ebuild", "namespace": "dev-db", "name": "postgresql", "version": "9.4.3", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "9.4.9", "latest_non_vulnerable_version": "17.1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3547?format=api", "vulnerability_id": "VCID-1qap-rdxz-4uer", "summary": "pgcrypto has multiple error messages for decryption with an incorrect key.more details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3167.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3167.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3167", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.83026", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.82774", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.82955", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.82975", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.82989", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.8279", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.82804", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.82799", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.82825", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.82831", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.82847", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.82842", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.82838", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.82877", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.82876", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.82878", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.829", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.8291", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.82915", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01812", "scoring_system": "epss", "scoring_elements": "0.82935", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-942-937-9211-9116-and-9020-released-1587/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-942-937-9211-9116-and-9020-released-1587/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2015-3167/", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2015-3167/" }, { "reference_url": "http://ubuntu.com/usn/usn-2621-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-2621-1" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3269", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3269" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3270", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3270" }, { "reference_url": "http://www.postgresql.org/about/news/1587/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.postgresql.org/about/news/1587/" }, { "reference_url": "http://www.postgresql.org/docs/9.0/static/release-9-0-20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.postgresql.org/docs/9.0/static/release-9-0-20.html" }, { "reference_url": "http://www.postgresql.org/docs/9.1/static/release-9-1-16.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.postgresql.org/docs/9.1/static/release-9-1-16.html" }, { "reference_url": "http://www.postgresql.org/docs/9.2/static/release-9-2-11.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.postgresql.org/docs/9.2/static/release-9-2-11.html" }, { "reference_url": "http://www.postgresql.org/docs/9.3/static/release-9-3-7.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.postgresql.org/docs/9.3/static/release-9-3-7.html" }, { "reference_url": "http://www.postgresql.org/docs/9.4/static/release-9-4-2.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.postgresql.org/docs/9.4/static/release-9-4-2.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221541", "reference_id": "1221541", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221541" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3167", "reference_id": "CVE-2015-3167", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3167" }, { "reference_url": "https://security.gentoo.org/glsa/201507-20", "reference_id": "GLSA-201507-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1194", "reference_id": "RHSA-2015:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1195", "reference_id": "RHSA-2015:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1196", "reference_id": "RHSA-2015:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1196" }, { "reference_url": "https://usn.ubuntu.com/2621-1/", "reference_id": "USN-2621-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2621-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75972?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.3" } ], "aliases": [ "CVE-2015-3167" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1qap-rdxz-4uer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3548?format=api", "vulnerability_id": "VCID-625c-amyd-dybm", "summary": "Unanticipated errors from the standard library.more details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3166.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3166.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3166", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02185", "scoring_system": "epss", "scoring_elements": "0.84362", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02185", "scoring_system": "epss", "scoring_elements": "0.84299", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02185", "scoring_system": "epss", "scoring_elements": "0.84335", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02185", "scoring_system": "epss", "scoring_elements": "0.84356", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02185", "scoring_system": "epss", "scoring_elements": "0.84312", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02185", "scoring_system": "epss", "scoring_elements": "0.84332", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02825", "scoring_system": "epss", "scoring_elements": "0.86172", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05386", "scoring_system": "epss", "scoring_elements": "0.90198", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.05386", "scoring_system": "epss", "scoring_elements": "0.90181", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.05386", "scoring_system": "epss", "scoring_elements": "0.90176", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.05386", "scoring_system": "epss", "scoring_elements": "0.90185", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.05386", "scoring_system": "epss", "scoring_elements": "0.90122", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05386", "scoring_system": "epss", "scoring_elements": "0.90116", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05386", "scoring_system": "epss", "scoring_elements": "0.90133", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05386", "scoring_system": "epss", "scoring_elements": "0.90134", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05386", "scoring_system": "epss", "scoring_elements": "0.9013", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05386", "scoring_system": "epss", "scoring_elements": "0.90146", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05386", "scoring_system": "epss", "scoring_elements": "0.90145", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05386", "scoring_system": "epss", "scoring_elements": "0.90144", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05386", "scoring_system": "epss", "scoring_elements": "0.90155", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05386", "scoring_system": "epss", "scoring_elements": "0.9017", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-942-937-9211-9116-and-9020-released-1587/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-942-937-9211-9116-and-9020-released-1587/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2015-3166/", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L']" } ], "url": "https://www.postgresql.org/support/security/CVE-2015-3166/" }, { "reference_url": "http://ubuntu.com/usn/usn-2621-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ubuntu.com/usn/usn-2621-1" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3269", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3269" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3270", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3270" }, { "reference_url": "http://www.postgresql.org/about/news/1587/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.postgresql.org/about/news/1587/" }, { "reference_url": "http://www.postgresql.org/docs/9.0/static/release-9-0-20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.postgresql.org/docs/9.0/static/release-9-0-20.html" }, { "reference_url": "http://www.postgresql.org/docs/9.1/static/release-9-1-16.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.postgresql.org/docs/9.1/static/release-9-1-16.html" }, { "reference_url": "http://www.postgresql.org/docs/9.2/static/release-9-2-11.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.postgresql.org/docs/9.2/static/release-9-2-11.html" }, { "reference_url": "http://www.postgresql.org/docs/9.3/static/release-9-3-7.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.postgresql.org/docs/9.3/static/release-9-3-7.html" }, { "reference_url": "http://www.postgresql.org/docs/9.4/static/release-9-4-2.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.postgresql.org/docs/9.4/static/release-9-4-2.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221539", "reference_id": "1221539", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221539" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3166", "reference_id": "CVE-2015-3166", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3166" }, { "reference_url": "https://security.gentoo.org/glsa/201507-20", "reference_id": "GLSA-201507-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1194", "reference_id": "RHSA-2015:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1195", "reference_id": "RHSA-2015:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1196", "reference_id": "RHSA-2015:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1196" }, { "reference_url": "https://usn.ubuntu.com/2621-1/", "reference_id": "USN-2621-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2621-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75972?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.3" } ], "aliases": [ "CVE-2015-3166" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-625c-amyd-dybm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3550?format=api", "vulnerability_id": "VCID-a3sh-4t1e-tbh4", "summary": "An error in extended protocol message reading.more details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0244.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0244.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0244", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.78035", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77778", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77784", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77811", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77794", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77822", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77827", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77854", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77838", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77837", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77874", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77872", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77867", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77899", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77908", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77922", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77934", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77963", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.7798", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77971", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0108", "scoring_system": "epss", "scoring_elements": "0.77989", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-941-936-9210-9115-9019-released-1569/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-941-936-9210-9115-9019-released-1569/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2015-0244/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2015-0244/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188694", "reference_id": "1188694", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188694" }, { "reference_url": "https://security.gentoo.org/glsa/201507-20", "reference_id": "GLSA-201507-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0699", "reference_id": "RHSA-2015:0699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0750", "reference_id": "RHSA-2015:0750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0750" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0856", "reference_id": "RHSA-2015:0856", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0856" }, { "reference_url": "https://usn.ubuntu.com/2499-1/", "reference_id": "USN-2499-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2499-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75972?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.3" } ], "aliases": [ "CVE-2015-0244" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a3sh-4t1e-tbh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3551?format=api", "vulnerability_id": "VCID-f976-dd3s-fuc8", "summary": "Memory errors in functions in the pgcrypto extension.more details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0243.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0243.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0243", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06398", "scoring_system": "epss", "scoring_elements": "0.91122", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.06398", "scoring_system": "epss", "scoring_elements": "0.91077", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.06398", "scoring_system": "epss", "scoring_elements": "0.91092", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.06398", "scoring_system": "epss", "scoring_elements": "0.91105", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.06398", "scoring_system": "epss", "scoring_elements": "0.91103", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.06398", "scoring_system": "epss", "scoring_elements": "0.91111", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.06713", "scoring_system": "epss", "scoring_elements": "0.91246", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06713", "scoring_system": "epss", "scoring_elements": "0.91252", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06713", "scoring_system": "epss", "scoring_elements": "0.91256", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06713", "scoring_system": "epss", "scoring_elements": "0.91255", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06713", "scoring_system": "epss", "scoring_elements": "0.91279", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06713", "scoring_system": "epss", "scoring_elements": "0.91282", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06713", "scoring_system": "epss", "scoring_elements": "0.91292", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06713", "scoring_system": "epss", "scoring_elements": "0.9129", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.06713", "scoring_system": "epss", "scoring_elements": "0.9128", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06713", "scoring_system": "epss", "scoring_elements": "0.91206", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06713", "scoring_system": "epss", "scoring_elements": "0.9121", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06713", "scoring_system": "epss", "scoring_elements": "0.91219", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06713", "scoring_system": "epss", "scoring_elements": "0.91226", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06713", "scoring_system": "epss", "scoring_elements": "0.91239", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0243" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-941-936-9210-9115-9019-released-1569/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-941-936-9210-9115-9019-released-1569/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2015-0243/", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2015-0243/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188689", "reference_id": "1188689", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188689" }, { "reference_url": "https://security.gentoo.org/glsa/201507-20", "reference_id": "GLSA-201507-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0699", "reference_id": "RHSA-2015:0699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0750", "reference_id": "RHSA-2015:0750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0750" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0856", "reference_id": "RHSA-2015:0856", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0856" }, { "reference_url": "https://usn.ubuntu.com/2499-1/", "reference_id": "USN-2499-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2499-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75972?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.3" } ], "aliases": [ "CVE-2015-0243" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f976-dd3s-fuc8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3552?format=api", "vulnerability_id": "VCID-k38h-5crc-u3hr", "summary": "Buffer overrun in replacement printf family of functions.more details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0242.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0242.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0242", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03211", "scoring_system": "epss", "scoring_elements": "0.87169", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.03211", "scoring_system": "epss", "scoring_elements": "0.87094", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03211", "scoring_system": "epss", "scoring_elements": "0.8711", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03211", "scoring_system": "epss", "scoring_elements": "0.87127", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.03211", "scoring_system": "epss", "scoring_elements": "0.87122", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.03211", "scoring_system": "epss", "scoring_elements": "0.87137", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.03377", "scoring_system": "epss", "scoring_elements": "0.87389", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03377", "scoring_system": "epss", "scoring_elements": "0.87383", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03377", "scoring_system": "epss", "scoring_elements": "0.87379", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03377", "scoring_system": "epss", "scoring_elements": "0.87394", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03377", "scoring_system": "epss", "scoring_elements": "0.87391", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03377", "scoring_system": "epss", "scoring_elements": "0.87408", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03377", "scoring_system": "epss", "scoring_elements": "0.87414", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03377", "scoring_system": "epss", "scoring_elements": "0.87415", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03377", "scoring_system": "epss", "scoring_elements": "0.87397", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03377", "scoring_system": "epss", "scoring_elements": "0.87325", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03377", "scoring_system": "epss", "scoring_elements": "0.87335", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03377", "scoring_system": "epss", "scoring_elements": "0.87351", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03377", "scoring_system": "epss", "scoring_elements": "0.87369", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03377", "scoring_system": "epss", "scoring_elements": "0.87376", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0242" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-941-936-9210-9115-9019-released-1569/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-941-936-9210-9115-9019-released-1569/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2015-0242/", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2015-0242/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188688", "reference_id": "1188688", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188688" }, { "reference_url": "https://security.gentoo.org/glsa/201507-20", "reference_id": "GLSA-201507-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-20" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75972?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.3" } ], "aliases": [ "CVE-2015-0242" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k38h-5crc-u3hr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3549?format=api", "vulnerability_id": "VCID-mebz-9qb7-5bd2", "summary": "Double \"free\" after authentication timeoutmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3165.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3165.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3165", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08329", "scoring_system": "epss", "scoring_elements": "0.92354", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.92906", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.92914", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.92918", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.92917", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.92925", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.9293", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.92935", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.92933", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.92934", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.92944", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.92952", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.92955", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.92956", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.92953", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.9296", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.92975", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.92987", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.9299", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.92997", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0971", "scoring_system": "epss", "scoring_elements": "0.92946", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-942-937-9211-9116-and-9020-released-1587/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-942-937-9211-9116-and-9020-released-1587/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2015-3165/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H']" } ], "url": "https://www.postgresql.org/support/security/CVE-2015-3165/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221537", "reference_id": "1221537", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221537" }, { "reference_url": "https://security.gentoo.org/glsa/201507-20", "reference_id": "GLSA-201507-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1194", "reference_id": "RHSA-2015:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1195", "reference_id": "RHSA-2015:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1196", "reference_id": "RHSA-2015:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1196" }, { "reference_url": "https://usn.ubuntu.com/2621-1/", "reference_id": "USN-2621-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2621-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75972?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.3" } ], "aliases": [ "CVE-2015-3165" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mebz-9qb7-5bd2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3553?format=api", "vulnerability_id": "VCID-raqj-ezua-skeb", "summary": "Buffer overruns in \"to_char\" functions.more details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0241.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0241.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0241", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06004", "scoring_system": "epss", "scoring_elements": "0.90787", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.06004", "scoring_system": "epss", "scoring_elements": "0.90735", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.06004", "scoring_system": "epss", "scoring_elements": "0.90754", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.06004", "scoring_system": "epss", "scoring_elements": "0.90767", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.06004", "scoring_system": "epss", "scoring_elements": "0.90765", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.06004", "scoring_system": "epss", "scoring_elements": "0.90774", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90948", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90957", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90958", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90981", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90993", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90991", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90988", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90979", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90906", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90921", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90931", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90942", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244" }, { "reference_url": "https://www.postgresql.org/about/news/postgresql-941-936-9210-9115-9019-released-1569/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/about/news/postgresql-941-936-9210-9115-9019-released-1569/" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2015-0241/", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2015-0241/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188684", "reference_id": "1188684", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188684" }, { "reference_url": "https://security.gentoo.org/glsa/201507-20", "reference_id": "GLSA-201507-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0699", "reference_id": "RHSA-2015:0699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0750", "reference_id": "RHSA-2015:0750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0750" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0856", "reference_id": "RHSA-2015:0856", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0856" }, { "reference_url": "https://usn.ubuntu.com/2499-1/", "reference_id": "USN-2499-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2499-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75972?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.3" } ], "aliases": [ "CVE-2015-0241" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-raqj-ezua-skeb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3554?format=api", "vulnerability_id": "VCID-zbj3-7xug-43f6", "summary": "Constraint violation errors can cause display of values in columns which the user would not normally have rights to see.more details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8161.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8161.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8161", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72499", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72272", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72279", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72298", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72274", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72313", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72325", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72348", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72331", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72319", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72361", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.7237", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72358", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72401", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.7241", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72407", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72398", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72427", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72453", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72416", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72443", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2014-8161/", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']" } ], "url": "https://www.postgresql.org/support/security/CVE-2014-8161/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182043", "reference_id": "1182043", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182043" }, { "reference_url": "https://security.gentoo.org/glsa/201507-20", "reference_id": "GLSA-201507-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0699", "reference_id": "RHSA-2015:0699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0750", "reference_id": "RHSA-2015:0750", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0750" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0856", "reference_id": "RHSA-2015:0856", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0856" }, { "reference_url": "https://usn.ubuntu.com/2499-1/", "reference_id": "USN-2499-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2499-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75972?format=api", "purl": "pkg:ebuild/dev-db/postgresql@9.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.3" } ], "aliases": [ "CVE-2014-8161" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zbj3-7xug-43f6" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.3" }