{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60468?format=json","vulnerability_id":"VCID-7ev2-5qge-uubs","summary":"Multiple vulnerabilities in the PostgreSQL server and client allow\n    remote attacker to conduct several attacks, including the execution of\n    arbitrary code and Denial of Service.","aliases":[{"alias":"CVE-2010-0442"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85361?format=json","purl":"pkg:ebuild/dev-db/postgresql-base@8.3.18","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-base@8.3.18"},{"url":"http://public2.vulnerablecode.io/api/packages/85362?format=json","purl":"pkg:ebuild/dev-db/postgresql-base@8.4.11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-base@8.4.11"},{"url":"http://public2.vulnerablecode.io/api/packages/85363?format=json","purl":"pkg:ebuild/dev-db/postgresql-base@9.0.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-base@9.0.5"},{"url":"http://public2.vulnerablecode.io/api/packages/85357?format=json","purl":"pkg:ebuild/dev-db/postgresql-server@8.3.18","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@8.3.18"},{"url":"http://public2.vulnerablecode.io/api/packages/85358?format=json","purl":"pkg:ebuild/dev-db/postgresql-server@8.4.11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@8.4.11"},{"url":"http://public2.vulnerablecode.io/api/packages/85359?format=json","purl":"pkg:ebuild/dev-db/postgresql-server@9.0.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9.0.5"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85355?format=json","purl":"pkg:ebuild/dev-db/postgresql@9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qsp-wvwq-j3f5"},{"vulnerability":"VCID-1uzm-h9m3-akge"},{"vulnerability":"VCID-666x-ret3-xufr"},{"vulnerability":"VCID-6dmy-t1qp-nuf3"},{"vulnerability":"VCID-6vh2-2sja-xba9"},{"vulnerability":"VCID-721k-9zdg-buhv"},{"vulnerability":"VCID-7ev2-5qge-uubs"},{"vulnerability":"VCID-7q99-jk4u-1fen"},{"vulnerability":"VCID-c8ch-zd9x-kufn"},{"vulnerability":"VCID-cffd-gdpc-uqeb"},{"vulnerability":"VCID-s8a2-wbb4-dyda"},{"vulnerability":"VCID-sxmd-5tzu-hkav"},{"vulnerability":"VCID-u5h4-4p6j-wbay"},{"vulnerability":"VCID-v69z-cmag-xfaf"},{"vulnerability":"VCID-xzhq-u9n2-c3gn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9"},{"url":"http://public2.vulnerablecode.io/api/packages/85360?format=json","purl":"pkg:ebuild/dev-db/postgresql-base@9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qsp-wvwq-j3f5"},{"vulnerability":"VCID-1uzm-h9m3-akge"},{"vulnerability":"VCID-666x-ret3-xufr"},{"vulnerability":"VCID-6dmy-t1qp-nuf3"},{"vulnerability":"VCID-6vh2-2sja-xba9"},{"vulnerability":"VCID-721k-9zdg-buhv"},{"vulnerability":"VCID-7ev2-5qge-uubs"},{"vulnerability":"VCID-7q99-jk4u-1fen"},{"vulnerability":"VCID-c8ch-zd9x-kufn"},{"vulnerability":"VCID-cffd-gdpc-uqeb"},{"vulnerability":"VCID-s8a2-wbb4-dyda"},{"vulnerability":"VCID-sxmd-5tzu-hkav"},{"vulnerability":"VCID-u5h4-4p6j-wbay"},{"vulnerability":"VCID-v69z-cmag-xfaf"},{"vulnerability":"VCID-xzhq-u9n2-c3gn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-base@9"},{"url":"http://public2.vulnerablecode.io/api/packages/85356?format=json","purl":"pkg:ebuild/dev-db/postgresql-server@9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qsp-wvwq-j3f5"},{"vulnerability":"VCID-1uzm-h9m3-akge"},{"vulnerability":"VCID-666x-ret3-xufr"},{"vulnerability":"VCID-6dmy-t1qp-nuf3"},{"vulnerability":"VCID-6vh2-2sja-xba9"},{"vulnerability":"VCID-721k-9zdg-buhv"},{"vulnerability":"VCID-7ev2-5qge-uubs"},{"vulnerability":"VCID-7q99-jk4u-1fen"},{"vulnerability":"VCID-c8ch-zd9x-kufn"},{"vulnerability":"VCID-cffd-gdpc-uqeb"},{"vulnerability":"VCID-s8a2-wbb4-dyda"},{"vulnerability":"VCID-sxmd-5tzu-hkav"},{"vulnerability":"VCID-u5h4-4p6j-wbay"},{"vulnerability":"VCID-v69z-cmag-xfaf"},{"vulnerability":"VCID-xzhq-u9n2-c3gn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql-server@9"},{"url":"http://public2.vulnerablecode.io/api/packages/127851?format=json","purl":"pkg:rpm/redhat/postgresql@7.4.29-1.el4_8?arch=1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1uzm-h9m3-akge"},{"vulnerability":"VCID-6vh2-2sja-xba9"},{"vulnerability":"VCID-7ev2-5qge-uubs"},{"vulnerability":"VCID-cffd-gdpc-uqeb"},{"vulnerability":"VCID-u5h4-4p6j-wbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/postgresql@7.4.29-1.el4_8%3Farch=1"},{"url":"http://public2.vulnerablecode.io/api/packages/127849?format=json","purl":"pkg:rpm/redhat/postgresql@8.1.21-1.el5_5?arch=1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1uzm-h9m3-akge"},{"vulnerability":"VCID-6vh2-2sja-xba9"},{"vulnerability":"VCID-7ev2-5qge-uubs"},{"vulnerability":"VCID-cffd-gdpc-uqeb"},{"vulnerability":"VCID-u5h4-4p6j-wbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/postgresql@8.1.21-1.el5_5%3Farch=1"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0442.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0442.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0442","reference_id":"","reference_type":"","scores":[{"value":"0.09972","scoring_system":"epss","scoring_elements":"0.93069","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09972","scoring_system":"epss","scoring_elements":"0.93084","published_at":"2026-05-07T12:55:00Z"},{"value":"0.09972","scoring_system":"epss","scoring_elements":"0.93094","published_at":"2026-05-09T12:55:00Z"},{"value":"0.09972","scoring_system":"epss","scoring_elements":"0.93097","published_at":"2026-05-11T12:55:00Z"},{"value":"0.09972","scoring_system":"epss","scoring_elements":"0.93104","published_at":"2026-05-12T12:55:00Z"},{"value":"0.09972","scoring_system":"epss","scoring_elements":"0.93126","published_at":"2026-05-14T12:55:00Z"},{"value":"0.09972","scoring_system":"epss","scoring_elements":"0.93131","published_at":"2026-05-15T12:55:00Z"},{"value":"0.13526","scoring_system":"epss","scoring_elements":"0.94236","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13526","scoring_system":"epss","scoring_elements":"0.9418","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13526","scoring_system":"epss","scoring_elements":"0.94245","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13526","scoring_system":"epss","scoring_elements":"0.94241","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13526","scoring_system":"epss","scoring_elements":"0.94189","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13526","scoring_system":"epss","scoring_elements":"0.94201","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13526","scoring_system":"epss","scoring_elements":"0.94203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13526","scoring_system":"epss","scoring_elements":"0.94212","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13526","scoring_system":"epss","scoring_elements":"0.94216","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13526","scoring_system":"epss","scoring_elements":"0.94221","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0442"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=559259","reference_id":"559259","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=559259"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33571.txt","reference_id":"CVE-2010-0442;OSVDB-62129","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33571.txt"},{"reference_url":"https://www.securityfocus.com/bid/37973/info","reference_id":"CVE-2010-0442;OSVDB-62129","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/37973/info"},{"reference_url":"https://security.gentoo.org/glsa/201110-22","reference_id":"GLSA-201110-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201110-22"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0427","reference_id":"RHSA-2010:0427","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0428","reference_id":"RHSA-2010:0428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0429","reference_id":"RHSA-2010:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0429"},{"reference_url":"https://usn.ubuntu.com/933-1/","reference_id":"USN-933-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/933-1/"}],"weaknesses":[],"exploits":[{"date_added":"2010-01-27","description":"PostgreSQL - 'bitsubstr' Buffer Overflow","required_action":null,"due_date":null,"notes":null,"known_ransomware_campaign_use":true,"source_date_published":"2010-01-27","exploit_type":"dos","platform":"linux","source_date_updated":"2014-05-29","data_source":"Exploit-DB","source_url":"https://www.securityfocus.com/bid/37973/info"}],"severity_range_score":null,"exploitability":"2.0","weighted_severity":"0.1","risk_score":0.2,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ev2-5qge-uubs"}