This might be proprietary software.
|2020-03-17||CVE-2020-1720||A flaw was found in PostgreSQL's "ALTER ... DEPENDS ON EXTENSION", where sub-commands did not perform authorization checks. An authenticated attacker could use this flaw in certain configurations to perform drop objects such as function, triggers, et al., leading to database corruption. This issue affects PostgreSQL versions before 12.2, before 11.7, before 10.12 and before 9.6.17.||Postgresql, Decision_manager, Enterprise_linux, Software_collections, Virtualization||N/A|
|2020-02-20||CVE-2014-4650||The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.||Python, Enterprise_linux, Software_collections||N/A|
|2019-11-05||CVE-2013-5123||The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.||Debian_linux, Fedora, Pip, Openshift, Software_collections, Virtualenv||N/A|
|2016-04-13||CVE-2015-7545||The (1) git-remote-ext and (2) unspecified other remote helper programs in Git before 2.3.10, 2.4.x before 2.4.10, 2.5.x before 2.5.4, and 2.6.x before 2.6.1 do not properly restrict the allowed protocols, which might allow remote attackers to execute arbitrary code via a URL in a (a) .gitmodules file or (b) unknown other sources in a submodule.||Ubuntu_linux, Git, Opensuse, Software_collections||9.8|