<td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063">CVE-2014-0063</a></td>
<td class="colMid">9.3, 9.2, 9.1, 9.0, 8.4</td>
<td class="colMid">9.3.3, 9.2.7, 9.1.12, 9.0.16, 8.4.20</td>
- <td class="colMid">core server, contrib</td>
+ <td class="colMid">core server, ECPG</td>
<td class="colMid">C</td>
- <td class="colLast">Potential buffer overruns due to integer overflow in size calculations. <a href="http://wiki.postgresql.org/wiki/20140220securityrelease">Details</a></td>
+ <td class="colLast">Potential buffer overruns in datetime input/output. <a href="http://wiki.postgresql.org/wiki/20140220securityrelease">Details</a></td>
</tr>
<tr valign="top">
<td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064">CVE-2014-0064</a></td>
<td class="colMid">9.3, 9.2, 9.1, 9.0, 8.4</td>
<td class="colMid">9.3.3, 9.2.7, 9.1.12, 9.0.16, 8.4.20</td>
- <td class="colMid">core server, ECPG</td>
+ <td class="colMid">core server, contrib</td>
<td class="colMid">C</td>
- <td class="colLast">Potential buffer overruns in datetime input/output. <a href="http://wiki.postgresql.org/wiki/20140220securityrelease">Details</a></td>
+ <td class="colLast">Potential buffer overruns due to integer overflow in size calculations. <a href="http://wiki.postgresql.org/wiki/20140220securityrelease">Details</a></td>
</tr>
<tr valign="top">