Логотип exploitDog
product: "postgresql"
Консоль
Логотип exploitDog

exploitDog

product: "postgresql"
PostgreSQL

PostgreSQLсвободная объектно-реляционная система управления базами данных.

Релизный цикл, информация об уязвимостях

Продукт: PostgreSQL
Вендор: PostgreSQL

График релизов

141516171820212022202320242025202620272028202920302031

Недавние уязвимости PostgreSQL

Количество 1 017

rocky логотип

RLSA-2022:4771

почти 4 года назад

Important: postgresql security update

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1874-1

почти 4 года назад

Security update for postgresql14

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1869-1

почти 4 года назад

Security update for postgresql12

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1835-1

почти 4 года назад

Security update for postgresql13

EPSS: Низкий
github логотип

GHSA-fr87-j862-8rwm

почти 4 года назад

A flaw was found in postgresql. Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-f47v-jjrp-x56x

почти 4 года назад

A flaw was found in postgresql. Using an UPDATE ... RETURNING command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-8rj6-p58w-wpr2

почти 4 года назад

A flaw was found in postgresql in versions before 13.3, before 12.7, before 11.12, before 10.17 and before 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-6434-33f9-3qqj

почти 4 года назад

A vulnerability was found in postgresql versions 11.x prior to 11.3. The Windows installer for EnterpriseDB-supplied PostgreSQL does not lock down the ACL of the binary installation directory or the ACL of the data directory; it keeps the inherited ACL. In the default configuration, this allows a local attacker to read arbitrary data directory files, essentially bypassing database-imposed read access limitations. In plausible non-default configurations, an attacker having both an unprivileged Windows account and an unprivileged PostgreSQL account can cause the PostgreSQL service account to execute arbitrary code.

EPSS: Низкий
github логотип

GHSA-q78v-pr3r-qpf7

почти 4 года назад

A vulnerability was found in postgresql versions 11.x prior to 11.3. The Windows installer for BigSQL-supplied PostgreSQL does not lock down the ACL of the binary installation directory or the ACL of the data directory; it keeps the inherited ACL. In the default configuration, an attacker having both an unprivileged Windows account and an unprivileged PostgreSQL account can cause the PostgreSQL service account to execute arbitrary code. An attacker having only the unprivileged Windows account can read arbitrary data directory files, essentially bypassing database-imposed read access limitations. An attacker having only the unprivileged Windows account can also delete certain data directory files.

EPSS: Низкий
github логотип

GHSA-r2p6-249c-3h56

почти 4 года назад

The Windows installer for PostgreSQL 9.5 - 12 invokes system-provided executables that do not have fully-qualified paths. Executables in the directory where the installer loads or the current working directory take precedence over the intended executables. An attacker having permission to add files into one of those directories can use this to execute arbitrary code with the installer's administrative rights.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
rocky логотип
RLSA-2022:4771

Important: postgresql security update

2%
Низкий
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2022:1874-1

Security update for postgresql14

2%
Низкий
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2022:1869-1

Security update for postgresql12

2%
Низкий
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2022:1835-1

Security update for postgresql13

2%
Низкий
почти 4 года назад
github логотип
GHSA-fr87-j862-8rwm

A flaw was found in postgresql. Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality.

CVSS3: 6.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-f47v-jjrp-x56x

A flaw was found in postgresql. Using an UPDATE ... RETURNING command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality.

CVSS3: 6.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-8rj6-p58w-wpr2

A flaw was found in postgresql in versions before 13.3, before 12.7, before 11.12, before 10.17 and before 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 8.8
0%
Низкий
почти 4 года назад
github логотип
GHSA-6434-33f9-3qqj

A vulnerability was found in postgresql versions 11.x prior to 11.3. The Windows installer for EnterpriseDB-supplied PostgreSQL does not lock down the ACL of the binary installation directory or the ACL of the data directory; it keeps the inherited ACL. In the default configuration, this allows a local attacker to read arbitrary data directory files, essentially bypassing database-imposed read access limitations. In plausible non-default configurations, an attacker having both an unprivileged Windows account and an unprivileged PostgreSQL account can cause the PostgreSQL service account to execute arbitrary code.

0%
Низкий
почти 4 года назад
github логотип
GHSA-q78v-pr3r-qpf7

A vulnerability was found in postgresql versions 11.x prior to 11.3. The Windows installer for BigSQL-supplied PostgreSQL does not lock down the ACL of the binary installation directory or the ACL of the data directory; it keeps the inherited ACL. In the default configuration, an attacker having both an unprivileged Windows account and an unprivileged PostgreSQL account can cause the PostgreSQL service account to execute arbitrary code. An attacker having only the unprivileged Windows account can read arbitrary data directory files, essentially bypassing database-imposed read access limitations. An attacker having only the unprivileged Windows account can also delete certain data directory files.

0%
Низкий
почти 4 года назад
github логотип
GHSA-r2p6-249c-3h56

The Windows installer for PostgreSQL 9.5 - 12 invokes system-provided executables that do not have fully-qualified paths. Executables in the directory where the installer loads or the current working directory take precedence over the intended executables. An attacker having permission to add files into one of those directories can use this to execute arbitrary code with the installer's administrative rights.

0%
Низкий
почти 4 года назад

Уязвимостей на страницу


Поделиться