Количество 28
Количество 28

CVE-2022-2625
A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.

CVE-2022-2625
A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.

CVE-2022-2625
A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.

CVE-2022-2625
CVE-2022-2625
A vulnerability was found in PostgreSQL. This attack requires permissi ...

SUSE-SU-2022:3269-1
Security update for postgresql14

SUSE-SU-2022:3193-1
Security update for postgresql12

SUSE-SU-2022:2989-2
Security update for postgresql14

SUSE-SU-2022:2989-1
Security update for postgresql14

SUSE-SU-2022:2988-1
Security update for postgresql12

SUSE-SU-2022:2987-1
Security update for postgresql13

SUSE-SU-2022:2946-1
Security update for postgresql10

SUSE-SU-2022:2914-1
Security update for postgresql10

SUSE-SU-2022:2912-1
Security update for postgresql13

RLSA-2023:0113
Moderate: postgresql:10 security update

RLSA-2022:7128
Moderate: postgresql:12 security update
GHSA-m7mv-m566-78j6
A vulnerability found in postgresql. On this security issue an attack requires permission to create non-temporary objects in at least one schema, ability to lure or wait for an administrator to create or update an affected extension in that schema, and ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, the attacker can run arbitrary code as the victim role, which may be a superuser. Known-affected extensions include both PostgreSQL-bundled and non-bundled extensions. PostgreSQL blocks this attack in the core server, so there's no need to modify individual extensions.
ELSA-2023-0113
ELSA-2023-0113: postgresql:10 security update (MODERATE)
ELSA-2022-7128
ELSA-2022-7128: postgresql:12 security update (MODERATE)

BDU:2022-04971
Уязвимость системы управления базами данных PostgreSQL, связанная с ошибками при использовании команд OR расширениями, позволяющая нарушителю повысить свои привилегии и заменить произвольные объекты в базе данных
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2022-2625 A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser. | CVSS3: 8 | 1% Низкий | почти 3 года назад |
![]() | CVE-2022-2625 A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser. | CVSS3: 7.1 | 1% Низкий | почти 3 года назад |
![]() | CVE-2022-2625 A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser. | CVSS3: 8 | 1% Низкий | почти 3 года назад |
![]() | CVSS3: 8 | 1% Низкий | почти 3 года назад | |
CVE-2022-2625 A vulnerability was found in PostgreSQL. This attack requires permissi ... | CVSS3: 8 | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:3269-1 Security update for postgresql14 | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:3193-1 Security update for postgresql12 | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:2989-2 Security update for postgresql14 | 1% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:2989-1 Security update for postgresql14 | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:2988-1 Security update for postgresql12 | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:2987-1 Security update for postgresql13 | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:2946-1 Security update for postgresql10 | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:2914-1 Security update for postgresql10 | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:2912-1 Security update for postgresql13 | 1% Низкий | почти 3 года назад | |
![]() | RLSA-2023:0113 Moderate: postgresql:10 security update | 1% Низкий | больше 2 лет назад | |
![]() | RLSA-2022:7128 Moderate: postgresql:12 security update | 1% Низкий | больше 2 лет назад | |
GHSA-m7mv-m566-78j6 A vulnerability found in postgresql. On this security issue an attack requires permission to create non-temporary objects in at least one schema, ability to lure or wait for an administrator to create or update an affected extension in that schema, and ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, the attacker can run arbitrary code as the victim role, which may be a superuser. Known-affected extensions include both PostgreSQL-bundled and non-bundled extensions. PostgreSQL blocks this attack in the core server, so there's no need to modify individual extensions. | CVSS3: 8 | 1% Низкий | почти 3 года назад | |
ELSA-2023-0113 ELSA-2023-0113: postgresql:10 security update (MODERATE) | больше 2 лет назад | |||
ELSA-2022-7128 ELSA-2022-7128: postgresql:12 security update (MODERATE) | больше 2 лет назад | |||
![]() | BDU:2022-04971 Уязвимость системы управления базами данных PostgreSQL, связанная с ошибками при использовании команд OR расширениями, позволяющая нарушителю повысить свои привилегии и заменить произвольные объекты в базе данных | CVSS3: 8 | 1% Низкий | почти 3 года назад |
Уязвимостей на страницу