Количество 56
Количество 56
SUSE-SU-2024:4099-1
Security update for postgresql12
SUSE-SU-2024:4098-1
Security update for postgresql15
SUSE-SU-2024:4097-1
Security update for postgresql12
SUSE-SU-2024:4096-1
Security update for postgresql14
SUSE-SU-2024:4095-1
Security update for postgresql15
SUSE-SU-2024:4063-1
Security update for postgresql, postgresql16, postgresql17
SUSE-SU-2024:4052-1
Security update for postgresql, postgresql16, postgresql17
ROS-20241211-08
Множественные уязвимости postgresql15-1c
ROS-20241211-07
Множественные уязвимости postgresql-1c
ROS-20241211-06
Множественные уязвимости postgresql16
ROS-20241211-05
Множественные уязвимости postgresql15
ROS-20241211-04
Множественные уязвимости postgresql14
ROS-20241211-03
Множественные уязвимости postgresql13
ROS-20241211-02
Множественные уязвимости postgresql
CVE-2024-10979
Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
CVE-2024-10979
Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
CVE-2024-10979
Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
CVE-2024-10979
PostgreSQL PL/Perl environment variable changes execute arbitrary code
CVE-2024-10979
Incorrect control of environment variables in PostgreSQL PL/Perl allow ...
GHSA-2r9h-x757-8j9q
Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2024:4099-1 Security update for postgresql12 | около 1 года назад | |||
SUSE-SU-2024:4098-1 Security update for postgresql15 | около 1 года назад | |||
SUSE-SU-2024:4097-1 Security update for postgresql12 | около 1 года назад | |||
SUSE-SU-2024:4096-1 Security update for postgresql14 | около 1 года назад | |||
SUSE-SU-2024:4095-1 Security update for postgresql15 | около 1 года назад | |||
SUSE-SU-2024:4063-1 Security update for postgresql, postgresql16, postgresql17 | около 1 года назад | |||
SUSE-SU-2024:4052-1 Security update for postgresql, postgresql16, postgresql17 | около 1 года назад | |||
ROS-20241211-08 Множественные уязвимости postgresql15-1c | CVSS3: 8.8 | около 1 года назад | ||
ROS-20241211-07 Множественные уязвимости postgresql-1c | CVSS3: 8.8 | около 1 года назад | ||
ROS-20241211-06 Множественные уязвимости postgresql16 | CVSS3: 8.8 | около 1 года назад | ||
ROS-20241211-05 Множественные уязвимости postgresql15 | CVSS3: 8.8 | около 1 года назад | ||
ROS-20241211-04 Множественные уязвимости postgresql14 | CVSS3: 8.8 | около 1 года назад | ||
ROS-20241211-03 Множественные уязвимости postgresql13 | CVSS3: 8.8 | около 1 года назад | ||
ROS-20241211-02 Множественные уязвимости postgresql | CVSS3: 8.8 | около 1 года назад | ||
CVE-2024-10979 Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected. | CVSS3: 8.8 | 16% Средний | около 1 года назад | |
CVE-2024-10979 Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected. | CVSS3: 8.8 | 16% Средний | около 1 года назад | |
CVE-2024-10979 Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected. | CVSS3: 8.8 | 16% Средний | около 1 года назад | |
CVE-2024-10979 PostgreSQL PL/Perl environment variable changes execute arbitrary code | CVSS3: 8.8 | 16% Средний | около 1 года назад | |
CVE-2024-10979 Incorrect control of environment variables in PostgreSQL PL/Perl allow ... | CVSS3: 8.8 | 16% Средний | около 1 года назад | |
GHSA-2r9h-x757-8j9q Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected. | CVSS3: 8.8 | 16% Средний | около 1 года назад |
Уязвимостей на страницу