Логотип exploitDog
bind:"CVE-2024-10978" OR bind:"CVE-2024-10976" OR bind:"CVE-2024-10979"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-10978" OR bind:"CVE-2024-10976" OR bind:"CVE-2024-10979"

Количество 50

Количество 50

ubuntu логотип

CVE-2024-10979

7 месяцев назад

Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2024-10979

7 месяцев назад

Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2024-10979

7 месяцев назад

Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

CVSS3: 8.8
EPSS: Низкий
msrc логотип

CVE-2024-10979

7 месяцев назад

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2024-10979

7 месяцев назад

Incorrect control of environment variables in PostgreSQL PL/Perl allow ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-9cv8-8vgq-fg45

7 месяцев назад

Incomplete tracking in PostgreSQL of tables with row security allows a reused query to view or change different rows from those intended. CVE-2023-2455 and CVE-2016-2193 fixed most interaction between row security and user ID changes. They missed cases where a subquery, WITH query, security invoker view, or SQL-language function references a table with a row-level security policy. This has the same consequences as the two earlier CVEs. That is to say, it leads to potentially incorrect policies being applied in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy. ...

CVSS3: 4.2
EPSS: Низкий
fstec логотип

BDU:2024-09684

7 месяцев назад

Уязвимость политики безопасности таблиц с защитой строк CREATE POLICY системы управления базами данных PostgreSQL, позволяющая нарушителю выполнить произвольные команды

CVSS3: 4.2
EPSS: Низкий
github логотип

GHSA-2r9h-x757-8j9q

7 месяцев назад

Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

CVSS3: 8.8
EPSS: Низкий
oracle-oval логотип

ELSA-2024-10882

6 месяцев назад

ELSA-2024-10882: postgresql security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2024-09679

7 месяцев назад

Уязвимость переменных среды PL/Perl системы управления базами данных PostgreSQL, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-10979

Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

CVSS3: 8.8
2%
Низкий
7 месяцев назад
redhat логотип
CVE-2024-10979

Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

CVSS3: 8.8
2%
Низкий
7 месяцев назад
nvd логотип
CVE-2024-10979

Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

CVSS3: 8.8
2%
Низкий
7 месяцев назад
msrc логотип
CVSS3: 8.8
2%
Низкий
7 месяцев назад
debian логотип
CVE-2024-10979

Incorrect control of environment variables in PostgreSQL PL/Perl allow ...

CVSS3: 8.8
2%
Низкий
7 месяцев назад
github логотип
GHSA-9cv8-8vgq-fg45

Incomplete tracking in PostgreSQL of tables with row security allows a reused query to view or change different rows from those intended. CVE-2023-2455 and CVE-2016-2193 fixed most interaction between row security and user ID changes. They missed cases where a subquery, WITH query, security invoker view, or SQL-language function references a table with a row-level security policy. This has the same consequences as the two earlier CVEs. That is to say, it leads to potentially incorrect policies being applied in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy. ...

CVSS3: 4.2
0%
Низкий
7 месяцев назад
fstec логотип
BDU:2024-09684

Уязвимость политики безопасности таблиц с защитой строк CREATE POLICY системы управления базами данных PostgreSQL, позволяющая нарушителю выполнить произвольные команды

CVSS3: 4.2
0%
Низкий
7 месяцев назад
github логотип
GHSA-2r9h-x757-8j9q

Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

CVSS3: 8.8
2%
Низкий
7 месяцев назад
oracle-oval логотип
ELSA-2024-10882

ELSA-2024-10882: postgresql security update (IMPORTANT)

6 месяцев назад
fstec логотип
BDU:2024-09679

Уязвимость переменных среды PL/Perl системы управления базами данных PostgreSQL, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
2%
Низкий
7 месяцев назад

Уязвимостей на страницу