Логотип exploitDog
product: "postgresql"
Консоль
Логотип exploitDog

exploitDog

product: "postgresql"

Количество 984

Количество 984

github логотип

GHSA-wcfv-hw89-j2wx

больше 3 лет назад

The add_database function in objects.c in the pgbouncer pooler 1.5.2 for PostgreSQL allows remote attackers to cause a denial of service (daemon outage) via a long database name in a request.

EPSS: Низкий
github логотип

GHSA-vvfr-p62m-9frc

больше 3 лет назад

The postgresql-ocaml bindings 1.5.4, 1.7.0, and 1.12.1 for PostgreSQL libpq do not properly support the PQescapeStringConn function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings.

EPSS: Низкий
github логотип

GHSA-rf5r-cr88-cr97

почти 4 года назад

Generation of Error Message Containing Sensitive Information in postgresql

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-r822-pwxw-5qc9

больше 3 лет назад

Algorithmic complexity vulnerability in the regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (memory consumption) via a crafted "complex" regular expression with doubly-nested states.

EPSS: Низкий
github логотип

GHSA-r7p3-79xh-j7pg

больше 2 лет назад

Row security policies disregard user ID changes after inlining; PostgreSQL could permit incorrect policies to be applied in certain cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-jx3x-j983-74m3

больше 2 лет назад

IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-h86w-m5rm-xr33

больше 3 лет назад

Unescaped parameters in the PostgreSQL JDBC driver

EPSS: Низкий
github логотип

GHSA-h73g-3m4r-j2cr

больше 3 лет назад

In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.

CVSS3: 7
EPSS: Низкий
github логотип

GHSA-f47v-jjrp-x56x

больше 3 лет назад

A flaw was found in postgresql. Using an UPDATE ... RETURNING command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-9fff-w5w3-5x9g

больше 2 лет назад

schema_element defeats protective search_path changes; It was found that certain database calls in PostgreSQL could permit an authed attacker with elevated database-level privileges to execute arbitrary code.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-6rxj-38xv-j69g

больше 3 лет назад

The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.

EPSS: Низкий
github логотип

GHSA-66vv-jcch-hx6x

больше 3 лет назад

The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (backend crash) via an out-of-bounds backref number.

EPSS: Низкий
github логотип

GHSA-5vr6-jmmj-7xx7

больше 3 лет назад

The PL/php add-on 1.4 and earlier for PostgreSQL does not properly protect script execution by a different SQL user identity within the same session, which allows remote authenticated users to gain privileges via crafted script code in a SECURITY DEFINER function, a related issue to CVE-2010-3433.

EPSS: Низкий
github логотип

GHSA-467w-rrqc-395f

почти 4 года назад

When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-43rr-wcj9-h45w

почти 4 года назад

Incorrect Authorization in PostgreSQL

CVSS3: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2023-39417

больше 2 лет назад

IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2023-39417

больше 2 лет назад

IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-39417

больше 2 лет назад

IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-39417

больше 2 лет назад

IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in Po ...

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-32305

больше 2 лет назад

aiven-extras is a PostgreSQL extension. Versions prior to 1.1.9 contain a privilege escalation vulnerability, allowing elevation to superuser inside PostgreSQL databases that use the aiven-extras package. The vulnerability leverages missing schema qualifiers on privileged functions called by the aiven-extras extension. A low privileged user can create objects that collide with existing function names, which will then be executed instead. Exploiting this vulnerability could allow a low privileged user to acquire `superuser` privileges, which would allow full, unrestricted access to all data and database functions. And could lead to arbitrary code execution or data access on the underlying host as the `postgres` user. The issue has been patched as of version 1.1.9.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-wcfv-hw89-j2wx

The add_database function in objects.c in the pgbouncer pooler 1.5.2 for PostgreSQL allows remote attackers to cause a denial of service (daemon outage) via a long database name in a request.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-vvfr-p62m-9frc

The postgresql-ocaml bindings 1.5.4, 1.7.0, and 1.12.1 for PostgreSQL libpq do not properly support the PQescapeStringConn function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-rf5r-cr88-cr97

Generation of Error Message Containing Sensitive Information in postgresql

CVSS3: 4.3
0%
Низкий
почти 4 года назад
github логотип
GHSA-r822-pwxw-5qc9

Algorithmic complexity vulnerability in the regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (memory consumption) via a crafted "complex" regular expression with doubly-nested states.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-r7p3-79xh-j7pg

Row security policies disregard user ID changes after inlining; PostgreSQL could permit incorrect policies to be applied in certain cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy.

CVSS3: 5.4
0%
Низкий
больше 2 лет назад
github логотип
GHSA-jx3x-j983-74m3

IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
github логотип
GHSA-h86w-m5rm-xr33

Unescaped parameters in the PostgreSQL JDBC driver

2%
Низкий
больше 3 лет назад
github логотип
GHSA-h73g-3m4r-j2cr

In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.

CVSS3: 7
0%
Низкий
больше 3 лет назад
github логотип
GHSA-f47v-jjrp-x56x

A flaw was found in postgresql. Using an UPDATE ... RETURNING command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-9fff-w5w3-5x9g

schema_element defeats protective search_path changes; It was found that certain database calls in PostgreSQL could permit an authed attacker with elevated database-level privileges to execute arbitrary code.

CVSS3: 7.2
0%
Низкий
больше 2 лет назад
github логотип
GHSA-6rxj-38xv-j69g

The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.

4%
Низкий
больше 3 лет назад
github логотип
GHSA-66vv-jcch-hx6x

The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (backend crash) via an out-of-bounds backref number.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-5vr6-jmmj-7xx7

The PL/php add-on 1.4 and earlier for PostgreSQL does not properly protect script execution by a different SQL user identity within the same session, which allows remote authenticated users to gain privileges via crafted script code in a SECURITY DEFINER function, a related issue to CVE-2010-3433.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-467w-rrqc-395f

When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.

CVSS3: 8.1
0%
Низкий
почти 4 года назад
github логотип
GHSA-43rr-wcj9-h45w

Incorrect Authorization in PostgreSQL

CVSS3: 4.3
0%
Низкий
почти 4 года назад
ubuntu логотип
CVE-2023-39417

IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-39417

IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-39417

IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-39417

IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in Po ...

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-32305

aiven-extras is a PostgreSQL extension. Versions prior to 1.1.9 contain a privilege escalation vulnerability, allowing elevation to superuser inside PostgreSQL databases that use the aiven-extras package. The vulnerability leverages missing schema qualifiers on privileged functions called by the aiven-extras extension. A low privileged user can create objects that collide with existing function names, which will then be executed instead. Exploiting this vulnerability could allow a low privileged user to acquire `superuser` privileges, which would allow full, unrestricted access to all data and database functions. And could lead to arbitrary code execution or data access on the underlying host as the `postgres` user. The issue has been patched as of version 1.1.9.

CVSS3: 8.8
1%
Низкий
больше 2 лет назад

Уязвимостей на страницу