Логотип exploitDog
bind:"BDU:2019-04232" OR bind:"CVE-2018-1053"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2019-04232" OR bind:"CVE-2018-1053"

Количество 12

Количество 12

fstec логотип

BDU:2019-04232

больше 7 лет назад

Уязвимость реализации команды «pg_upgrade» системы управления базами данных PostgreSQL, позволяющая нарушителю получить доступ к произвольным файлам

CVSS3: 7
EPSS: Низкий
ubuntu логотип

CVE-2018-1053

больше 7 лет назад

In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.

CVSS3: 7
EPSS: Низкий
redhat логотип

CVE-2018-1053

больше 7 лет назад

In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.

CVSS3: 6.7
EPSS: Низкий
nvd логотип

CVE-2018-1053

больше 7 лет назад

In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2018-1053

больше 7 лет назад

In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9 ...

CVSS3: 7
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:0688-1

больше 7 лет назад

Security update for postgresql94

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:0523-1

больше 7 лет назад

Security update for postgresql96

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0675-1

больше 7 лет назад

Security update for postgresql94

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0507-1

больше 7 лет назад

Security update for postgresql96

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0506-1

больше 7 лет назад

Security update for postgresql94

EPSS: Низкий
github логотип

GHSA-h73g-3m4r-j2cr

около 3 лет назад

In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.

CVSS3: 7
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:0529-1

больше 7 лет назад

Security update for postgresql95

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2019-04232

Уязвимость реализации команды «pg_upgrade» системы управления базами данных PostgreSQL, позволяющая нарушителю получить доступ к произвольным файлам

CVSS3: 7
0%
Низкий
больше 7 лет назад
ubuntu логотип
CVE-2018-1053

In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.

CVSS3: 7
0%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-1053

In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.

CVSS3: 6.7
0%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-1053

In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.

CVSS3: 7
0%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-1053

In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9 ...

CVSS3: 7
0%
Низкий
больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:0688-1

Security update for postgresql94

0%
Низкий
больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:0523-1

Security update for postgresql96

0%
Низкий
больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:0675-1

Security update for postgresql94

0%
Низкий
больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:0507-1

Security update for postgresql96

0%
Низкий
больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:0506-1

Security update for postgresql94

0%
Низкий
больше 7 лет назад
github логотип
GHSA-h73g-3m4r-j2cr

In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.

CVSS3: 7
0%
Низкий
около 3 лет назад
suse-cvrf логотип
openSUSE-SU-2018:0529-1

Security update for postgresql95

больше 7 лет назад

Уязвимостей на страницу