Количество 28
Количество 28
BDU:2020-05467
Уязвимость компонента client системы управления базами данных PostgreSQL, позволяющая нарушителю реализовать атаку типа «человек посередине»
CVE-2020-25694
A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CVE-2020-25694
A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CVE-2020-25694
A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CVE-2020-25694
A flaw was found in PostgreSQL versions before 13.1 before 12.5 before 11.10 before 10.15 before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters an opportunity for a man-in-the-middle attack or the ability to observe clear-text transmissions could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CVE-2020-25694
A flaw was found in PostgreSQL versions before 13.1, before 12.5, befo ...
GHSA-vmm8-82m2-pcp5
Use of a Broken or Risky Cryptographic Algorithm in PostgreSQL
ELSA-2020-5401
ELSA-2020-5401: libpq security update (IMPORTANT)
openSUSE-SU-2021:0337-1
Security update for postgresql, postgresql13
openSUSE-SU-2020:2029-1
Security update for postgresql12
openSUSE-SU-2020:2028-1
Security update for postgresql10
openSUSE-SU-2020:2019-1
Security update for postgresql10
openSUSE-SU-2020:2018-1
Security update for postgresql12
SUSE-SU-2021:0217-1
Security update for postgresql, postgresql12, postgresql13
SUSE-SU-2021:0175-1
Security update for postgresql, postgresql13
SUSE-SU-2020:3476-1
Security update for postgresql10
SUSE-SU-2020:3463-1
Security update for postgresql12
SUSE-SU-2020:3455-1
Security update for postgresql10
SUSE-SU-2020:3425-1
Security update for postgresql12
ELSA-2021-1512
ELSA-2021-1512: postgresql security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость  | CVSS  | EPSS  | Опубликовано  | |
|---|---|---|---|---|
BDU:2020-05467 Уязвимость компонента client системы управления базами данных PostgreSQL, позволяющая нарушителю реализовать атаку типа «человек посередине»  | CVSS3: 9.8  | 0% Низкий | почти 5 лет назад | |
CVE-2020-25694 A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.  | CVSS3: 8.1  | 0% Низкий | почти 5 лет назад | |
CVE-2020-25694 A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.  | CVSS3: 8.1  | 0% Низкий | почти 5 лет назад | |
CVE-2020-25694 A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.  | CVSS3: 8.1  | 0% Низкий | почти 5 лет назад | |
CVE-2020-25694 A flaw was found in PostgreSQL versions before 13.1 before 12.5 before 11.10 before 10.15 before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters an opportunity for a man-in-the-middle attack or the ability to observe clear-text transmissions could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.  | CVSS3: 8.1  | 0% Низкий | почти 5 лет назад | |
CVE-2020-25694 A flaw was found in PostgreSQL versions before 13.1, before 12.5, befo ...  | CVSS3: 8.1  | 0% Низкий | почти 5 лет назад | |
GHSA-vmm8-82m2-pcp5 Use of a Broken or Risky Cryptographic Algorithm in PostgreSQL  | CVSS3: 8.1  | 0% Низкий | больше 3 лет назад | |
ELSA-2020-5401 ELSA-2020-5401: libpq security update (IMPORTANT)  | почти 5 лет назад | |||
openSUSE-SU-2021:0337-1 Security update for postgresql, postgresql13  | больше 4 лет назад | |||
openSUSE-SU-2020:2029-1 Security update for postgresql12  | почти 5 лет назад | |||
openSUSE-SU-2020:2028-1 Security update for postgresql10  | почти 5 лет назад | |||
openSUSE-SU-2020:2019-1 Security update for postgresql10  | почти 5 лет назад | |||
openSUSE-SU-2020:2018-1 Security update for postgresql12  | почти 5 лет назад | |||
SUSE-SU-2021:0217-1 Security update for postgresql, postgresql12, postgresql13  | почти 5 лет назад | |||
SUSE-SU-2021:0175-1 Security update for postgresql, postgresql13  | почти 5 лет назад | |||
SUSE-SU-2020:3476-1 Security update for postgresql10  | почти 5 лет назад | |||
SUSE-SU-2020:3463-1 Security update for postgresql12  | почти 5 лет назад | |||
SUSE-SU-2020:3455-1 Security update for postgresql10  | почти 5 лет назад | |||
SUSE-SU-2020:3425-1 Security update for postgresql12  | почти 5 лет назад | |||
ELSA-2021-1512 ELSA-2021-1512: postgresql security update (IMPORTANT)  | больше 4 лет назад | 
Уязвимостей на страницу