Количество 28
Количество 28

BDU:2022-04971
Уязвимость системы управления базами данных PostgreSQL, связанная с ошибками при использовании команд OR расширениями, позволяющая нарушителю повысить свои привилегии и заменить произвольные объекты в базе данных

ROS-20221013-06
Обход ограничений в PostgreSQL13

ROS-20221013-05
Обход ограничений в PostgreSQL

ROS-20221013-04
Обход ограничений в PostgreSQL14

ROS-20221013-03
Обход ограничений в PostgreSQL1C

CVE-2022-2625
A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.

CVE-2022-2625
A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.

CVE-2022-2625
A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.

CVE-2022-2625
CVE-2022-2625
A vulnerability was found in PostgreSQL. This attack requires permissi ...

SUSE-SU-2022:3269-1
Security update for postgresql14

SUSE-SU-2022:3193-1
Security update for postgresql12

SUSE-SU-2022:2989-2
Security update for postgresql14

SUSE-SU-2022:2989-1
Security update for postgresql14

SUSE-SU-2022:2988-1
Security update for postgresql12

SUSE-SU-2022:2987-1
Security update for postgresql13

SUSE-SU-2022:2946-1
Security update for postgresql10

SUSE-SU-2022:2914-1
Security update for postgresql10

SUSE-SU-2022:2912-1
Security update for postgresql13

RLSA-2023:0113
Moderate: postgresql:10 security update
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2022-04971 Уязвимость системы управления базами данных PostgreSQL, связанная с ошибками при использовании команд OR расширениями, позволяющая нарушителю повысить свои привилегии и заменить произвольные объекты в базе данных | CVSS3: 8 | 1% Низкий | почти 3 года назад |
![]() | ROS-20221013-06 Обход ограничений в PostgreSQL13 | CVSS3: 8 | 1% Низкий | больше 2 лет назад |
![]() | ROS-20221013-05 Обход ограничений в PostgreSQL | CVSS3: 8 | 1% Низкий | больше 2 лет назад |
![]() | ROS-20221013-04 Обход ограничений в PostgreSQL14 | CVSS3: 8 | 1% Низкий | больше 2 лет назад |
![]() | ROS-20221013-03 Обход ограничений в PostgreSQL1C | CVSS3: 8 | 1% Низкий | больше 2 лет назад |
![]() | CVE-2022-2625 A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser. | CVSS3: 8 | 1% Низкий | почти 3 года назад |
![]() | CVE-2022-2625 A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser. | CVSS3: 7.1 | 1% Низкий | почти 3 года назад |
![]() | CVE-2022-2625 A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser. | CVSS3: 8 | 1% Низкий | почти 3 года назад |
![]() | CVSS3: 8 | 1% Низкий | почти 3 года назад | |
CVE-2022-2625 A vulnerability was found in PostgreSQL. This attack requires permissi ... | CVSS3: 8 | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:3269-1 Security update for postgresql14 | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:3193-1 Security update for postgresql12 | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:2989-2 Security update for postgresql14 | 1% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:2989-1 Security update for postgresql14 | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:2988-1 Security update for postgresql12 | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:2987-1 Security update for postgresql13 | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:2946-1 Security update for postgresql10 | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:2914-1 Security update for postgresql10 | 1% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2022:2912-1 Security update for postgresql13 | 1% Низкий | почти 3 года назад | |
![]() | RLSA-2023:0113 Moderate: postgresql:10 security update | 1% Низкий | больше 2 лет назад |
Уязвимостей на страницу