Количество 15
Количество 15

CVE-2018-10915
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.

CVE-2018-10915
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.

CVE-2018-10915
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
CVE-2018-10915
A vulnerability was found in libpq, the default PostgreSQL client libr ...

openSUSE-SU-2018:4007-1
Security update for postgresql94

SUSE-SU-2018:3909-1
Security update for postgresql94

SUSE-SU-2018:3287-1
Security update for postgresql94
GHSA-q7vw-gjh3-qf97
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
ELSA-2018-2557
ELSA-2018-2557: postgresql security update (IMPORTANT)

BDU:2019-01231
Уязвимость функции PQescape() библиотеки libpq системы управления базами данных PostgreSQL, позволяющая нарушителю раскрыть защищаемую информацию

openSUSE-SU-2018:3449-1
Security update for postgresql96

SUSE-SU-2018:3377-1
Security update for postgresql96

openSUSE-SU-2018:2599-1
Security update for postgresql10

SUSE-SU-2018:2564-1
Security update for postgresql10

openSUSE-SU-2020:1227-1
Security update for postgresql96, postgresql10 and postgresql12
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2018-10915 A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected. | CVSS3: 8.5 | 2% Низкий | почти 7 лет назад |
![]() | CVE-2018-10915 A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected. | CVSS3: 8.5 | 2% Низкий | почти 7 лет назад |
![]() | CVE-2018-10915 A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected. | CVSS3: 8.5 | 2% Низкий | почти 7 лет назад |
CVE-2018-10915 A vulnerability was found in libpq, the default PostgreSQL client libr ... | CVSS3: 8.5 | 2% Низкий | почти 7 лет назад | |
![]() | openSUSE-SU-2018:4007-1 Security update for postgresql94 | 2% Низкий | больше 6 лет назад | |
![]() | SUSE-SU-2018:3909-1 Security update for postgresql94 | 2% Низкий | больше 6 лет назад | |
![]() | SUSE-SU-2018:3287-1 Security update for postgresql94 | 2% Низкий | больше 6 лет назад | |
GHSA-q7vw-gjh3-qf97 A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected. | CVSS3: 7.5 | 2% Низкий | около 3 лет назад | |
ELSA-2018-2557 ELSA-2018-2557: postgresql security update (IMPORTANT) | почти 7 лет назад | |||
![]() | BDU:2019-01231 Уязвимость функции PQescape() библиотеки libpq системы управления базами данных PostgreSQL, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 7.5 | 2% Низкий | почти 7 лет назад |
![]() | openSUSE-SU-2018:3449-1 Security update for postgresql96 | больше 6 лет назад | ||
![]() | SUSE-SU-2018:3377-1 Security update for postgresql96 | больше 6 лет назад | ||
![]() | openSUSE-SU-2018:2599-1 Security update for postgresql10 | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2564-1 Security update for postgresql10 | почти 7 лет назад | ||
![]() | openSUSE-SU-2020:1227-1 Security update for postgresql96, postgresql10 and postgresql12 | почти 5 лет назад |
Уязвимостей на страницу