Логотип exploitDog
bind:CVE-2017-16082
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-16082

Количество 4

Количество 4

ubuntu логотип

CVE-2017-16082

больше 7 лет назад

A remote code execution vulnerability was found within the pg module when the remote database or query specifies a specially crafted column name. There are 2 likely scenarios in which one would likely be vulnerable. 1) Executing unsafe, user-supplied sql which contains a malicious column name. 2) Connecting to an untrusted database and executing a query which returns results where any of the column names are malicious.

CVSS3: 9.8
EPSS: Высокий
nvd логотип

CVE-2017-16082

больше 7 лет назад

A remote code execution vulnerability was found within the pg module when the remote database or query specifies a specially crafted column name. There are 2 likely scenarios in which one would likely be vulnerable. 1) Executing unsafe, user-supplied sql which contains a malicious column name. 2) Connecting to an untrusted database and executing a query which returns results where any of the column names are malicious.

CVSS3: 9.8
EPSS: Высокий
debian логотип

CVE-2017-16082

больше 7 лет назад

A remote code execution vulnerability was found within the pg module w ...

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-wc9v-mj63-m9g5

больше 7 лет назад

Remote Code Execution in pg

CVSS3: 9.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-16082

A remote code execution vulnerability was found within the pg module when the remote database or query specifies a specially crafted column name. There are 2 likely scenarios in which one would likely be vulnerable. 1) Executing unsafe, user-supplied sql which contains a malicious column name. 2) Connecting to an untrusted database and executing a query which returns results where any of the column names are malicious.

CVSS3: 9.8
71%
Высокий
больше 7 лет назад
nvd логотип
CVE-2017-16082

A remote code execution vulnerability was found within the pg module when the remote database or query specifies a specially crafted column name. There are 2 likely scenarios in which one would likely be vulnerable. 1) Executing unsafe, user-supplied sql which contains a malicious column name. 2) Connecting to an untrusted database and executing a query which returns results where any of the column names are malicious.

CVSS3: 9.8
71%
Высокий
больше 7 лет назад
debian логотип
CVE-2017-16082

A remote code execution vulnerability was found within the pg module w ...

CVSS3: 9.8
71%
Высокий
больше 7 лет назад
github логотип
GHSA-wc9v-mj63-m9g5

Remote Code Execution in pg

CVSS3: 9.8
71%
Высокий
больше 7 лет назад

Уязвимостей на страницу