Page 12 of 133 results (0.023 seconds)

CVSS: 7.5EPSS: 3%CPEs: 8EXPL: 0

10 Jan 2006 — PostgreSQL 8.0.x before 8.0.6 and 8.1.x before 8.1.2, when running on Windows, allows remote attackers to cause a denial of service (postmaster exit and no new connections) via a large number of simultaneous connection requests. • http://archives.postgresql.org/pgsql-announce/2006-01/msg00001.php •

CVSS: 9.1EPSS: 0%CPEs: 9EXPL: 0

03 May 2005 — The tsearch2 module in PostgreSQL 7.4 through 8.0.x declares the (1) dex_init, (2) snb_en_init, (3) snb_ru_init, (4) spell_init, and (5) syn_init functions as "internal" even when they do not take an internal argument, which allows attackers to cause a denial of service (application crash) and possibly have other impacts via SQL commands that call other functions that accept internal arguments. • http://archives.postgresql.org/pgsql-announce/2005-05/msg00001.php •

CVSS: 9.8EPSS: 0%CPEs: 28EXPL: 0

03 May 2005 — PostgreSQL 7.3.x through 8.0.x gives public EXECUTE access to certain character conversion functions, which allows unprivileged users to call those functions with malicious values, with unknown impact, aka the "Character conversion vulnerability." • http://archives.postgresql.org/pgsql-announce/2005-05/msg00001.php •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

08 Feb 2005 — The intagg contrib module for PostgreSQL 8.0.0 and earlier allows attackers to cause a denial of service (crash) via crafted arrays. • http://archives.postgresql.org/pgsql-committers/2005-01/msg00401.php •

CVSS: 9.8EPSS: 57%CPEs: 28EXPL: 0

08 Feb 2005 — Multiple buffer overflows in gram.y for PostgreSQL 8.0.1 and earlier may allow attackers to execute arbitrary code via (1) a large number of variables in a SQL statement being handled by the read_sql_construct function, (2) a large number of INTO variables in a SELECT statement being handled by the make_select_stmt function, (3) a large number of arbitrary variables in a SELECT statement being handled by the make_select_stmt function, and (4) a large number of INTO variables in a FETCH statement being handl... • http://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 27EXPL: 0

08 Feb 2005 — PostgreSQL 8.0.0 and earlier allows local users to bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command. • http://archives.postgresql.org/pgsql-hackers/2005-01/msg00922.php • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

06 Feb 2005 — PostgreSQL (pgsql) 7.4.x, 7.2.x, and other versions allows local users to load arbitrary shared libraries and execute code via the LOAD extension. • http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 1%CPEs: 3EXPL: 4

01 Feb 2005 — Buffer overflow in gram.y for PostgreSQL 8.0.0 and earlier may allow attackers to execute arbitrary code via a large number of arguments to a refcursor function (gram.y), which leads to a heap-based buffer overflow, a different vulnerability than CVE-2005-0247. • https://www.exploit-db.com/exploits/25076 •

CVSS: 5.5EPSS: 0%CPEs: 16EXPL: 0

20 Oct 2004 — The make_oidjoins_check script in PostgreSQL 7.4.5 and earlier allows local users to overwrite files via a symlink attack on temporary files. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136300 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

11 Jun 2004 — Buffer overflow in the ODBC driver for PostgreSQL before 7.2.1 allows remote attackers to cause a denial of service (crash). Desbordamiento de búfer en el contolador ODBC de PostgreSQL, en versiones anteriores a 7.2.1 permite a atacantes remotos causar una denegación de servicio (caída). • http://www.debian.org/security/2004/dsa-516 •