Page 13 of 65 results (0.009 seconds)

CVSS: 2.1EPSS: 0%CPEs: 9EXPL: 0

The tsearch2 module in PostgreSQL 7.4 through 8.0.x declares the (1) dex_init, (2) snb_en_init, (3) snb_ru_init, (4) spell_init, and (5) syn_init functions as "internal" even when they do not take an internal argument, which allows attackers to cause a denial of service (application crash) and possibly have other impacts via SQL commands that call other functions that accept internal arguments. • http://archives.postgresql.org/pgsql-announce/2005-05/msg00001.php http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://www.postgresql.org/about/news.315 http://www.redhat.com/support/errata/RHSA-2005-433.html http://www.securityfocus.com/archive/1/426302/30/6680/threaded http://www.securityfocus.com/bid/13475 http://www.vupen.com/english/advisories/2005/0453 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1086 https:/&# •

CVSS: 6.5EPSS: 0%CPEs: 27EXPL: 0

PostgreSQL 8.0.0 and earlier allows local users to bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command. • http://archives.postgresql.org/pgsql-hackers/2005-01/msg00922.php http://marc.info/?l=bugtraq&m=110806034116082&w=2 http://secunia.com/advisories/12948 http://www.mandriva.com/security/advisories?name=MDKSA-2005:040 http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://www.redhat.com/support/errata/RHSA-2005-138.html http://www.securityfocus.com/bid/12417 https://exchange.xforce.ibmcloud.com/vulnerabilities/19184 https://oval.cisecurity.org/repository/search/defini • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

The intagg contrib module for PostgreSQL 8.0.0 and earlier allows attackers to cause a denial of service (crash) via crafted arrays. • http://archives.postgresql.org/pgsql-committers/2005-01/msg00401.php http://marc.info/?l=bugtraq&m=110806034116082&w=2 http://secunia.com/advisories/12948 http://www.mandriva.com/security/advisories?name=MDKSA-2005:040 http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://www.redhat.com/support/errata/RHSA-2005-138.html http://www.securityfocus.com/bid/12417 https://exchange.xforce.ibmcloud.com/vulnerabilities/19185 https://oval.cisecurity.org/repository/search/def •

CVSS: 6.5EPSS: 69%CPEs: 28EXPL: 0

Multiple buffer overflows in gram.y for PostgreSQL 8.0.1 and earlier may allow attackers to execute arbitrary code via (1) a large number of variables in a SQL statement being handled by the read_sql_construct function, (2) a large number of INTO variables in a SELECT statement being handled by the make_select_stmt function, (3) a large number of arbitrary variables in a SELECT statement being handled by the make_select_stmt function, and (4) a large number of INTO variables in a FETCH statement being handled by the make_fetch_stmt function, a different set of vulnerabilities than CVE-2005-0245. • http://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php http://marc.info/?l=bugtraq&m=110806034116082&w=2 http://www.debian.org/security/2005/dsa-683 http://www.gentoo.org/security/en/glsa/glsa-200502-19.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:040 http://www.novell.com/linux/security/advisories/2005_27_postgresql.html http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://www.redhat.com/support/errata/RHSA-2005-138.ht • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

PostgreSQL (pgsql) 7.4.x, 7.2.x, and other versions allows local users to load arbitrary shared libraries and execute code via the LOAD extension. • http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php http://marc.info/?l=bugtraq&m=110726899107148&w=2 http://secunia.com/advisories/12948 http://security.gentoo.org/glsa/glsa-200502-08.xml http://www.debian.org/security/2005/dsa-668 http://www.mandriva.com/security/advisories?name=MDKSA-2005:040 http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://www.redhat.com/support/errat • CWE-94: Improper Control of Generation of Code ('Code Injection') •