Page 17 of 105 results (0.005 seconds)

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

PostgreSQL 8.1.0 through 8.1.2 allows authenticated database users to gain additional privileges via "knowledge of the backend protocol" using a crafted SET ROLE to other database users, a different vulnerability than CVE-2006-0678. • http://archives.postgresql.org/pgsql-announce/2006-02/msg00008.php http://secunia.com/advisories/18890 http://securitytracker.com/id?1015636 http://www.kb.cert.org/vuls/id/567452 http://www.openpkg.org/security/OpenPKG-SA-2006.004-postgresql.html http://www.postgresql.org/docs/8.1/static/release.html#RELEASE-8-1-3 http://www.securityfocus.com/archive/1/425037/100/0/threaded http://www.securityfocus.com/bid/16649 http://www.vupen.com/english/advisories/2006/0605 https: • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 1.5EPSS: 0%CPEs: 36EXPL: 0

PostgreSQL 7.3.x before 7.3.14, 7.4.x before 7.4.12, 8.0.x before 8.0.7, and 8.1.x before 8.1.3, when compiled with Asserts enabled, allows local users to cause a denial of service (server crash) via a crafted SET SESSION AUTHORIZATION command, a different vulnerability than CVE-2006-0553. • http://secunia.com/advisories/18890 http://secunia.com/advisories/19015 http://secunia.com/advisories/19035 http://securityreason.com/securityalert/498 http://www.openpkg.org/security/OpenPKG-SA-2006.004-postgresql.html http://www.postgresql.org/docs/8.1/static/release.html#RELEASE-8-1-3 http://www.securityfocus.com/archive/1/425037/100/0/threaded http://www.securityfocus.com/bid/16650 http://www.trustix.org/errata/2006/0008 http://www.ubuntu.com/usn/usn-258-1 http •

CVSS: 5.0EPSS: 8%CPEs: 8EXPL: 0

PostgreSQL 8.0.x before 8.0.6 and 8.1.x before 8.1.2, when running on Windows, allows remote attackers to cause a denial of service (postmaster exit and no new connections) via a large number of simultaneous connection requests. • http://archives.postgresql.org/pgsql-announce/2006-01/msg00001.php http://secunia.com/advisories/18419 http://securityreason.com/securityalert/327 http://securitytracker.com/id?1015482 http://www.postgresql.org/about/news.456 http://www.securityfocus.com/archive/1/421592/100/0/threaded http://www.securityfocus.com/bid/16201 http://www.vupen.com/english/advisories/2006/0114 https://exchange.xforce.ibmcloud.com/vulnerabilities/24049 •

CVSS: 7.5EPSS: 0%CPEs: 28EXPL: 0

PostgreSQL 7.3.x through 8.0.x gives public EXECUTE access to certain character conversion functions, which allows unprivileged users to call those functions with malicious values, with unknown impact, aka the "Character conversion vulnerability." • http://archives.postgresql.org/pgsql-announce/2005-05/msg00001.php http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://www.postgresql.org/about/news.315 http://www.redhat.com/support/errata/RHSA-2005-433.html http://www.securityfocus.com/archive/1/426302/30/6680/threaded http://www.securityfocus.com/bid/13476 http://www.vupen.com/english/advisories/2005/0453 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10050 https:/& •

CVSS: 2.1EPSS: 0%CPEs: 9EXPL: 0

The tsearch2 module in PostgreSQL 7.4 through 8.0.x declares the (1) dex_init, (2) snb_en_init, (3) snb_ru_init, (4) spell_init, and (5) syn_init functions as "internal" even when they do not take an internal argument, which allows attackers to cause a denial of service (application crash) and possibly have other impacts via SQL commands that call other functions that accept internal arguments. • http://archives.postgresql.org/pgsql-announce/2005-05/msg00001.php http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://www.postgresql.org/about/news.315 http://www.redhat.com/support/errata/RHSA-2005-433.html http://www.securityfocus.com/archive/1/426302/30/6680/threaded http://www.securityfocus.com/bid/13475 http://www.vupen.com/english/advisories/2005/0453 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1086 https:/&# •