Page 18 of 105 results (0.007 seconds)

CVSS: 6.5EPSS: 69%CPEs: 28EXPL: 0

Multiple buffer overflows in gram.y for PostgreSQL 8.0.1 and earlier may allow attackers to execute arbitrary code via (1) a large number of variables in a SQL statement being handled by the read_sql_construct function, (2) a large number of INTO variables in a SELECT statement being handled by the make_select_stmt function, (3) a large number of arbitrary variables in a SELECT statement being handled by the make_select_stmt function, and (4) a large number of INTO variables in a FETCH statement being handled by the make_fetch_stmt function, a different set of vulnerabilities than CVE-2005-0245. • http://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php http://marc.info/?l=bugtraq&m=110806034116082&w=2 http://www.debian.org/security/2005/dsa-683 http://www.gentoo.org/security/en/glsa/glsa-200502-19.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:040 http://www.novell.com/linux/security/advisories/2005_27_postgresql.html http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://www.redhat.com/support/errata/RHSA-2005-138.ht • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.5EPSS: 0%CPEs: 27EXPL: 0

PostgreSQL 8.0.0 and earlier allows local users to bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command. • http://archives.postgresql.org/pgsql-hackers/2005-01/msg00922.php http://marc.info/?l=bugtraq&m=110806034116082&w=2 http://secunia.com/advisories/12948 http://www.mandriva.com/security/advisories?name=MDKSA-2005:040 http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://www.redhat.com/support/errata/RHSA-2005-138.html http://www.securityfocus.com/bid/12417 https://exchange.xforce.ibmcloud.com/vulnerabilities/19184 https://oval.cisecurity.org/repository/search/defini • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

The intagg contrib module for PostgreSQL 8.0.0 and earlier allows attackers to cause a denial of service (crash) via crafted arrays. • http://archives.postgresql.org/pgsql-committers/2005-01/msg00401.php http://marc.info/?l=bugtraq&m=110806034116082&w=2 http://secunia.com/advisories/12948 http://www.mandriva.com/security/advisories?name=MDKSA-2005:040 http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://www.redhat.com/support/errata/RHSA-2005-138.html http://www.securityfocus.com/bid/12417 https://exchange.xforce.ibmcloud.com/vulnerabilities/19185 https://oval.cisecurity.org/repository/search/def •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

PostgreSQL (pgsql) 7.4.x, 7.2.x, and other versions allows local users to load arbitrary shared libraries and execute code via the LOAD extension. • http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php http://marc.info/?l=bugtraq&m=110726899107148&w=2 http://secunia.com/advisories/12948 http://security.gentoo.org/glsa/glsa-200502-08.xml http://www.debian.org/security/2005/dsa-668 http://www.mandriva.com/security/advisories?name=MDKSA-2005:040 http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://www.redhat.com/support/errat • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 4

Buffer overflow in gram.y for PostgreSQL 8.0.0 and earlier may allow attackers to execute arbitrary code via a large number of arguments to a refcursor function (gram.y), which leads to a heap-based buffer overflow, a different vulnerability than CVE-2005-0247. • https://www.exploit-db.com/exploits/25076 http://archives.postgresql.org/pgsql-committers/2005-01/msg00298.php http://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php http://archives.postgresql.org/pgsql-patches/2005-01/msg00216.php http://marc.info/?l=bugtraq&m=110806034116082&w=2 http://secunia.com/advisories/12948 http://www.debian.org/security/2005/dsa-683 http://www.mandriva.com/security/advisories?name=MDKSA-2005:040 http://www.novell.com/linux/security/advisor •