Page 19 of 108 results (0.012 seconds)

CVSS: 6.5EPSS: 69%CPEs: 28EXPL: 0

Multiple buffer overflows in gram.y for PostgreSQL 8.0.1 and earlier may allow attackers to execute arbitrary code via (1) a large number of variables in a SQL statement being handled by the read_sql_construct function, (2) a large number of INTO variables in a SELECT statement being handled by the make_select_stmt function, (3) a large number of arbitrary variables in a SELECT statement being handled by the make_select_stmt function, and (4) a large number of INTO variables in a FETCH statement being handled by the make_fetch_stmt function, a different set of vulnerabilities than CVE-2005-0245. • http://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php http://marc.info/?l=bugtraq&m=110806034116082&w=2 http://www.debian.org/security/2005/dsa-683 http://www.gentoo.org/security/en/glsa/glsa-200502-19.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:040 http://www.novell.com/linux/security/advisories/2005_27_postgresql.html http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://www.redhat.com/support/errata/RHSA-2005-138.ht • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

PostgreSQL (pgsql) 7.4.x, 7.2.x, and other versions allows local users to load arbitrary shared libraries and execute code via the LOAD extension. • http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php http://marc.info/?l=bugtraq&m=110726899107148&w=2 http://secunia.com/advisories/12948 http://security.gentoo.org/glsa/glsa-200502-08.xml http://www.debian.org/security/2005/dsa-668 http://www.mandriva.com/security/advisories?name=MDKSA-2005:040 http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://www.redhat.com/support/errat • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 4

Buffer overflow in gram.y for PostgreSQL 8.0.0 and earlier may allow attackers to execute arbitrary code via a large number of arguments to a refcursor function (gram.y), which leads to a heap-based buffer overflow, a different vulnerability than CVE-2005-0247. • https://www.exploit-db.com/exploits/25076 http://archives.postgresql.org/pgsql-committers/2005-01/msg00298.php http://archives.postgresql.org/pgsql-committers/2005-02/msg00049.php http://archives.postgresql.org/pgsql-patches/2005-01/msg00216.php http://marc.info/?l=bugtraq&m=110806034116082&w=2 http://secunia.com/advisories/12948 http://www.debian.org/security/2005/dsa-683 http://www.mandriva.com/security/advisories?name=MDKSA-2005:040 http://www.novell.com/linux/security/advisor •

CVSS: 2.1EPSS: 0%CPEs: 16EXPL: 0

The make_oidjoins_check script in PostgreSQL 7.4.5 and earlier allows local users to overwrite files via a symlink attack on temporary files. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136300 http://marc.info/?l=bugtraq&m=109910073808903&w=2 http://security.gentoo.org/glsa/glsa-200410-16.xml http://www.debian.org/security/2004/dsa-577 http://www.mandriva.com/security/advisories?name=MDKSA-2004:149 http://www.redhat.com/support/errata/RHSA-2004-489.html http://www.securityfocus.com/bid/11295 http://www.trustix.org/errata/2004/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 https:/ •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in the ODBC driver for PostgreSQL before 7.2.1 allows remote attackers to cause a denial of service (crash). Desbordamiento de búfer en el contolador ODBC de PostgreSQL, en versiones anteriores a 7.2.1 permite a atacantes remotos causar una denegación de servicio (caída). • http://www.debian.org/security/2004/dsa-516 http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:072 https://exchange.xforce.ibmcloud.com/vulnerabilities/16329 •