Page 23 of 118 results (0.011 seconds)

CVSS: 10.0EPSS: 1%CPEs: 9EXPL: 0

Unknown vulnerability in cash_out and possibly other functions in PostgreSQL 7.2.1 and earlier, and possibly later versions before 7.2.3, with unknown impact, based on an invalid integer input which is processed as a different data type, as demonstrated using cash_out(2). Vulnerabilidad desconocida en la función cash_out en PostgreSQL 7.2.1 y anteriores, y posiblemente versiones anteriores a 7.2.3, con impacto desconocido, basado en una entrada de enteros inválida. • http://archives.postgresql.org/pgsql-hackers/2002-08/msg00708.php http://archives.postgresql.org/pgsql-hackers/2002-08/msg00713.php http://marc.info/?l=bugtraq&m=102978152712430&w=2 •

CVSS: 7.5EPSS: 2%CPEs: 9EXPL: 0

Heap-based buffer overflow in the repeat() function for PostgreSQL before 7.2.2 allows attackers to execute arbitrary code by causing repeat() to generate a large string. Desbordamiento basado en el montón (heap) en la función repeat() en PostgreSQL 7.2.2 permite a atacantes ejecutar código arbitrario haciendo que repeat() genere una cadena largo. • http://archives.postgresql.org/pgsql-announce/2002-08/msg00004.php http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000524 http://marc.info/?l=bugtraq&m=102987306029821&w=2 http://marc.info/?l=bugtraq&m=103021186622725&w=2 http://marc.info/?l=bugtraq&m=103036987114437&w=2 http://marc.info/? •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

PostgreSQL uses the username for a salt when generating passwords, which makes it easier for remote attackers to guess passwords via a brute force attack. • http://archives.postgresql.org/pgsql-admin/2002-08/msg00253.php http://marc.info/?l=bugtraq&m=111402558115859&w=2 http://marc.info/?l=bugtraq&m=111403050902165&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/20215 • CWE-916: Use of Password Hash With Insufficient Computational Effort •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

PostgreSQL 7.2.1 and 7.2.2 allows local users to delete transaction log (pg_clog) data and cause a denial of service (data loss) via the VACUUM command. • http://archives.postgresql.org/pgsql-announce/2002-10/msg00000.php http://www.kb.cert.org/vuls/id/891177 http://www.redhat.com/support/errata/RHSA-2003-001.html http://www.securityfocus.com/bid/7657 https://exchange.xforce.ibmcloud.com/vulnerabilities/11102 •

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 0

Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad. Desbordamiento de búfer en PostgreSQL 7.2 permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante argumentos largos en las funciones lpad y rpad. • http://marc.info/?l=bugtraq&m=102987608300785&w=2 http://secunia.com/advisories/8034 http://www.redhat.com/support/errata/RHSA-2003-001.html https://access.redhat.com/security/cve/CVE-2002-0972 https://bugzilla.redhat.com/show_bug.cgi?id=1616832 •