Page 25 of 133 results (0.019 seconds)

CVSS: 7.5EPSS: 11%CPEs: 9EXPL: 0

Buffer overflow in to_ascii for PostgreSQL 7.2.x, and 7.3.x before 7.3.4, allows remote attackers to execute arbitrary code. • http://developer.postgresql.org/cvsweb.cgi/pgsql-server/src/backend/utils/adt/ascii.c http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000784 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000772 http://www.debian.org/security/2003/dsa-397 http://www.redhat.com/support/errata/RHSA-2003-313.html http://www.redhat.com/support/errata/RHSA-2003-314.html http://www.securityfocus.com/bid/8741 https://access.redhat.com/security/cve/CVE-2003-0901 htt •

CVSS: 6.5EPSS: 0%CPEs: 11EXPL: 0

Buffer overflows in (1) circle_poly, (2) path_encode and (3) path_add (also incorrectly identified as path_addr) for PostgreSQL 7.2.3 and earlier allow attackers to cause a denial of service and possibly execute arbitrary code, possibly as a result of an integer overflow. Desbordamientos de búfer en PostgreSQL 6.3.2 a 7.2.3 en las funciones geo circle_poly(), path_encode y path_add (también definida incorrectamente como path_addr permite a atacantes causar una denegación de servicio y posiblemente ejecutar código arbitrario, posiblemente como resultado de un desbordamiento de número entero. • http://archives.postgresql.org/pgsql-hackers/2002-08/msg02047.php http://archives.postgresql.org/pgsql-hackers/2002-08/msg02081.php http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000524 http://secunia.com/advisories/8034 http://www.debian.org/security/2002/dsa-165 http://www.redhat.com/support/errata/RHSA-2003-001.html https://access.redhat.com/security/cve/CVE-2002-1401 https://bugzilla.redhat.com/show_bug.cgi?id=1616913 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

Vulnerability in the cash_words() function for PostgreSQL 7.2 and earlier allows local users to cause a denial of service and possibly execute arbitrary code via a large negative argument, possibly triggering an integer signedness error or buffer overflow. Desbordamiento de búfer en la función cash_words() en PostgreSQL 7.2 y anteriores permite a usuarios locales causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante un argurmento malformado. • http://developer.postgresql.org/cvsweb.cgi/pgsql-server/src/backend/utils/adt/cash.c.diff?r1=1.51&r2=1.52 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000524 http://marc.info/?l=bugtraq&m=102977465204357&w=2 http://secunia.com/advisories/8034 http://www.redhat.com/support/errata/RHSA-2003-001.html http://www.securityfocus.com/bid/5497 https://exchange.xforce.ibmcloud.com/vulnerabilities/9891 https://access.redhat.com/security/cve/CVE-2002-1397 https:// •

CVSS: 4.6EPSS: 0%CPEs: 8EXPL: 0

Buffer overflows in the (1) TZ and (2) SET TIME ZONE enivronment variables for PostgreSQL 7.2.1 and earlier allow local users to cause a denial of service and possibly execute arbitrary code. Desbordamiento de búfer en las variables de entorno TZ y SET TIME ZONE de PostgreSQL 7.2.1 y anteriores permiten a usuarios locales causar una denegación de servicio y posiblemente ejecutar código arbitrario. • http://archives.postgresql.org/pgsql-announce/2002-08/msg00004.php http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000524 http://marc.info/?l=bugtraq&m=103021186622725&w=2 http://marc.info/?l=bugtraq&m=103036987114437&w=2 http://secunia.com/advisories/8034 http://www.debian.org/security/2002/dsa-165 http://www.mandriva.com/security/advisories?name=MDKSA-2002:062 http://www.redhat.com/support/errata/RHSA-2003-001.html https://access.redhat.com/security/cve/ •

CVSS: 4.6EPSS: 0%CPEs: 9EXPL: 0

Buffer overflow in the date parser for PostgreSQL before 7.2.2 allows attackers to cause a denial of service and possibly execute arbitrary code via a long date string, aka a vulnerability "in handling long datetime input." Desbordamiento de búfer en el procesador de fechas de PostgreSQL 7.2.2 permite a atacantes causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante una cadena de fecha larga. • http://archives.postgresql.org/pgsql-announce/2002-08/msg00004.php http://marc.info/?l=bugtraq&m=102978152712430&w=2 http://marc.info/?l=bugtraq&m=102996089613404&w=2 http://marc.info/?l=bugtraq&m=103021186622725&w=2 http://marc.info/?l=bugtraq&m=103036987114437&w=2 http://marc.info/? •