Page 29 of 150 results (0.006 seconds)

CVSS: 4.6EPSS: 0%CPEs: 8EXPL: 0

Buffer overflows in the (1) TZ and (2) SET TIME ZONE enivronment variables for PostgreSQL 7.2.1 and earlier allow local users to cause a denial of service and possibly execute arbitrary code. Desbordamiento de búfer en las variables de entorno TZ y SET TIME ZONE de PostgreSQL 7.2.1 y anteriores permiten a usuarios locales causar una denegación de servicio y posiblemente ejecutar código arbitrario. • http://archives.postgresql.org/pgsql-announce/2002-08/msg00004.php http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000524 http://marc.info/?l=bugtraq&m=103021186622725&w=2 http://marc.info/?l=bugtraq&m=103036987114437&w=2 http://secunia.com/advisories/8034 http://www.debian.org/security/2002/dsa-165 http://www.mandriva.com/security/advisories?name=MDKSA-2002:062 http://www.redhat.com/support/errata/RHSA-2003-001.html https://access.redhat.com/security/cve/ •

CVSS: 4.6EPSS: 0%CPEs: 9EXPL: 0

Buffer overflow in the date parser for PostgreSQL before 7.2.2 allows attackers to cause a denial of service and possibly execute arbitrary code via a long date string, aka a vulnerability "in handling long datetime input." Desbordamiento de búfer en el procesador de fechas de PostgreSQL 7.2.2 permite a atacantes causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante una cadena de fecha larga. • http://archives.postgresql.org/pgsql-announce/2002-08/msg00004.php http://marc.info/?l=bugtraq&m=102978152712430&w=2 http://marc.info/?l=bugtraq&m=102996089613404&w=2 http://marc.info/?l=bugtraq&m=103021186622725&w=2 http://marc.info/?l=bugtraq&m=103036987114437&w=2 http://marc.info/? •

CVSS: 10.0EPSS: 1%CPEs: 9EXPL: 0

Unknown vulnerability in cash_out and possibly other functions in PostgreSQL 7.2.1 and earlier, and possibly later versions before 7.2.3, with unknown impact, based on an invalid integer input which is processed as a different data type, as demonstrated using cash_out(2). Vulnerabilidad desconocida en la función cash_out en PostgreSQL 7.2.1 y anteriores, y posiblemente versiones anteriores a 7.2.3, con impacto desconocido, basado en una entrada de enteros inválida. • http://archives.postgresql.org/pgsql-hackers/2002-08/msg00708.php http://archives.postgresql.org/pgsql-hackers/2002-08/msg00713.php http://marc.info/?l=bugtraq&m=102978152712430&w=2 •

CVSS: 7.5EPSS: 2%CPEs: 9EXPL: 0

Heap-based buffer overflow in the repeat() function for PostgreSQL before 7.2.2 allows attackers to execute arbitrary code by causing repeat() to generate a large string. Desbordamiento basado en el montón (heap) en la función repeat() en PostgreSQL 7.2.2 permite a atacantes ejecutar código arbitrario haciendo que repeat() genere una cadena largo. • http://archives.postgresql.org/pgsql-announce/2002-08/msg00004.php http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000524 http://marc.info/?l=bugtraq&m=102987306029821&w=2 http://marc.info/?l=bugtraq&m=103021186622725&w=2 http://marc.info/?l=bugtraq&m=103036987114437&w=2 http://marc.info/? •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

PostgreSQL uses the username for a salt when generating passwords, which makes it easier for remote attackers to guess passwords via a brute force attack. • http://archives.postgresql.org/pgsql-admin/2002-08/msg00253.php http://marc.info/?l=bugtraq&m=111402558115859&w=2 http://marc.info/?l=bugtraq&m=111403050902165&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/20215 • CWE-916: Use of Password Hash With Insufficient Computational Effort •