Summary
Detail | |||
---|---|---|---|
Vendor | Postgresql | First view | 1999-12-02 |
Product | Postgresql | Last view | 2024-02-08 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2024-02-08 | CVE-2024-24213 | Supabase PostgreSQL v15.1 was discovered to contain a SQL injection vulnerability via the component /pg_meta/default/query. NOTE: the vendor's position is that this is an intended feature; also, it exists in the Supabase dashboard product, not the Supabase PostgreSQL product. Specifically, /pg_meta/default/query is for SQL queries that are entered in an intended UI by an authorized user. Nothing is injected. |
8 | 2024-02-08 | CVE-2024-0985 | Late privilege drop in REFRESH MATERIALIZED VIEW CONCURRENTLY in PostgreSQL allows an object creator to execute arbitrary SQL functions as the command issuer. The command intends to run SQL functions as the owner of the materialized view, enabling safe refresh of untrusted materialized views. The victim is a superuser or member of one of the attacker's roles. The attack requires luring the victim into running REFRESH MATERIALIZED VIEW CONCURRENTLY on the attacker's materialized view. As part of exploiting this vulnerability, the attacker creates functions that use CREATE RULE to convert the internally-built temporary table to a view. Versions before PostgreSQL 15.6, 14.11, 13.14, and 12.18 are affected. The only known exploit does not work in PostgreSQL 16 and later. For defense in depth, PostgreSQL 16.2 adds the protections that older branches are using to fix their vulnerability. |
4.4 | 2023-12-10 | CVE-2023-5870 | A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack. |
8.8 | 2023-12-10 | CVE-2023-5869 | A flaw was found in PostgreSQL that allows authenticated database users to execute arbitrary code through missing overflow checks during SQL array value modification. This issue exists due to an integer overflow during array modification where a remote user can trigger the overflow by providing specially crafted data. This enables the execution of arbitrary code on the target system, allowing users to write arbitrary bytes to memory and extensively read the server's memory. |
4.3 | 2023-12-10 | CVE-2023-5868 | A memory disclosure vulnerability was found in PostgreSQL that allows remote users to access sensitive information by exploiting certain aggregate function calls with 'unknown'-type arguments. Handling 'unknown'-type values from string literals without type designation can disclose bytes, potentially revealing notable and confidential information. This issue exists due to excessive data output in aggregate function calls, enabling remote users to read some portion of system memory. |
4.4 | 2023-08-22 | CVE-2020-21469 | An issue was discovered in PostgreSQL 12.2 allows attackers to cause a denial of service via repeatedly sending SIGHUP signals. NOTE: this is disputed by the vendor because untrusted users cannot send SIGHUP signals; they can only be sent by a PostgreSQL superuser, a user with pg_reload_conf access, or a user with sufficient privileges at the OS level (the postgres account or the root account). |
4.3 | 2023-08-11 | CVE-2023-39418 | A vulnerability was found in PostgreSQL with the use of the MERGE command, which fails to test new rows against row security policies defined for UPDATE and SELECT. If UPDATE and SELECT policies forbid some rows that INSERT policies do not forbid, a user could store such rows. |
8.8 | 2023-08-11 | CVE-2023-39417 | IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser. |
5.4 | 2023-06-09 | CVE-2023-2455 | Row security policies disregard user ID changes after inlining; PostgreSQL could permit incorrect policies to be applied in certain cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy. |
7.2 | 2023-06-09 | CVE-2023-2454 | schema_element defeats protective search_path changes; It was found that certain database calls in PostgreSQL could permit an authed attacker with elevated database-level privileges to execute arbitrary code. |
8.8 | 2023-05-12 | CVE-2023-32305 | aiven-extras is a PostgreSQL extension. Versions prior to 1.1.9 contain a privilege escalation vulnerability, allowing elevation to superuser inside PostgreSQL databases that use the aiven-extras package. The vulnerability leverages missing schema qualifiers on privileged functions called by the aiven-extras extension. A low privileged user can create objects that collide with existing function names, which will then be executed instead. Exploiting this vulnerability could allow a low privileged user to acquire `superuser` privileges, which would allow full, unrestricted access to all data and database functions. And could lead to arbitrary code execution or data access on the underlying host as the `postgres` user. The issue has been patched as of version 1.1.9. |
3.7 | 2023-03-03 | CVE-2022-41862 | In PostgreSQL, a modified, unauthenticated server can send an unterminated string during the establishment of Kerberos transport encryption. In certain conditions a server can cause a libpq client to over-read and report an error message containing uninitialized bytes. |
8.8 | 2022-08-31 | CVE-2022-1552 | A flaw was found in PostgreSQL. There is an issue with incomplete efforts to operate safely when a privileged user is maintaining another user's objects. The Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER, and pg_amcheck commands activated relevant protections too late or not at all during the process. This flaw allows an attacker with permission to create non-temporary objects in at least one schema to execute arbitrary SQL functions under a superuser identity. |
5.9 | 2022-08-25 | CVE-2021-43767 | Odyssey passes to client unencrypted bytes from man-in-the-middle When Odyssey storage is configured to use the PostgreSQL server using 'trust' authentication with a 'clientcert' requirement or to use 'cert' authentication, a man-in-the-middle attacker can inject false responses to the client's first few queries. Despite the use of SSL certificate verification and encryption, Odyssey will pass these results to client as if they originated from valid server. This is similar to CVE-2021-23222 for PostgreSQL. |
8 | 2022-08-18 | CVE-2022-2625 | A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser. |
8.1 | 2022-03-04 | CVE-2021-23214 | When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption. |
6.5 | 2022-03-02 | CVE-2021-3677 | A flaw was found in postgresql. A purpose-crafted query can read arbitrary bytes of server memory. In the default configuration, any authenticated database user can complete this attack at will. The attack does not require the ability to create objects. If server settings include max_worker_processes=0, the known versions of this attack are infeasible. However, undiscovered variants of the attack may be independent of that setting. |
5.9 | 2022-03-02 | CVE-2021-23222 | A man-in-the-middle attacker can inject false responses to the client's first few queries, despite the use of SSL certificate verification and encryption. |
6.5 | 2021-10-11 | CVE-2021-32028 | A flaw was found in postgresql. Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality. |
6.5 | 2021-10-08 | CVE-2021-32029 | A flaw was found in postgresql. Using an UPDATE ... RETURNING command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality. |
8.8 | 2021-06-01 | CVE-2021-32027 | A flaw was found in postgresql in versions before 13.3, before 12.7, before 11.12, before 10.17 and before 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
4.3 | 2021-04-01 | CVE-2021-3393 | An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read. |
7.8 | 2021-03-19 | CVE-2019-10128 | A vulnerability was found in postgresql versions 11.x prior to 11.3. The Windows installer for EnterpriseDB-supplied PostgreSQL does not lock down the ACL of the binary installation directory or the ACL of the data directory; it keeps the inherited ACL. In the default configuration, this allows a local attacker to read arbitrary data directory files, essentially bypassing database-imposed read access limitations. In plausible non-default configurations, an attacker having both an unprivileged Windows account and an unprivileged PostgreSQL account can cause the PostgreSQL service account to execute arbitrary code. |
8.8 | 2021-03-19 | CVE-2019-10127 | A vulnerability was found in postgresql versions 11.x prior to 11.3. The Windows installer for BigSQL-supplied PostgreSQL does not lock down the ACL of the binary installation directory or the ACL of the data directory; it keeps the inherited ACL. In the default configuration, an attacker having both an unprivileged Windows account and an unprivileged PostgreSQL account can cause the PostgreSQL service account to execute arbitrary code. An attacker having only the unprivileged Windows account can read arbitrary data directory files, essentially bypassing database-imposed read access limitations. An attacker having only the unprivileged Windows account can also delete certain data directory files. |
4.3 | 2021-02-23 | CVE-2021-20229 | A flaw was found in PostgreSQL in versions before 13.2. This flaw allows a user with SELECT privilege on one column to craft a special query that returns all columns of the table. The highest threat from this vulnerability is to confidentiality. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
17% (19) | CWE-264 | Permissions, Privileges, and Access Controls |
9% (10) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |
7% (8) | CWE-200 | Information Exposure |
7% (8) | CWE-189 | Numeric Errors |
6% (7) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
4% (5) | CWE-284 | Access Control (Authorization) Issues |
3% (4) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
3% (4) | CWE-20 | Improper Input Validation |
2% (3) | CWE-399 | Resource Management Errors |
2% (3) | CWE-310 | Cryptographic Issues |
2% (3) | CWE-287 | Improper Authentication |
2% (3) | CWE-125 | Out-of-bounds Read |
2% (3) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
1% (2) | CWE-787 | Out-of-bounds Write |
1% (2) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
1% (2) | CWE-522 | Insufficiently Protected Credentials |
1% (2) | CWE-426 | Untrusted Search Path |
1% (2) | CWE-362 | Race Condition |
1% (2) | CWE-295 | Certificate Issues |
1% (2) | CWE-209 | Information Exposure Through an Error Message |
1% (2) | CWE-190 | Integer Overflow or Wraparound |
1% (2) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
0% (1) | CWE-611 | Information Leak Through XML External Entity File Disclosure |
0% (1) | CWE-476 | NULL Pointer Dereference |
0% (1) | CWE-459 | Incomplete Cleanup |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-1 | Accessing Functionality Not Properly Constrained by ACLs |
CAPEC-3 | Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
CAPEC-4 | Using Alternative IP Address Encodings |
CAPEC-13 | Subverting Environment Variable Values |
CAPEC-17 | Accessing, Modifying or Executing Executable Files |
CAPEC-22 | Exploiting Trust in Client (aka Make the Client Invisible) |
CAPEC-39 | Manipulating Opaque Client-based Data Tokens |
CAPEC-45 | Buffer Overflow via Symbolic Links |
CAPEC-51 | Poison Web Service Registry |
CAPEC-57 | Utilizing REST's Trust in the System Resource to Register Man in the Middle |
CAPEC-59 | Session Credential Falsification through Prediction |
CAPEC-60 | Reusing Session IDs (aka Session Replay) |
CAPEC-71 | Using Unicode Encoding to Bypass Validation Logic |
CAPEC-76 | Manipulating Input to File System Calls |
CAPEC-77 | Manipulating User-Controlled Variables |
CAPEC-78 | Using Escaped Slashes in Alternate Encoding |
CAPEC-79 | Using Slashes in Alternate Encoding |
CAPEC-80 | Using UTF-8 Encoding to Bypass Validation Logic |
CAPEC-87 | Forceful Browsing |
CAPEC-94 | Man in the Middle Attack |
CAPEC-104 | Cross Zone Scripting |
CAPEC-114 | Authentication Abuse |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:11360 | The make_oidjoins_check script in PostgreSQL 7.4.5 and earlier allows local u... |
oval:org.mitre.oval:def:10234 | Buffer overflow in the readline function in util/texindex.c, as used by the (... |
oval:org.mitre.oval:def:10927 | Buffer overflow in the readline function in util/texindex.c, as used by the (... |
oval:org.mitre.oval:def:10175 | Buffer overflow in gram.y for PostgreSQL 8.0.0 and earlier may allow attacker... |
oval:org.mitre.oval:def:10148 | Buffer overflow in gram.y for PostgreSQL 8.0.0 and earlier may allow attacker... |
oval:org.mitre.oval:def:9345 | Buffer overflow in gram.y for PostgreSQL 8.0.0 and earlier may allow attacker... |
oval:org.mitre.oval:def:676 | PostgreSQL Character Conversion Vulnerability |
oval:org.mitre.oval:def:10050 | PostgreSQL 7.3.x through 8.0.x gives public EXECUTE access to certain charact... |
oval:org.mitre.oval:def:9343 | The tsearch2 module in PostgreSQL 7.4 through 8.0.x declares the (1) dex_init... |
oval:org.mitre.oval:def:1086 | PostgreSQL tsearch2 "internal" Functions Vulnerability |
oval:org.mitre.oval:def:10618 | PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x... |
oval:org.mitre.oval:def:9947 | PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x... |
oval:org.mitre.oval:def:11425 | backend/parser/analyze.c in PostgreSQL 8.1.x before 8.1.5 allows remote authe... |
oval:org.mitre.oval:def:10905 | backend/parser/parse_coerce.c in PostgreSQL 7.4.1 through 7.4.14, 8.0.x befor... |
oval:org.mitre.oval:def:10122 | backend/tcop/postgres.c in PostgreSQL 8.1.x before 8.1.5 allows remote authen... |
oval:org.mitre.oval:def:11353 | The query planner in PostgreSQL before 8.0.11, 8.1 before 8.1.7, and 8.2 befo... |
oval:org.mitre.oval:def:22160 | ELSA-2007:0068: postgresql security update (Moderate) |
oval:org.mitre.oval:def:9739 | PostgreSQL 7.3 before 7.3.13, 7.4 before 7.4.16, 8.0 before 8.0.11, 8.1 befor... |
oval:org.mitre.oval:def:20481 | DSA-1311-1 postgresql-7.4 |
oval:org.mitre.oval:def:20469 | DSA-1309-1 postgresql-8.1 |
oval:org.mitre.oval:def:10090 | Untrusted search path vulnerability in PostgreSQL before 7.3.19, 7.4.x before... |
oval:org.mitre.oval:def:21808 | ELSA-2007:0336: postgresql security update (Moderate) |
oval:org.mitre.oval:def:10334 | PostgreSQL 8.1 and probably later versions, when local trust authentication i... |
oval:org.mitre.oval:def:9804 | The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2... |
oval:org.mitre.oval:def:11569 | The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2... |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
74742 | PHP crypt_blowfish 8-bit Character Password Hash Cleartext Password Disclosure |
70740 | PostgreSQL intarray Module contrib/intarray/_int_bool.c gettoken() Function O... |
68436 | PostgreSQL PL perl / Tcl SECURITY DEFINER Function Crafted Script Code Execut... |
64792 | PostgreSQL RESET ALL Operation Privilege Check Weakness Arbitrary Parameter S... |
64757 | PostgreSQL PL / Tcl Implementation pltcl_modules Table Permission Weakness Ar... |
64756 | PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Per... |
64755 | PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Per... |
63208 | PostgreSQL src/backend/executor/nodeHash.c SELECT Statement Overflow DoS |
62129 | PostgreSQL backend/utils/adt/varbit.c bitsubstr Function Remote DoS |
61039 | PostgreSQL Index Function Session Manipulation Privilege Escalation |
61038 | PostgreSQL SSL Certificate Authority (CA) Null Byte Handling MiTM Weakness |
57918 | PostgreSQL $libdir/plugins Library Reload Backend Server Shutdown DoS |
57917 | PostgreSQL LDAP Anonymous Bind Authentication Bypass |
57901 | PostgreSQL RESET SESSION AUTHORIZATION Remote Privilege Escalation |
54512 | PostgreSQL Client-specific Encoding Localized Error Message Conversion DoS |
40906 | TCL in PostgreSQL Out-of-bounds Backref Number Remote DoS |
40905 | TCL in PostgreSQL Crafted Regexp Infinite Loop Remote DoS |
40904 | PostgreSQL Multiple Operation Remote Privilege Escalation |
40903 | PostgreSQL DBLink Module Unspecified Remote Privilege Escalation |
40902 | TCL in PostgreSQL Regular Expression Parser Crafted Doubly-nested State Regex... |
40901 | Database Link Library (dblink) Remote Function Mapping Privilege Escalation |
40900 | PostgreSQL PL/pgSQL (plpgsql) Function Creation Remote Privilege Escalation |
40899 | PostgreSQL dblink host Variable Crafted Localhost Proxy Remote Privilege Esca... |
34903 | PostgreSQL SECURITY DEFINER Functions Search Path Subversion Local Privilege ... |
33302 | PostgreSQL Query Planner Table Compatibility Memory Access |
OpenVAS Exploits
id | Description |
---|---|
2013-09-18 | Name : Debian Security Advisory DSA 2534-1 (postgresql-8.4 - several vulnerabilities) File : nvt/deb_2534_1.nasl |
2012-10-03 | Name : Gentoo Security Advisory GLSA 201209-24 (PostgreSQL) File : nvt/glsa_201209_24.nasl |
2012-09-26 | Name : Gentoo Security Advisory GLSA 201209-03 (php) File : nvt/glsa_201209_03.nasl |
2012-09-25 | Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2012-004) File : nvt/gb_macosx_su12-004.nasl |
2012-09-17 | Name : CentOS Update for postgresql84 CESA-2012:1263 centos5 File : nvt/gb_CESA-2012_1263_postgresql84_centos5.nasl |
2012-09-17 | Name : CentOS Update for postgresql CESA-2012:1263 centos6 File : nvt/gb_CESA-2012_1263_postgresql_centos6.nasl |
2012-09-17 | Name : CentOS Update for postgresql CESA-2012:1264 centos5 File : nvt/gb_CESA-2012_1264_postgresql_centos5.nasl |
2012-09-17 | Name : RedHat Update for postgresql and postgresql84 RHSA-2012:1263-01 File : nvt/gb_RHSA-2012_1263-01_postgresql_and_postgresql84.nasl |
2012-09-17 | Name : RedHat Update for postgresql RHSA-2012:1264-01 File : nvt/gb_RHSA-2012_1264-01_postgresql.nasl |
2012-09-10 | Name : Slackware Advisory SSA:2011-237-01 php File : nvt/esoft_slk_ssa_2011_237_01.nasl |
2012-08-30 | Name : FreeBSD Ports: postgresql-server File : nvt/freebsd_postgresql-server2.nasl |
2012-08-30 | Name : Fedora Update for php FEDORA-2012-10936 File : nvt/gb_fedora_2012_10936_php_fc17.nasl |
2012-08-30 | Name : Fedora Update for postgresql FEDORA-2012-12156 File : nvt/gb_fedora_2012_12156_postgresql_fc16.nasl |
2012-08-30 | Name : Fedora Update for postgresql FEDORA-2012-12165 File : nvt/gb_fedora_2012_12165_postgresql_fc17.nasl |
2012-08-30 | Name : Fedora Update for postgresql FEDORA-2012-2508 File : nvt/gb_fedora_2012_2508_postgresql_fc17.nasl |
2012-08-30 | Name : Fedora Update for postgresql FEDORA-2012-8924 File : nvt/gb_fedora_2012_8924_postgresql_fc17.nasl |
2012-08-30 | Name : Fedora Update for maniadrive FEDORA-2012-9490 File : nvt/gb_fedora_2012_9490_maniadrive_fc17.nasl |
2012-08-30 | Name : Fedora Update for php FEDORA-2012-9490 File : nvt/gb_fedora_2012_9490_php_fc17.nasl |
2012-08-21 | Name : Mandriva Update for postgresql MDVSA-2012:139 (postgresql) File : nvt/gb_mandriva_MDVSA_2012_139.nasl |
2012-08-21 | Name : Ubuntu Update for postgresql-9.1 USN-1542-1 File : nvt/gb_ubuntu_USN_1542_1.nasl |
2012-08-10 | Name : Debian Security Advisory DSA 2491-1 (postgresql-8.4) File : nvt/deb_2491_1.nasl |
2012-08-10 | Name : FreeBSD Ports: FreeBSD File : nvt/freebsd_FreeBSD18.nasl |
2012-08-06 | Name : Fedora Update for php FEDORA-2012-10908 File : nvt/gb_fedora_2012_10908_php_fc16.nasl |
2012-08-03 | Name : Mandriva Update for postgresql MDVSA-2012:092 (postgresql) File : nvt/gb_mandriva_MDVSA_2012_092.nasl |
2012-08-03 | Name : Mandriva Update for php MDVSA-2012:093 (php) File : nvt/gb_mandriva_MDVSA_2012_093.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0199 | Multiple Vulnerabilities in Apple Mac OS X Severity: Category I - VMSKEY: V0061337 |
2015-B-0068 | Multiple Vulnerabilities in PostgreSQL Severity: Category I - VMSKEY: V0060809 |
2014-B-0022 | Multiple Vulnerabilities in PostgreSQL Severity: Category I - VMSKEY: V0044531 |
2013-A-0179 | Apple Mac OS X Security Update 2013-004 Severity: Category I - VMSKEY: V0040373 |
2013-B-0035 | Multiple Vulnerabilities in PostgreSQL Severity: Category I - VMSKEY: V0037619 |
2012-A-0136 | Multiple Vulnerabilities in Juniper Network Management Products Severity: Category I - VMSKEY: V0033662 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-12-03 | PostgreSQL SCRAM authentication stack buffer overflow attempt RuleID : 52039 - Type : SERVER-OTHER - Revision : 1 |
2019-12-03 | PostgreSQL SCRAM authentication stack buffer overflow attempt RuleID : 52038 - Type : SERVER-OTHER - Revision : 1 |
2019-09-17 | PostgreSQL interval stack buffer overflow attempt RuleID : 51046 - Type : SERVER-OTHER - Revision : 1 |
2018-05-29 | PostgreSQL Empty Password authentication bypass attempt RuleID : 46449 - Type : SERVER-OTHER - Revision : 1 |
2014-01-10 | PostgreSQL database name command line injection attempt RuleID : 26586 - Type : SERVER-OTHER - Revision : 4 |
2014-01-10 | PHP truncated crypt function attempt RuleID : 23896 - Type : SERVER-WEBAPP - Revision : 4 |
2014-01-10 | PHP truncated crypt function attempt RuleID : 23895 - Type : SERVER-WEBAPP - Revision : 5 |
2014-01-10 | truncated crypt function attempt RuleID : 23894 - Type : SERVER-WEBAPP - Revision : 7 |
2014-01-10 | PostgreSQL bit substring buffer overflow attempt RuleID : 16393 - Type : SERVER-OTHER - Revision : 9 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-08550a9006.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-5d1f7bd2d7.nasl - Type: ACT_GATHER_INFO |
2018-12-07 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1117.nasl - Type: ACT_GATHER_INFO |
2018-12-07 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1118.nasl - Type: ACT_GATHER_INFO |
2018-12-07 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1119.nasl - Type: ACT_GATHER_INFO |
2018-12-03 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201811-24.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-2860.nasl - Type: ACT_GATHER_INFO |
2018-11-09 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_1c27a706e3aa11e8b77a6cc21735f730.nasl - Type: ACT_GATHER_INFO |
2018-10-31 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201810-08.nasl - Type: ACT_GATHER_INFO |
2018-09-27 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1311.nasl - Type: ACT_GATHER_INFO |
2018-09-27 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1312.nasl - Type: ACT_GATHER_INFO |
2018-09-27 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-1080.nasl - Type: ACT_GATHER_INFO |
2018-09-20 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1079.nasl - Type: ACT_GATHER_INFO |
2018-09-20 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1080.nasl - Type: ACT_GATHER_INFO |
2018-09-07 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1074.nasl - Type: ACT_GATHER_INFO |
2018-08-31 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0178.nasl - Type: ACT_GATHER_INFO |
2018-08-31 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0087.nasl - Type: ACT_GATHER_INFO |
2018-08-29 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-2557.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2016-0015.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-0048.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0108.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0122.nasl - Type: ACT_GATHER_INFO |
2018-08-16 | Name: The remote Debian host is missing a security update. File: debian_DLA-1464.nasl - Type: ACT_GATHER_INFO |
2018-08-16 | Name: The remote Fedora host is missing a security update. File: fedora_2018-d8f5aea89d.nasl - Type: ACT_GATHER_INFO |
2018-08-13 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4269.nasl - Type: ACT_GATHER_INFO |