Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
postgresql postgresql vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2006-4041
SQL injection vulnerability in Pike prior to 7.6.86, when using a Postgres database server, allows remote malicious users to execute arbitrary SQL commands via unspecified attack vectors.
Pike Pike 0.5
Pike Pike 0.6
Pike Pike
Pike Pike 7.4
Pike Pike 7.4.327
Pike Pike 0.4 Pl8
Pike Pike 7.4.328
Pike Pike 7.6
Pike Pike 7.6.36
Pike Pike 7.0
Pike Pike 7.2
7.5
CVSSv2
CVE-2006-2824
Logicalware MailManager prior to 2.0.10 does not remove 0xc8 0x27 (0xc8 followed by a single-quote character) from the data stream to the server, which allows remote malicious users to modify data and gain administrative access when PostgreSQL is used, aka "bug #1494281 - Po...
Logicalware Mailmanager 2.0
Logicalware Mailmanager 2.0.1
Logicalware Mailmanager 2.0.7
Logicalware Mailmanager 2.0.8
Logicalware Mailmanager 2.0.5
Logicalware Mailmanager 2.0.6
Logicalware Mailmanager 2.0.1 Rc2
Logicalware Mailmanager 2.0.2
Logicalware Mailmanager 2.0.9
Logicalware Mailmanager 2.0 R7
Logicalware Mailmanager 2.0.3
Logicalware Mailmanager 2.0.4
7.5
CVSSv2
CVE-2006-2753
SQL injection vulnerability in MySQL 4.1.x prior to 4.1.20 and 5.0.x prior to 5.0.22 allows context-dependent malicious users to execute arbitrary SQL commands via crafted multibyte encodings in character sets such as SJIS, BIG5, and GBK, which are not properly handled when the m...
Mysql Mysql 4.1.14
Mysql Mysql 4.1.15
Oracle Mysql 4.1.4
Oracle Mysql 4.1.5
Mysql Mysql 5.0.10
Oracle Mysql 5.0.11
Oracle Mysql 5.0.12
Oracle Mysql 5.0.19
Mysql Mysql 5.0.2
Oracle Mysql 5.0.6
Oracle Mysql 5.0.7
Mysql Mysql 4.1.12
Mysql Mysql 4.1.13
Mysql Mysql 4.1.2
Mysql Mysql 4.1.3
Mysql Mysql 5.0.0
Mysql Mysql 5.0.1
Mysql Mysql 4.1.0
Oracle Mysql 4.1.1
Oracle Mysql 4.1.16
Oracle Mysql 4.1.17
Oracle Mysql 4.1.6
7.5
CVSSv2
CVE-2006-2313
PostgreSQL 8.1.x prior to 8.1.4, 8.0.x prior to 8.0.8, 7.4.x prior to 7.4.13, 7.3.x prior to 7.3.15, and previous versions versions allows context-dependent malicious users to bypass SQL injection protection methods in applications via invalid encodings of multibyte characters, a...
Postgresql Postgresql 7.3
Postgresql Postgresql 7.3.2
Postgresql Postgresql 7.3.3
Postgresql Postgresql 7.4.1
Postgresql Postgresql 7.4.10
Postgresql Postgresql 7.4.6
Postgresql Postgresql 7.4.7
Postgresql Postgresql 8.0.4
Postgresql Postgresql 8.0.5
Postgresql Postgresql 7.3.13
Postgresql Postgresql 7.3.14
Postgresql Postgresql 7.3.8
Postgresql Postgresql 7.3.9
Postgresql Postgresql 7.4
Postgresql Postgresql 7.4.4
Postgresql Postgresql 7.4.5
Postgresql Postgresql 8.0.2
Postgresql Postgresql 8.0.3
Postgresql Postgresql 8.1.3
Postgresql Postgresql 7.3.1
Postgresql Postgresql 7.3.10
Postgresql Postgresql 7.3.4
7.5
CVSSv2
CVE-2006-2314
PostgreSQL 8.1.x prior to 8.1.4, 8.0.x prior to 8.0.8, 7.4.x prior to 7.4.13, 7.3.x prior to 7.3.15, and previous versions versions allows context-dependent malicious users to bypass SQL injection protection methods in applications that use multibyte encodings that allow the &quo...
Postgresql Postgresql 7.3
Postgresql Postgresql 7.3.1
Postgresql Postgresql 7.3.3
Postgresql Postgresql 7.3.4
Postgresql Postgresql 7.4.1
Postgresql Postgresql 7.4.10
Postgresql Postgresql 7.4.7
Postgresql Postgresql 7.4.8
Postgresql Postgresql 8.0.5
Postgresql Postgresql 8.0.6
Postgresql Postgresql 7.3.14
Postgresql Postgresql 7.3.2
Postgresql Postgresql 7.3.10
Postgresql Postgresql 7.3.9
Postgresql Postgresql 7.4
Postgresql Postgresql 7.4.5
Postgresql Postgresql 7.4.6
Postgresql Postgresql 8.0.3
Postgresql Postgresql 8.0.4
Postgresql Postgresql 8.1.3
Postgresql Postgresql 7.3.11
Postgresql Postgresql 7.3.5
7.5
CVSSv2
CVE-2005-1409
PostgreSQL 7.3.x up to and including 8.0.x gives public EXECUTE access to certain character conversion functions, which allows unprivileged users to call those functions with malicious values, with unknown impact, aka the "Character conversion vulnerability."
Postgresql Postgresql 7.2.1
Postgresql Postgresql 7.2.2
Postgresql Postgresql 7.3.1
Postgresql Postgresql 7.3.2
Postgresql Postgresql 7.3.9
Postgresql Postgresql 7.4
Postgresql Postgresql 8.0
Postgresql Postgresql 8.0.1
Postgresql Postgresql 7.2.3
Postgresql Postgresql 7.2.4
Postgresql Postgresql 7.3.3
Postgresql Postgresql 7.3.4
Postgresql Postgresql 7.4.1
Postgresql Postgresql 7.4.2
Postgresql Postgresql 8.0.2
Postgresql Postgresql 7.2.7
Postgresql Postgresql 7.3
Postgresql Postgresql 7.3.7
Postgresql Postgresql 7.3.8
Postgresql Postgresql 7.4.6
Postgresql Postgresql 7.4.7
Postgresql Postgresql 7.2.5
7.5
CVSSv2
CVE-2005-0245
Buffer overflow in gram.y for PostgreSQL 8.0.0 and previous versions may allow malicious users to execute arbitrary code via a large number of arguments to a refcursor function (gram.y), which leads to a heap-based buffer overflow, a different vulnerability than CVE-2005-0247.
Postgresql Postgresql 8.0
Postgresql Postgresql
1 EDB exploit
7.5
CVSSv2
CVE-2004-0366
SQL injection vulnerability in the libpam-pgsql library prior to 0.5.2 allows malicious users to execute arbitrary SQL statements.
Pam-pgsql Pam-pgsql
7.5
CVSSv2
CVE-2003-0901
Buffer overflow in to_ascii for PostgreSQL 7.2.x, and 7.3.x prior to 7.3.4, allows remote malicious users to execute arbitrary code.
Postgresql Postgresql 7.2.1
Postgresql Postgresql 7.3.1
Postgresql Postgresql 7.3.3
Postgresql Postgresql 7.2.2
Postgresql Postgresql 7.2.3
Postgresql Postgresql 7.2.4
Postgresql Postgresql 7.3
Postgresql Postgresql 7.2
Postgresql Postgresql 7.3.2
7.5
CVSSv2
CVE-2003-0515
SQL injection vulnerabilities in the (1) PostgreSQL or (2) MySQL authentication modules for teapop 0.3.5 and previous versions allow malicious users to execute arbitrary SQL and possibly gain privileges.
Teapop Teapop 0.3.4
Teapop Teapop 0.3.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »