Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-1447 (GCVE-0-2010-1447)
Vulnerability from cvelistv5 – Published: 2010-05-19 18:13 – Updated: 2024-08-07 01:21- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T01:21:19.216Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "MDVSA-2010:115",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:115"
},
{
"name": "DSA-2267",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2267"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://security-tracker.debian.org/tracker/CVE-2010-1447"
},
{
"name": "oval:org.mitre.oval:def:7320",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7320"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.postgresql.org/about/news.1203"
},
{
"name": "ADV-2010-1167",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/1167"
},
{
"name": "39845",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/39845"
},
{
"name": "oval:org.mitre.oval:def:11530",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11530"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugs.launchpad.net/bugs/cve/2010-1447"
},
{
"name": "64756",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/64756"
},
{
"name": "RHSA-2010:0457",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0457.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "40049",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/40049"
},
{
"name": "40052",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/40052"
},
{
"name": "RHSA-2010:0458",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0458.html"
},
{
"name": "1023988",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1023988"
},
{
"name": "[oss-security] 20100520 CVE-2010-1974 reject request (dupe of CVE-2010-1168) and CVE-2010-1447 description modification request",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2010/05/20/5"
},
{
"name": "40305",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/40305"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=588269"
},
{
"name": "MDVSA-2010:116",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:116"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-05-14T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-18T12:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "MDVSA-2010:115",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:115"
},
{
"name": "DSA-2267",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2267"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://security-tracker.debian.org/tracker/CVE-2010-1447"
},
{
"name": "oval:org.mitre.oval:def:7320",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7320"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.postgresql.org/about/news.1203"
},
{
"name": "ADV-2010-1167",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/1167"
},
{
"name": "39845",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/39845"
},
{
"name": "oval:org.mitre.oval:def:11530",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11530"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugs.launchpad.net/bugs/cve/2010-1447"
},
{
"name": "64756",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/64756"
},
{
"name": "RHSA-2010:0457",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0457.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "40049",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/40049"
},
{
"name": "40052",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/40052"
},
{
"name": "RHSA-2010:0458",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0458.html"
},
{
"name": "1023988",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1023988"
},
{
"name": "[oss-security] 20100520 CVE-2010-1974 reject request (dupe of CVE-2010-1168) and CVE-2010-1447 description modification request",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2010/05/20/5"
},
{
"name": "40305",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/40305"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=588269"
},
{
"name": "MDVSA-2010:116",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:116"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-1447",
"datePublished": "2010-05-19T18:13:00.000Z",
"dateReserved": "2010-04-15T00:00:00.000Z",
"dateUpdated": "2024-08-07T01:21:19.216Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CERTA-2011-AVI-726
Vulnerability from certfr_avis - Published: 2011-12-28 - Updated: 2011-12-28
Plusieurs vulnérabilités dans F5 Enterprise Manager permettent de contourner la politique de sécurité, d'effectuer un déni de service à distance, ou de faire une élévation de privilèges localement.
Description
Se réferer aux notes de mises à jour de l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
La version 2.3.0 corrige ces vulnérabilités.
F5 Enterprise Manager 2.x.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eF5 Enterprise Manager 2.x.\u003c/p\u003e",
"content": "## Description\n\nSe r\u00e9ferer aux notes de mises \u00e0 jour de l\u0027\u00e9diteur.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n\nLa version 2.3.0 corrige ces vuln\u00e9rabilit\u00e9s.\n",
"cves": [
{
"name": "CVE-2010-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1447"
},
{
"name": "CVE-2010-1321",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1321"
},
{
"name": "CVE-2010-1168",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1168"
},
{
"name": "CVE-2008-5302",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5302"
},
{
"name": "CVE-2008-5303",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5303"
}
],
"initial_release_date": "2011-12-28T00:00:00",
"last_revision_date": "2011-12-28T00:00:00",
"links": [
{
"title": "Note de mise \u00e0 jour F5 Enterprise Manager version 2.3.0 du 21 d\u00e9cembre 2011 :",
"url": "http://support.f5.com/kb/en-us/products/em/releasenotes/product/relnote-em-2-3-0.html"
}
],
"reference": "CERTA-2011-AVI-726",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-12-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans F5 Enterprise Manager permettent de\ncontourner la politique de s\u00e9curit\u00e9, d\u0027effectuer un d\u00e9ni de service \u00e0\ndistance, ou de faire une \u00e9l\u00e9vation de privil\u00e8ges localement.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans F5 Enterprise Manager",
"vendor_advisories": [
{
"published_at": null,
"title": "Note de mise \u00e0 jour F5 Enterprise Manager 2.3.0 du 21 d\u00e9cembre 2011",
"url": null
}
]
}
CERTA-2010-AVI-214
Vulnerability from certfr_avis - Published: 2010-05-18 - Updated: 2010-07-15
Des vulnérabilités multiples affectent PostgreSQL et permettent à un utilisateur malveillant d'exécuter du code arbitraire, de contourner la politique de sécurité ou d'élever ses privilèges.
Description
Plusieurs vulnérabilités sont présentes dans PostgreSQL :
- Le module PL/Perl, s'il est installé et activé, peut permettre l'exécution de code PERL arbitraire sur le serveur ;
- Le module PL/Tcl, s'il est installé et activé, peut permettre l'exécution de code Tcl arbitraire sur le serveur.
D'autres vulnérabilités non spécifiées affectent aussi les versions vulnérables de PostgreSQL.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation). Les versions 8.4.4, 8.3.11, 8.2.17, 8.1.21, 8.0.25 et 7.4.29 corrigent ces problèmes.
Les versions 7.4, 8.0, 8.1, 8.2, 8.3 et 8.4 de PostgreSQL sont affectées.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eLes versions 7.4, 8.0, 8.1, 8.2, 8.3 et 8.4 de \u003cTT\u003ePostgreSQL\u003c/TT\u003e sont affect\u00e9es.\u003c/p\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans PostgreSQL :\n\n- Le module PL/Perl, s\u0027il est install\u00e9 et activ\u00e9, peut permettre\n l\u0027ex\u00e9cution de code PERL arbitraire sur le serveur ;\n- Le module PL/Tcl, s\u0027il est install\u00e9 et activ\u00e9, peut permettre\n l\u0027ex\u00e9cution de code Tcl arbitraire sur le serveur.\n\nD\u0027autres vuln\u00e9rabilit\u00e9s non sp\u00e9cifi\u00e9es affectent aussi les versions\nvuln\u00e9rables de PostgreSQL.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation). Les versions 8.4.4, 8.3.11,\n8.2.17, 8.1.21, 8.0.25 et 7.4.29 corrigent ces probl\u00e8mes.\n",
"cves": [
{
"name": "CVE-2010-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1447"
},
{
"name": "CVE-2010-1169",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1169"
},
{
"name": "CVE-2010-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1170"
}
],
"initial_release_date": "2010-05-18T00:00:00",
"last_revision_date": "2010-07-15T00:00:00",
"links": [
{
"title": "Bulletins de s\u00e9curit\u00e9 Sun Solaris du 15 juillet 2010 : \n 1",
"url": "http://blogs.sun.com/security/entry/cve_2010_1169_cve_20101"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur PostgreSQL :",
"url": "http://www.postgresql.org/about/news.1203"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Sun Solaris du 15 juillet 2010 : \n 1",
"url": "http://blogs.sun.com/security/entry/cve_2010_1169_cve_2010"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-22051-1 du 24 mai 2010 :",
"url": "http://www.debian.org/security/2010/dsa-2051"
}
],
"reference": "CERTA-2010-AVI-214",
"revisions": [
{
"description": "version initiale ;",
"revision_date": "2010-05-18T00:00:00.000000"
},
{
"description": "ajout du bulletin de s\u00e9curit\u00e9 Debian ;",
"revision_date": "2010-05-25T00:00:00.000000"
},
{
"description": "ajout des bulletins de s\u00e9curit\u00e9 Sun Solaris.",
"revision_date": "2010-07-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Des vuln\u00e9rabilit\u00e9s multiples affectent PostgreSQL et permettent \u00e0 un\nutilisateur malveillant d\u0027ex\u00e9cuter du code arbitraire, de contourner la\npolitique de s\u00e9curit\u00e9 ou d\u0027\u00e9lever ses privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans PostgreSQL",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis de s\u00e9curit\u00e9 de PostgreSQL du 14 mai 2010",
"url": null
}
]
}
CERTFR-2015-AVI-431
Vulnerability from certfr_avis - Published: 2015-10-15 - Updated: 2015-10-15
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QFabric 3100 Director versions 12.x",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ScreenOS",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "CTPView 7.0R3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Juniper Junos OS",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2905"
},
{
"name": "CVE-2011-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2483"
},
{
"name": "CVE-2013-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1667"
},
{
"name": "CVE-2012-3417",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3417"
},
{
"name": "CVE-2014-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0063"
},
{
"name": "CVE-2015-5600",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5600"
},
{
"name": "CVE-2014-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3566"
},
{
"name": "CVE-2014-8867",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8867"
},
{
"name": "CVE-2015-1793",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1793"
},
{
"name": "CVE-2015-1791",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1791"
},
{
"name": "CVE-2009-3490",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3490"
},
{
"name": "CVE-2012-0866",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0866"
},
{
"name": "CVE-2010-3433",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3433"
},
{
"name": "CVE-2012-5526",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5526"
},
{
"name": "CVE-2010-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1447"
},
{
"name": "CVE-2014-0061",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0061"
},
{
"name": "CVE-2009-0115",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0115"
},
{
"name": "CVE-2007-6067",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6067"
},
{
"name": "CVE-2010-0826",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0826"
},
{
"name": "CVE-2014-8159",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8159"
},
{
"name": "CVE-2010-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0211"
},
{
"name": "CVE-2013-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4242"
},
{
"name": "CVE-2015-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1158"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2010-4352",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4352"
},
{
"name": "CVE-2015-7749",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7749"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2010-1168",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1168"
},
{
"name": "CVE-2009-1189",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1189"
},
{
"name": "CVE-2014-6450",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6450"
},
{
"name": "CVE-2015-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1789"
},
{
"name": "CVE-2008-2937",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2937"
},
{
"name": "CVE-2012-2697",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2697"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2011-1081",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1081"
},
{
"name": "CVE-2009-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1632"
},
{
"name": "CVE-2012-3488",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3488"
},
{
"name": "CVE-2015-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5361"
},
{
"name": "CVE-2013-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6435"
},
{
"name": "CVE-2010-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2761"
},
{
"name": "CVE-2012-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5195"
},
{
"name": "CVE-2015-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1788"
},
{
"name": "CVE-2014-6449",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6449"
},
{
"name": "CVE-2015-1792",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1792"
},
{
"name": "CVE-2014-6451",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6451"
},
{
"name": "CVE-2012-6329",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6329"
},
{
"name": "CVE-2014-4345",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4345"
},
{
"name": "CVE-2008-5302",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5302"
},
{
"name": "CVE-2013-6629",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6629"
},
{
"name": "CVE-2014-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2285"
},
{
"name": "CVE-2013-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4449"
},
{
"name": "CVE-2012-0868",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0868"
},
{
"name": "CVE-2007-4476",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4476"
},
{
"name": "CVE-2010-4410",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4410"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2015-7752",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7752"
},
{
"name": "CVE-2010-0407",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0407"
},
{
"name": "CVE-2014-0064",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0064"
},
{
"name": "CVE-2014-0065",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0065"
},
{
"name": "CVE-2007-4772",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4772"
},
{
"name": "CVE-2013-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0292"
},
{
"name": "CVE-2012-6151",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6151"
},
{
"name": "CVE-2008-5303",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5303"
},
{
"name": "CVE-2015-1159",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1159"
},
{
"name": "CVE-2011-2200",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2200"
},
{
"name": "CVE-2015-7748",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7748"
},
{
"name": "CVE-2015-7750",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7750"
},
{
"name": "CVE-2015-7751",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7751"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2008-3834",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3834"
},
{
"name": "CVE-2010-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0624"
},
{
"name": "CVE-2014-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0062"
},
{
"name": "CVE-2011-1025",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1025"
},
{
"name": "CVE-2014-6448",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6448"
},
{
"name": "CVE-2011-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3597"
},
{
"name": "CVE-2010-0212",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0212"
},
{
"name": "CVE-2009-1185",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1185"
},
{
"name": "CVE-2009-4901",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4901"
},
{
"name": "CVE-2010-1172",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1172"
},
{
"name": "CVE-2010-4530",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4530"
},
{
"name": "CVE-2011-1024",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1024"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2014-0060",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0060"
},
{
"name": "CVE-1999-0524",
"url": "https://www.cve.org/CVERecord?id=CVE-1999-0524"
},
{
"name": "CVE-2010-4015",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4015"
},
{
"name": "CVE-2011-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0002"
},
{
"name": "CVE-2009-1574",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1574"
},
{
"name": "CVE-2009-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3736"
},
{
"name": "CVE-2015-1790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1790"
},
{
"name": "CVE-2012-2143",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2143"
},
{
"name": "CVE-2014-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0066"
},
{
"name": "CVE-2010-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0001"
}
],
"initial_release_date": "2015-10-15T00:00:00",
"last_revision_date": "2015-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-431",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10694 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10700 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10700\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10703 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10703\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10708 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10708\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10705 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10706 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10706\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10695 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10695\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10699 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10699\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10697 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10697\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10707 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10707\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10702 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10702\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10704 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10704\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10696 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10696\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10701 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10701\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
GHSA-F2R8-6HG3-MV9J
Vulnerability from github – Published: 2022-05-02 06:22 – Updated: 2022-05-02 06:22The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.
{
"affected": [],
"aliases": [
"CVE-2010-1447"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2010-05-19T18:30:00Z",
"severity": "HIGH"
},
"details": "The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.",
"id": "GHSA-f2r8-6hg3-mv9j",
"modified": "2022-05-02T06:22:53Z",
"published": "2022-05-02T06:22:53Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1447"
},
{
"type": "WEB",
"url": "https://bugs.launchpad.net/bugs/cve/2010-1447"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=588269"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11530"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7320"
},
{
"type": "WEB",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"type": "WEB",
"url": "http://osvdb.org/64756"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/39845"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/40049"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/40052"
},
{
"type": "WEB",
"url": "http://security-tracker.debian.org/tracker/CVE-2010-1447"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2011/dsa-2267"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:115"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:116"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2010/05/20/5"
},
{
"type": "WEB",
"url": "http://www.postgresql.org/about/news.1203"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0457.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0458.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/40305"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1023988"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2010/1167"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2010-1447
Vulnerability from fkie_nvd - Published: 2010-05-19 18:30 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
| secalert@redhat.com | http://osvdb.org/64756 | ||
| secalert@redhat.com | http://secunia.com/advisories/39845 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/40049 | ||
| secalert@redhat.com | http://secunia.com/advisories/40052 | ||
| secalert@redhat.com | http://security-tracker.debian.org/tracker/CVE-2010-1447 | ||
| secalert@redhat.com | http://www.debian.org/security/2011/dsa-2267 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2010:115 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2010:116 | ||
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2010/05/20/5 | ||
| secalert@redhat.com | http://www.postgresql.org/about/news.1203 | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2010-0457.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2010-0458.html | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/40305 | ||
| secalert@redhat.com | http://www.securitytracker.com/id?1023988 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2010/1167 | Patch, Vendor Advisory | |
| secalert@redhat.com | https://bugs.launchpad.net/bugs/cve/2010-1447 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=588269 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11530 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7320 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/64756 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39845 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/40049 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/40052 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://security-tracker.debian.org/tracker/CVE-2010-1447 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2267 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2010:115 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2010:116 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2010/05/20/5 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.postgresql.org/about/news.1203 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0457.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0458.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/40305 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1023988 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1167 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugs.launchpad.net/bugs/cve/2010-1447 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=588269 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11530 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7320 |
| Vendor | Product | Version | |
|---|---|---|---|
| postgresql | postgresql | 7.4 | |
| postgresql | postgresql | 7.4.1 | |
| postgresql | postgresql | 7.4.2 | |
| postgresql | postgresql | 7.4.3 | |
| postgresql | postgresql | 7.4.4 | |
| postgresql | postgresql | 7.4.5 | |
| postgresql | postgresql | 7.4.6 | |
| postgresql | postgresql | 7.4.7 | |
| postgresql | postgresql | 7.4.8 | |
| postgresql | postgresql | 7.4.9 | |
| postgresql | postgresql | 7.4.10 | |
| postgresql | postgresql | 7.4.11 | |
| postgresql | postgresql | 7.4.12 | |
| postgresql | postgresql | 7.4.13 | |
| postgresql | postgresql | 7.4.14 | |
| postgresql | postgresql | 7.4.15 | |
| postgresql | postgresql | 7.4.16 | |
| postgresql | postgresql | 7.4.17 | |
| postgresql | postgresql | 7.4.18 | |
| postgresql | postgresql | 7.4.19 | |
| postgresql | postgresql | 7.4.20 | |
| postgresql | postgresql | 7.4.21 | |
| postgresql | postgresql | 7.4.22 | |
| postgresql | postgresql | 7.4.23 | |
| postgresql | postgresql | 7.4.24 | |
| postgresql | postgresql | 7.4.25 | |
| postgresql | postgresql | 7.4.26 | |
| postgresql | postgresql | 7.4.27 | |
| postgresql | postgresql | 7.4.28 | |
| postgresql | postgresql | 8.0 | |
| postgresql | postgresql | 8.0.0 | |
| postgresql | postgresql | 8.0.1 | |
| postgresql | postgresql | 8.0.2 | |
| postgresql | postgresql | 8.0.3 | |
| postgresql | postgresql | 8.0.4 | |
| postgresql | postgresql | 8.0.5 | |
| postgresql | postgresql | 8.0.6 | |
| postgresql | postgresql | 8.0.7 | |
| postgresql | postgresql | 8.0.8 | |
| postgresql | postgresql | 8.0.9 | |
| postgresql | postgresql | 8.0.10 | |
| postgresql | postgresql | 8.0.11 | |
| postgresql | postgresql | 8.0.12 | |
| postgresql | postgresql | 8.0.13 | |
| postgresql | postgresql | 8.0.14 | |
| postgresql | postgresql | 8.0.15 | |
| postgresql | postgresql | 8.0.16 | |
| postgresql | postgresql | 8.0.17 | |
| postgresql | postgresql | 8.0.18 | |
| postgresql | postgresql | 8.0.19 | |
| postgresql | postgresql | 8.0.20 | |
| postgresql | postgresql | 8.0.21 | |
| postgresql | postgresql | 8.0.22 | |
| postgresql | postgresql | 8.0.23 | |
| postgresql | postgresql | 8.0.24 | |
| postgresql | postgresql | 8.1 | |
| postgresql | postgresql | 8.1.0 | |
| postgresql | postgresql | 8.1.1 | |
| postgresql | postgresql | 8.1.2 | |
| postgresql | postgresql | 8.1.3 | |
| postgresql | postgresql | 8.1.4 | |
| postgresql | postgresql | 8.1.5 | |
| postgresql | postgresql | 8.1.6 | |
| postgresql | postgresql | 8.1.7 | |
| postgresql | postgresql | 8.1.8 | |
| postgresql | postgresql | 8.1.9 | |
| postgresql | postgresql | 8.1.10 | |
| postgresql | postgresql | 8.1.11 | |
| postgresql | postgresql | 8.1.12 | |
| postgresql | postgresql | 8.1.13 | |
| postgresql | postgresql | 8.1.14 | |
| postgresql | postgresql | 8.1.15 | |
| postgresql | postgresql | 8.1.16 | |
| postgresql | postgresql | 8.1.17 | |
| postgresql | postgresql | 8.1.18 | |
| postgresql | postgresql | 8.1.19 | |
| postgresql | postgresql | 8.1.20 | |
| postgresql | postgresql | 8.2 | |
| postgresql | postgresql | 8.2.1 | |
| postgresql | postgresql | 8.2.2 | |
| postgresql | postgresql | 8.2.3 | |
| postgresql | postgresql | 8.2.4 | |
| postgresql | postgresql | 8.2.5 | |
| postgresql | postgresql | 8.2.6 | |
| postgresql | postgresql | 8.2.7 | |
| postgresql | postgresql | 8.2.8 | |
| postgresql | postgresql | 8.2.9 | |
| postgresql | postgresql | 8.2.10 | |
| postgresql | postgresql | 8.2.11 | |
| postgresql | postgresql | 8.2.12 | |
| postgresql | postgresql | 8.2.13 | |
| postgresql | postgresql | 8.2.14 | |
| postgresql | postgresql | 8.2.15 | |
| postgresql | postgresql | 8.2.16 | |
| postgresql | postgresql | 8.3 | |
| postgresql | postgresql | 8.3.1 | |
| postgresql | postgresql | 8.3.2 | |
| postgresql | postgresql | 8.3.3 | |
| postgresql | postgresql | 8.3.4 | |
| postgresql | postgresql | 8.3.5 | |
| postgresql | postgresql | 8.3.6 | |
| postgresql | postgresql | 8.3.7 | |
| postgresql | postgresql | 8.3.8 | |
| postgresql | postgresql | 8.3.9 | |
| postgresql | postgresql | 8.3.10 | |
| postgresql | postgresql | 8.4 | |
| postgresql | postgresql | 8.4.1 | |
| postgresql | postgresql | 8.4.2 | |
| postgresql | postgresql | 8.4.3 | |
| postgresql | postgresql | 9.0.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FBE2567C-BF48-4255-9E56-590A6F9DD932",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8DDD98-9A2D-402D-9172-F3C4C4C97FEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "20C8302B-631A-4DF7-839B-C6F3CC39E000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FB318EB9-1B49-452A-92CF-89D9BA990AB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5913A53B-7B72-4CBD-ADAE-318333EB8B7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "815E58C0-327D-4F14-B496-05FC8179627E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF2D056-5120-4F98-8343-4EC31F962CFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "516E0E86-3D8A-43F9-9DD5-865F5C889FC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5A7A9D3C-4BB6-4974-BF96-6E6728196F4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "486EDE1B-37E0-4DDF-BFC9-C8C8945D5E2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A7FC7F18-B227-4C46-9A33-FB34DDE456CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "BCDB903F-0C89-4E65-857E-553CF9C192E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F6BF8B1E-68F7-4F27-AD1F-FA02B256BDAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0DEB63-CA70-44C1-9491-E0790D1A8E21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "DA8E73E5-BA41-4FA2-8457-803A97FB00C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "4C9B64CA-778F-405D-A441-34599246A3F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "4975D8ED-7DCB-430F-98E1-DB165D6DA7E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.17:*:*:*:*:*:*:*",
"matchCriteriaId": "CCBF8CDE-5E75-4DF8-AE1A-B7377953917A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.18:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC4A04B-738C-4018-BB2F-FBEC8746200C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.19:*:*:*:*:*:*:*",
"matchCriteriaId": "36A2824A-A43F-436B-B9DA-B7E283A00426",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.20:*:*:*:*:*:*:*",
"matchCriteriaId": "DBBAF0F1-7A70-41DC-89A7-2EF9851E4FC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.21:*:*:*:*:*:*:*",
"matchCriteriaId": "4A12EC07-1938-41BF-BCFC-C269668F1EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.22:*:*:*:*:*:*:*",
"matchCriteriaId": "14D7CE0D-510C-46BB-8896-42DD84F57017",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.23:*:*:*:*:*:*:*",
"matchCriteriaId": "1AA5858F-7DFF-460D-B862-83DD636D0A36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.24:*:*:*:*:*:*:*",
"matchCriteriaId": "4394564D-131D-41C8-AE3A-BFF44779F27B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.25:*:*:*:*:*:*:*",
"matchCriteriaId": "2CCC06DB-1C93-4DE5-AEDC-03E532DA89F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.26:*:*:*:*:*:*:*",
"matchCriteriaId": "62133846-C0C8-473A-A842-2A8AF50C2FD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.27:*:*:*:*:*:*:*",
"matchCriteriaId": "9AB9B446-0D32-435A-94DC-CB9270A07CE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.28:*:*:*:*:*:*:*",
"matchCriteriaId": "1DC67BC8-B041-4428-86B4-6F9D501B11C9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "94222D76-82BE-4FFB-BE4B-5DBAF3080D4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B45F3BF0-9EB6-4A06-B6F7-DE95DD13EFBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "91D1232E-4D0A-4BDC-99F6-25AEE014E9AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "105E9F52-D17E-4A0B-9C46-FD32A930B1E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0DE2055D-AAA4-4A6A-918F-349A9749AF09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C12409B2-161B-4F78-B7AD-3CF69DDCC574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DD2F1DA4-6625-469D-988B-5457B68851A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "870F4348-6001-4C2F-A547-61964074E7C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E2E26D52-D95A-4547-BE6E-4F142F54A624",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4AAB2D1D-BE61-4D7C-B305-58B4F4126620",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2A5F8D8B-34C5-4EBC-BB20-4D11191238B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E260F1F9-0068-4289-A8E8-C30220C2E1F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE16023-9A5E-46D5-B597-E6885C224786",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "84D64D74-9645-4CB7-B710-4FC26FB65B37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF2794E-6B48-496B-B6CA-CDC7FC2160CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "8EB12063-F487-4067-A7A5-4482E19D8D14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "51AE5B72-DDC5-4207-B467-A9583F3AC781",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "99398182-C98C-4B16-9DBA-B1980BDFFA54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "E6FEC1DE-A2A5-4945-95B8-75FDC9ED3B63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "264AB44D-D014-4734-B538-09E5834EC30B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "8D5DD1E6-E190-4D75-9D27-5EFB2544B158",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "3CD7F8CA-09B3-4038-B8B0-2D62A77F2478",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "64815C3D-1A1A-4525-9BCD-D89BAEACC950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "7B61AFB3-818D-4A82-8C80-9CA9A1DCC090",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "86630398-650C-4DAC-95CC-894089BB9122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "A890CD31-1BC2-4A67-88B7-D03097D7167D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2AF590F2-899F-42E1-8A57-6F514C94CE4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C0B9704E-4BA9-4389-83AB-62BC65F81D9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FEEC35A2-B17C-46EC-8697-9E03568339BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "00562C18-DD81-4B09-AF93-739AF8757A12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6B52D093-7867-4FE8-B055-D8190103A1E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DF1A06EE-26BD-4CDA-AEB9-01124FC37E37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FF855730-C61C-4FDC-96CB-57775A903421",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D93296E1-AEA2-443E-B9AA-D70535DDD093",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "992C3EC0-4C12-4FB0-8844-9EFB91DA95E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8E3EBF1D-D5BD-4A22-B76A-2BAB21534E70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "02DC4E8A-A728-4734-B67A-C58C37DA90C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "D59B0E32-9E71-4E41-BBAF-7A20008E43E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "CA6511DE-AF52-4953-8394-37D24A732538",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "51B93DC5-F632-47A5-9C58-52429B034D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "D011C676-47D3-4D78-9C58-749AF6C7DBDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "DFD5BE40-CF55-4C0E-BD89-5CC7DF41F6BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1EE1C3-4472-4CE2-AB60-9535C1C4AF8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "3B903334-2F67-4725-8277-6913E03BEFC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6E9049-B347-4940-B523-DBB96DBFE731",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1AD77C-BD28-43C9-B2CA-F60C1AD9D200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "BF2DBE6F-7F2B-4295-937A-8799BF25F2F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "E3D0A988-90DD-4EC4-A51A-4C55A23B8ECE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7213327F-6909-43A7-952E-11600C28D4E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "10EF0EA6-C8B6-40A7-A3AE-8639CA94D5C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D9F645F3-9767-4FD8-94EB-1096DF24E6C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C342A823-EF6F-4557-9F9E-D8893EA4C2BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B85A443F-0802-412F-9AEE-3525311C93D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "06253BA8-7F1E-4C79-9B2E-197307A627F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2A213AB8-A5FE-4062-B895-2FC4B19F60A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9A3F083E-59A8-41B1-826F-2CA39BD425C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DE49E2D5-8EAC-49C7-B704-E626FBE7EC35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A5059B2F-B588-463E-8E96-BC9DA129C12E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C919AF97-9713-44F8-B742-89C438DB0B48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "400BBC62-5D03-465B-A864-9CD479B963F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "BC8C96F7-7F85-4E47-A05F-15E3C70AF583",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6C236CF1-72C0-4C3D-AE04-B67E3F18EEC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "ECC98D47-8B3C-4DE6-8C45-F5B92266027F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "C170C441-619A-48DB-9332-05FA4E62C342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "053A2531-CFAA-466D-811C-A6154826D596",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A2A705DF-3654-427F-8B11-62DB0B6C9813",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "05AD5D33-86F4-4BFF-BA84-02AA1347BEEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "02FDCF30-D0F7-48AA-9633-9CC060495F47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "788975F6-B3F1-4C21-B963-6BA59F14B71C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E6713D96-338B-4467-9F05-3153997F62E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "01EB1A77-92AD-47FB-8290-D05C9B6C19C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "74857259-30C7-422D-A24D-BE1E33F09466",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CD80066B-787E-496B-88FD-F0AE291468C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "88C9F0AB-A125-4DCD-A02B-E04D4D95FB5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF13F89-F4C3-43EC-A36A-2F9283E923B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F2631F09-73DD-4A28-8082-3939D89DDBE0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8F30CA60-0A82-45CD-8044-CE245393593D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5C991F71-1E27-47A6-97DC-424FC3EF6011",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5740C7AA-1772-41D8-9851-3E3669CD8521",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "970338CD-A680-4DD0-BD27-459B0DDA4002",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:postgresql:postgresql:9.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "3497422D-BA91-4AA7-9792-CB5C3D48FB17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution."
},
{
"lang": "es",
"value": "Vulnerabilidad en PostgreSQL v7.4 anterior a v7.4.29, v8.0 anterior a v8.0.25, v8.1 anterior a v8.1.21, v8.2 anterior a v8.2.17, v8.3 anterior a v8.3.11, v8.4 anterior a v8.4.4, y v9.0 Beta anterior a v9.0 Beta 2, no restringe adecuadamente procedimientos PL/perl, lo que podr\u00eda permitir a atacantes remotos ejecutar c\u00f3digo Perl de su elecci\u00f3n a trav\u00e9s de una secuencia de comandos manipulada, relacionada con el m\u00f3dulo Safe (tambi\u00e9n conocido como Safe.pm) para Perl."
}
],
"id": "CVE-2010-1447",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2010-05-19T18:30:03.457",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"source": "secalert@redhat.com",
"url": "http://osvdb.org/64756"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/39845"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/40049"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/40052"
},
{
"source": "secalert@redhat.com",
"url": "http://security-tracker.debian.org/tracker/CVE-2010-1447"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2011/dsa-2267"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:115"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:116"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2010/05/20/5"
},
{
"source": "secalert@redhat.com",
"url": "http://www.postgresql.org/about/news.1203"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0457.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0458.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/40305"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securitytracker.com/id?1023988"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/1167"
},
{
"source": "secalert@redhat.com",
"url": "https://bugs.launchpad.net/bugs/cve/2010-1447"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=588269"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11530"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7320"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/64756"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/39845"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/40049"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/40052"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security-tracker.debian.org/tracker/CVE-2010-1447"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2011/dsa-2267"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:115"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:116"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2010/05/20/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.postgresql.org/about/news.1203"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0457.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0458.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/40305"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1023988"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/1167"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugs.launchpad.net/bugs/cve/2010-1447"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=588269"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11530"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7320"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2010-1447
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2010-1447",
"description": "The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.",
"id": "GSD-2010-1447",
"references": [
"https://www.suse.com/security/cve/CVE-2010-1447.html",
"https://www.debian.org/security/2011/dsa-2267",
"https://access.redhat.com/errata/RHSA-2010:0458",
"https://access.redhat.com/errata/RHSA-2010:0457",
"https://linux.oracle.com/cve/CVE-2010-1447.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2010-1447"
],
"details": "The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.",
"id": "GSD-2010-1447",
"modified": "2023-12-13T01:21:32.802548Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-1447",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705",
"refsource": "MISC",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "http://secunia.com/advisories/40049",
"refsource": "MISC",
"url": "http://secunia.com/advisories/40049"
},
{
"name": "http://secunia.com/advisories/40052",
"refsource": "MISC",
"url": "http://secunia.com/advisories/40052"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:115",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:115"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:116",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:116"
},
{
"name": "http://www.openwall.com/lists/oss-security/2010/05/20/5",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2010/05/20/5"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2010-0457.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0457.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2010-0458.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2010-0458.html"
},
{
"name": "http://secunia.com/advisories/39845",
"refsource": "MISC",
"url": "http://secunia.com/advisories/39845"
},
{
"name": "http://www.postgresql.org/about/news.1203",
"refsource": "MISC",
"url": "http://www.postgresql.org/about/news.1203"
},
{
"name": "http://www.securitytracker.com/id?1023988",
"refsource": "MISC",
"url": "http://www.securitytracker.com/id?1023988"
},
{
"name": "http://www.vupen.com/english/advisories/2010/1167",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2010/1167"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=588269",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=588269"
},
{
"name": "http://osvdb.org/64756",
"refsource": "MISC",
"url": "http://osvdb.org/64756"
},
{
"name": "http://security-tracker.debian.org/tracker/CVE-2010-1447",
"refsource": "MISC",
"url": "http://security-tracker.debian.org/tracker/CVE-2010-1447"
},
{
"name": "http://www.debian.org/security/2011/dsa-2267",
"refsource": "MISC",
"url": "http://www.debian.org/security/2011/dsa-2267"
},
{
"name": "http://www.securityfocus.com/bid/40305",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/40305"
},
{
"name": "https://bugs.launchpad.net/bugs/cve/2010-1447",
"refsource": "MISC",
"url": "https://bugs.launchpad.net/bugs/cve/2010-1447"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11530",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11530"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7320",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7320"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:7.4.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.0.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.2.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.2.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.2.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.2.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:postgresql:postgresql:9.0.0:beta1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-1447"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugs.launchpad.net/bugs/cve/2010-1447",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugs.launchpad.net/bugs/cve/2010-1447"
},
{
"name": "ADV-2010-1167",
"refsource": "VUPEN",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/1167"
},
{
"name": "39845",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/39845"
},
{
"name": "http://www.postgresql.org/about/news.1203",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.postgresql.org/about/news.1203"
},
{
"name": "http://security-tracker.debian.org/tracker/CVE-2010-1447",
"refsource": "CONFIRM",
"tags": [],
"url": "http://security-tracker.debian.org/tracker/CVE-2010-1447"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=588269",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=588269"
},
{
"name": "1023988",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1023988"
},
{
"name": "64756",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/64756"
},
{
"name": "40305",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/40305"
},
{
"name": "40052",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/40052"
},
{
"name": "RHSA-2010:0458",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0458.html"
},
{
"name": "[oss-security] 20100520 CVE-2010-1974 reject request (dupe of CVE-2010-1168) and CVE-2010-1447 description modification request",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2010/05/20/5"
},
{
"name": "MDVSA-2010:116",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:116"
},
{
"name": "RHSA-2010:0457",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2010-0457.html"
},
{
"name": "MDVSA-2010:115",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:115"
},
{
"name": "40049",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/40049"
},
{
"name": "DSA-2267",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2011/dsa-2267"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705",
"refsource": "CONFIRM",
"tags": [],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "oval:org.mitre.oval:def:7320",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7320"
},
{
"name": "oval:org.mitre.oval:def:11530",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11530"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2017-09-19T01:30Z",
"publishedDate": "2010-05-19T18:30Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.