Redhat

Software Collections

137 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.72%
  • Published 10.12.2023 18:15:07
  • Last modified 21.11.2024 08:42:40

A memory disclosure vulnerability was found in PostgreSQL that allows remote users to access sensitive information by exploiting certain aggregate function calls with 'unknown'-type arguments. Handling 'unknown'-type values from string literals witho...

  • EPSS 1.61%
  • Published 10.12.2023 18:15:07
  • Last modified 21.11.2024 08:42:40

A flaw was found in PostgreSQL that allows authenticated database users to execute arbitrary code through missing overflow checks during SQL array value modification. This issue exists due to an integer overflow during array modification where a remo...

  • EPSS 0.65%
  • Published 10.12.2023 18:15:07
  • Last modified 21.11.2024 08:42:40

A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension wi...

  • EPSS 0.08%
  • Published 02.11.2023 16:15:08
  • Last modified 20.03.2025 17:01:07

A vulnerability was found in PHP where setting the environment variable PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer overflow.

  • EPSS 0.61%
  • Published 11.08.2023 13:15:09
  • Last modified 21.11.2024 08:15:22

IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, tru...

  • EPSS 0.24%
  • Published 09.06.2023 19:15:09
  • Last modified 06.01.2025 18:15:13

schema_element defeats protective search_path changes; It was found that certain database calls in PostgreSQL could permit an authed attacker with elevated database-level privileges to execute arbitrary code.

  • EPSS 0.21%
  • Published 09.06.2023 19:15:09
  • Last modified 06.01.2025 18:15:13

Row security policies disregard user ID changes after inlining; PostgreSQL could permit incorrect policies to be applied in certain cases where role-specific policies are used and a given query is planned under one role and then executed under other ...

  • EPSS 0.15%
  • Published 23.03.2023 21:15:19
  • Last modified 25.02.2025 20:15:31

An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impac...

Media report Exploit
  • EPSS 0.14%
  • Published 06.03.2023 23:15:11
  • Last modified 21.11.2024 07:36:12

A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confident...

  • EPSS 0.31%
  • Published 09.09.2022 14:15:08
  • Last modified 21.11.2024 04:55:57

A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes()...