A man-in-the-middle attacker can inject false responses to the clients first few queries, despite the use of SSL certificate verification and encryption.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Postgresql | Postgresql | 9.6 (including) | 9.6.24 (excluding) |
Postgresql | Postgresql | 10.0 (including) | 10.19 (excluding) |
Postgresql | Postgresql | 11.0 (including) | 11.14 (excluding) |
Postgresql | Postgresql | 12.0 (including) | 12.9 (excluding) |
Postgresql | Postgresql | 13.0 (including) | 13.5 (excluding) |
Postgresql | Postgresql | 14.0 (including) | 14.0 (including) |
Red Hat Enterprise Linux 8 | RedHat | libpq-0:13.5-1.el8 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7 | RedHat | rh-postgresql13-postgresql-0:13.5-1.el7 | * |
Red Hat Software Collections for Red Hat Enterprise Linux 7 | RedHat | rh-postgresql12-postgresql-0:12.9-1.el7 | * |
Postgresql-10 | Ubuntu | bionic | * |
Postgresql-10 | Ubuntu | upstream | * |
Postgresql-12 | Ubuntu | focal | * |
Postgresql-12 | Ubuntu | trusty | * |
Postgresql-12 | Ubuntu | upstream | * |
Postgresql-13 | Ubuntu | hirsute | * |
Postgresql-13 | Ubuntu | impish | * |
Postgresql-13 | Ubuntu | upstream | * |
Postgresql-9.1 | Ubuntu | trusty | * |
Postgresql-9.3 | Ubuntu | trusty | * |
Postgresql-9.3 | Ubuntu | trusty/esm | * |
Postgresql-9.5 | Ubuntu | esm-infra/xenial | * |
Postgresql-9.5 | Ubuntu | xenial | * |