Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:generic/postgresql@8.0.0
purl pkg:generic/postgresql@8.0.0
Next non-vulnerable version 8.0.1
Latest non-vulnerable version 18.2.0
Risk 10.0
Vulnerabilities affecting this package (25)
Vulnerability Summary Fixed by
VCID-1qsp-wvwq-j3f5
Aliases:
CVE-2009-0922
It is possible to cause a momentary denial of service when there is a failure to convert a localized error message to the client-specified encoding. A valid login is required to exploit this vulnerability.more details
8.0.21
Affected by 0 other vulnerabilities.
8.1.17
Affected by 0 other vulnerabilities.
8.2.13
Affected by 0 other vulnerabilities.
8.3.7
Affected by 0 other vulnerabilities.
VCID-1uzm-h9m3-akge
Aliases:
CVE-2010-1170
Insecure permissions on the pltcl_modules table could allow an authenticated user to run arbitrary Tcl code on the database server if PL/Tcl is installed and enabled.more details
8.0.25
Affected by 0 other vulnerabilities.
8.1.21
Affected by 0 other vulnerabilities.
8.2.17
Affected by 0 other vulnerabilities.
8.3.11
Affected by 0 other vulnerabilities.
8.4.4
Affected by 0 other vulnerabilities.
VCID-4tyx-g9kz-y3fq
Aliases:
CVE-2006-5541
A bug in the coercion of unknown literals to ANYARRAY can cause a denial of service. A valid login is required to exploit this vulnerability.more details
8.0.9
Affected by 0 other vulnerabilities.
8.1.5
Affected by 0 other vulnerabilities.
VCID-5zj2-a3y7-zueh
Aliases:
CVE-2007-6601
DBLink functions combined with local trust or ident access control could be used by a malicious user togain superuser privileges. A valid login is required to exploit this vulnerability.more details
8.0.15
Affected by 0 other vulnerabilities.
8.1.11
Affected by 0 other vulnerabilities.
8.2.6
Affected by 0 other vulnerabilities.
VCID-6ppw-nxh2-2bfs
Aliases:
CVE-2006-0678
A bug in the handling of SET SESSION AUTHORIZATION can cause a backend crash in Assert enabled builds. This will cause the postmaster to restart all backend, resulting in a denial of service. A valid login is required to exploit this vulnerability.more details
8.0.7
Affected by 0 other vulnerabilities.
VCID-721k-9zdg-buhv
Aliases:
CVE-2009-3230
The fix for issue CVE-2007-6600 (below) failed to include protection against misuse of RESET SESSION AUTHORIZATION.more details
8.0.22
Affected by 0 other vulnerabilities.
8.1.18
Affected by 0 other vulnerabilities.
8.2.14
Affected by 0 other vulnerabilities.
8.3.8
Affected by 0 other vulnerabilities.
8.4.1
Affected by 0 other vulnerabilities.
VCID-7q99-jk4u-1fen
Aliases:
CVE-2010-3433
An authenticated database user can manipulate modules and tied variables in some external procedural languages to execute code with enhanced privileges.Detailsmore details
8.0.26
Affected by 0 other vulnerabilities.
8.1.22
Affected by 0 other vulnerabilities.
8.2.18
Affected by 0 other vulnerabilities.
8.3.12
Affected by 0 other vulnerabilities.
8.4.5
Affected by 0 other vulnerabilities.
9.0.1
Affected by 0 other vulnerabilities.
VCID-8753-jd2h-8yhw
Aliases:
CVE-2005-0244
EXECUTE permissions are not properly checked when creating aggregates. A valid login is required to exploit this vulnerability.more details
8.0.1
Affected by 0 other vulnerabilities.
VCID-8z74-udgw-kue3
Aliases:
CVE-2006-2314
The widely-used practice of escaping ASCII single quote "'" by turning it into "\'" is unsafe when operating in multibyte encodings that allow 0x5c (ASCII code for backslash) as the trailing byte of a multibyte character.more details
8.0.8
Affected by 0 other vulnerabilities.
8.1.4
Affected by 0 other vulnerabilities.
VCID-978k-4cn7-bfbz
Aliases:
CVE-2007-0556
A vulnerability involving changing the data type of a table column can easily be exploited to cause a backend crash, and in principle might be used to read database content that the user should not be able to access.more details
8.0.11
Affected by 0 other vulnerabilities.
8.1.7
Affected by 0 other vulnerabilities.
8.2.2
Affected by 0 other vulnerabilities.
VCID-c8ch-zd9x-kufn
Aliases:
CVE-2009-4034
NULL Bytes in SSL Certificates can be used to falsify client or server authentication. This only affects users who have SSL enabled, perform certificate name validation or client certificate authentication, and where the Certificate Authority (CA) has been tricked into issuing invalid certificates. The use of a CA that can be trusted to always issue valid certificates is recommended to ensure you are not vulnerable to this issue.more details
8.0.23
Affected by 0 other vulnerabilities.
8.1.19
Affected by 0 other vulnerabilities.
8.2.15
Affected by 0 other vulnerabilities.
8.3.9
Affected by 0 other vulnerabilities.
8.4.2
Affected by 0 other vulnerabilities.
VCID-cffd-gdpc-uqeb
Aliases:
CVE-2010-1169
A vulnerability in Safe.pm and PL/Perl can allow an authenticated user to run arbitrary Perl code on the database server if PL/Perl is installed and enabled.more details
8.0.25
Affected by 0 other vulnerabilities.
8.1.21
Affected by 0 other vulnerabilities.
8.2.17
Affected by 0 other vulnerabilities.
8.3.11
Affected by 0 other vulnerabilities.
8.4.4
Affected by 0 other vulnerabilities.
VCID-dema-khb4-d7c3
Aliases:
CVE-2006-2313
An attacker able to submit crafted strings to an application that will embed those strings in SQL commands can use invalidly-encoded multibyte characters to bypass standard string-escaping methods, resulting in possible SQL injection.more details
8.0.8
Affected by 0 other vulnerabilities.
8.1.4
Affected by 0 other vulnerabilities.
VCID-f89t-37f7-hbau
Aliases:
CVE-2007-6600
Two vulnerabilities in how ANALYZE executes user defined functions that are part of expression indexes allows users to gain superuser privileges. A valid login that has permissions to create functions and tables is required to exploit this vulnearbility.more details
8.0.15
Affected by 0 other vulnerabilities.
8.1.11
Affected by 0 other vulnerabilities.
8.2.6
Affected by 0 other vulnerabilities.
VCID-g5yd-z8gh-pbc4
Aliases:
CVE-2007-2138
A vulnerability involving insecure search_path settings allows unprivileged users to gain the SQL privileges of the owner of any SECURITY DEFINER function they are allowed to call. Securing such a function requires both a software update and changes to the function definition.more details
8.0.13
Affected by 0 other vulnerabilities.
8.1.9
Affected by 0 other vulnerabilities.
8.2.4
Affected by 0 other vulnerabilities.
VCID-h86x-6j3b-eqfh
Aliases:
CVE-2007-4769
Three vulnearbilities in the regular expression handling libraries can be exploited to cause a backend crash, infinite loops or memory exhaustion. This vulnearbility can be exploited through frontend applications that allow unfiltered regular expressions to be passed in queries.more details
8.0.15
Affected by 0 other vulnerabilities.
8.1.11
Affected by 0 other vulnerabilities.
8.2.6
Affected by 0 other vulnerabilities.
VCID-hase-39jj-6khk
Aliases:
CVE-2005-0246
The intagg contrib module allows attackers to cause a denial of service. A valid login is required to exploit this vulnerability.more details
8.0.1
Affected by 0 other vulnerabilities.
VCID-jeef-j758-s3a4
Aliases:
CVE-2005-1410
The tsearch2 contrib module declares several functions as internal even though they don't take an internal argument. This allows attackers to cause a denial of service and may possibly have other impacts. A valid login is required to exploit this vulnerability.Note! See the announcement for special upgrade instructions.more details
8.0.3
Affected by 0 other vulnerabilities.
VCID-nj9p-fdc9-m7fu
Aliases:
CVE-2007-0555
A vulnerability allows suppressing the normal checks that a SQL function returns the data type it's declared to do. These errors can easily be exploited to cause a backend crash, and in principle might be used to read database content that the user should not be able to access.more details
8.0.11
Affected by 0 other vulnerabilities.
8.1.7
Affected by 0 other vulnerabilities.
8.2.2
Affected by 0 other vulnerabilities.
VCID-qw91-9hzj-2bbd
Aliases:
CVE-2005-1409
Public EXECUTE access is given to certain character conversion functions that are not designed to be safe against malicious arguments. This can cause at least a denial of service. A valid login is required to exploit this vulnerability.Note! See the announcement for special upgrade instructions.more details
8.0.3
Affected by 0 other vulnerabilities.
VCID-s1hd-1asy-q3dd
Aliases:
CVE-2005-0245
Multiple buffer overflows in the PL/PGSQL parser may allow attackers to execute arbitrary code. A valid login is required to exploit this vulnerability.more details
8.0.1
Affected by 0 other vulnerabilities.
VCID-swbt-7zch-sbcp
Aliases:
CVE-2005-0227
Any database user is permitted to load arbitrary shared libraries using the LOAD command. A valid login is required to exploit this vulnerability.more details
8.0.1
Affected by 0 other vulnerabilities.
VCID-u5h4-4p6j-wbay
Aliases:
CVE-2009-4136
Privilege escalation via changing session state in an index function. This closes a corner case related to vulnerabilities CVE-2009-3230 and CVE-2007-6600 (below).more details
8.0.23
Affected by 0 other vulnerabilities.
8.1.19
Affected by 0 other vulnerabilities.
8.2.15
Affected by 0 other vulnerabilities.
8.3.9
Affected by 0 other vulnerabilities.
8.4.2
Affected by 0 other vulnerabilities.
VCID-v69z-cmag-xfaf
Aliases:
CVE-2010-1975
An unprivileged database user can remove superuser-only settings that were applied to his account with ALTER USER by a superuser, thus bypassing settings that should be enforced.more details
8.0.25
Affected by 0 other vulnerabilities.
8.1.21
Affected by 0 other vulnerabilities.
8.2.17
Affected by 0 other vulnerabilities.
8.3.11
Affected by 0 other vulnerabilities.
8.4.4
Affected by 0 other vulnerabilities.
VCID-wesb-d296-4ba8
Aliases:
CVE-2005-0247
Multiple buffer overflows in the PL/PGSQL parser may allow attackers to execute arbitrary code. A valid login is required to exploit this vulnerability.more details
8.0.2
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T12:36:03.264406+00:00 PostgreSQL Importer Affected by VCID-swbt-7zch-sbcp https://www.postgresql.org/support/security/CVE-2005-0227 38.0.0
2026-04-01T12:36:03.231178+00:00 PostgreSQL Importer Affected by VCID-8753-jd2h-8yhw https://www.postgresql.org/support/security/CVE-2005-0244 38.0.0
2026-04-01T12:36:03.193178+00:00 PostgreSQL Importer Affected by VCID-s1hd-1asy-q3dd https://www.postgresql.org/support/security/CVE-2005-0245 38.0.0
2026-04-01T12:36:03.147279+00:00 PostgreSQL Importer Affected by VCID-hase-39jj-6khk https://www.postgresql.org/support/security/CVE-2005-0246 38.0.0
2026-04-01T12:36:03.111715+00:00 PostgreSQL Importer Affected by VCID-wesb-d296-4ba8 https://www.postgresql.org/support/security/CVE-2005-0247 38.0.0
2026-04-01T12:36:03.070728+00:00 PostgreSQL Importer Affected by VCID-qw91-9hzj-2bbd https://www.postgresql.org/support/security/CVE-2005-1409 38.0.0
2026-04-01T12:36:03.035879+00:00 PostgreSQL Importer Affected by VCID-jeef-j758-s3a4 https://www.postgresql.org/support/security/CVE-2005-1410 38.0.0
2026-04-01T12:36:02.993341+00:00 PostgreSQL Importer Affected by VCID-6ppw-nxh2-2bfs https://www.postgresql.org/support/security/CVE-2006-0678 38.0.0
2026-04-01T12:35:59.913157+00:00 PostgreSQL Importer Affected by VCID-dema-khb4-d7c3 https://www.postgresql.org/support/security/CVE-2006-2313 38.0.0
2026-04-01T12:35:59.865894+00:00 PostgreSQL Importer Affected by VCID-8z74-udgw-kue3 https://www.postgresql.org/support/security/CVE-2006-2314 38.0.0
2026-04-01T12:35:59.816941+00:00 PostgreSQL Importer Affected by VCID-4tyx-g9kz-y3fq https://www.postgresql.org/support/security/CVE-2006-5541 38.0.0
2026-04-01T12:35:59.742088+00:00 PostgreSQL Importer Affected by VCID-nj9p-fdc9-m7fu https://www.postgresql.org/support/security/CVE-2007-0555 38.0.0
2026-04-01T12:35:59.705346+00:00 PostgreSQL Importer Affected by VCID-978k-4cn7-bfbz https://www.postgresql.org/support/security/CVE-2007-0556 38.0.0
2026-04-01T12:35:59.643290+00:00 PostgreSQL Importer Affected by VCID-g5yd-z8gh-pbc4 https://www.postgresql.org/support/security/CVE-2007-2138 38.0.0
2026-04-01T12:35:59.597369+00:00 PostgreSQL Importer Affected by VCID-h86x-6j3b-eqfh https://www.postgresql.org/support/security/CVE-2007-4769 38.0.0
2026-04-01T12:35:59.535344+00:00 PostgreSQL Importer Affected by VCID-f89t-37f7-hbau https://www.postgresql.org/support/security/CVE-2007-6600 38.0.0
2026-04-01T12:35:59.470349+00:00 PostgreSQL Importer Affected by VCID-5zj2-a3y7-zueh https://www.postgresql.org/support/security/CVE-2007-6601 38.0.0
2026-04-01T12:35:59.406385+00:00 PostgreSQL Importer Affected by VCID-1qsp-wvwq-j3f5 https://www.postgresql.org/support/security/CVE-2009-0922 38.0.0
2026-04-01T12:35:59.334128+00:00 PostgreSQL Importer Affected by VCID-721k-9zdg-buhv https://www.postgresql.org/support/security/CVE-2009-3230 38.0.0
2026-04-01T12:35:59.262727+00:00 PostgreSQL Importer Affected by VCID-c8ch-zd9x-kufn https://www.postgresql.org/support/security/CVE-2009-4034 38.0.0
2026-04-01T12:35:59.184140+00:00 PostgreSQL Importer Affected by VCID-u5h4-4p6j-wbay https://www.postgresql.org/support/security/CVE-2009-4136 38.0.0
2026-04-01T12:35:59.110121+00:00 PostgreSQL Importer Affected by VCID-cffd-gdpc-uqeb https://www.postgresql.org/support/security/CVE-2010-1169 38.0.0
2026-04-01T12:35:59.031456+00:00 PostgreSQL Importer Affected by VCID-1uzm-h9m3-akge https://www.postgresql.org/support/security/CVE-2010-1170 38.0.0
2026-04-01T12:35:58.958219+00:00 PostgreSQL Importer Affected by VCID-v69z-cmag-xfaf https://www.postgresql.org/support/security/CVE-2010-1975 38.0.0
2026-04-01T12:35:58.852225+00:00 PostgreSQL Importer Affected by VCID-7q99-jk4u-1fen https://www.postgresql.org/support/security/CVE-2010-3433 38.0.0