24h | 7d | 30d

Overview

  • PostgreSQL

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS v3.1
MEDIUM (5.9)
EPSS
Pending

KEV

Description

Integer wraparound in multiple PostgreSQL libpq client library functions allows an application input provider or network peer to cause libpq to undersize an allocation and write out-of-bounds by hundreds of megabytes. This results in a segmentation fault for the application using libpq. Versions before PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 are affected.

Statistics

  • 1 Post
  • 5 Interactions

Last activity: 13 hours ago

Overview

  • pgadmin.org
  • pgAdmin 4

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
Pending

KEV

Description

pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.

Statistics

  • 1 Post
  • 5 Interactions

Last activity: 13 hours ago

Overview

  • PostgreSQL

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS v3.1
LOW (3.1)
EPSS
Pending

KEV

Description

Missing authorization in PostgreSQL CREATE STATISTICS command allows a table owner to achieve denial of service against other CREATE STATISTICS users by creating in any schema. A later CREATE STATISTICS for the same name, from a user having the CREATE privilege, would then fail. Versions before PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 are affected.

Statistics

  • 1 Post
  • 5 Interactions

Last activity: 13 hours ago

Overview

  • pgadmin.org
  • pgAdmin 4

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS v3.1
MEDIUM (6.8)
EPSS
Pending

KEV

Description

pgAdmin 4 versions up to 9.9 are affected by a command injection vulnerability on Windows systems. This issue is caused by the use of shell=True during backup and restore operations, enabling attackers to execute arbitrary system commands by providing specially crafted file path input.

Statistics

  • 1 Post
  • 5 Interactions

Last activity: 13 hours ago

Overview

  • Pending

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A stack buffer overflow vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin in the rc binary's USB storage handling module. The vulnerability occurs when the "Serial Number" field from a USB device is read via sscanf into a 64-byte stack buffer, while fgets reads up to 127 bytes, causing a stack overflow. An attacker with physical access or control over a USB device can exploit this vulnerability to potentially execute arbitrary code on the device.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 8 hours ago

Overview

  • Pending

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetNetworkSettings' functionality of prog.cgi, where the 'IPAddress' and 'SubnetMask' parameters are directly concatenated into shell commands executed via system(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 8 hours ago

Overview

  • Pending

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A command injection vulnerability exists in the D-Link DIR-823G router firmware DIR823G_V1.0.2B05_20181207.bin in the timelycheck and sysconf binaries, which process the /tmp/new_qos.rule configuration file. The vulnerability occurs because parsed fields from the configuration file are concatenated into command strings and executed via system() without any sanitization. An attacker with write access to /tmp/new_qos.rule can execute arbitrary commands on the device.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 8 hours ago

Overview

  • Pending

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetDMZSettings' functionality, where the 'IPAddress' parameter in prog.cgi is stored in NVRAM and later used by librcm.so to construct iptables commands executed via twsystem(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 8 hours ago

Overview

  • Pending

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A stack buffer overflow vulnerability exists in the D-Link DIR-816A2 router firmware DIR-816A2_FWv1.10CNB05_R1B011D88210.img in the upload.cgi module, which handles firmware version information. The vulnerability occurs because /proc/version is read into a 512-byte buffer and then concatenated using sprintf() into another 512-byte buffer containing a 29-byte constant. Input exceeding 481 bytes triggers a stack buffer overflow, allowing an attacker who can control /proc/version content to potentially execute arbitrary code on the device.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 8 hours ago

Overview

  • Pending

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetDynamicDNSSettings' functionality, where the 'ServerAddress' and 'Hostname' parameters in prog.cgi are stored in NVRAM and later used by rc to construct system commands executed via twsystem(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 8 hours ago
Showing 71 to 80 of 86 CVEs