Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "95E0614E-0911-43EE-9F3D-2CF87E0F1851", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF09CFB-F7CE-4659-BB20-83231539F765", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "EFE8C2A3-7575-41C6-896C-C367E6D35015", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "88ED8E8C-9044-4E77-923A-D5C6C02A1081", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "037FF208-82A1-4448-88FE-FACB922FE1E0", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "458F558C-7550-48B8-8318-A0D5FAF9ABF8", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "BF1A6E7C-B1DC-45CC-90B4-AFD6F669AA94", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "23B710BA-91FF-47B9-BB56-4711CD50D50F", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4064A96D-84D5-4257-9981-1139CD4CD08C", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C98290E4-2919-4492-BD14-BB24BA85C729", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "B56E9F72-6CBF-4784-89CD-435A030AC0B0", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "6DEF0FE5-EFCF-448E-B6BD-95FDDD4E17FD", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "03B480F0-8FFC-4463-ADC6-95906751811C", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "9BF44286-0DBF-4CCA-8FFB-993976C18CDB", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "629881D2-2A6D-4461-8C35-6EE575B63E6E", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "E5C91580-6428-4234-92DF-6A96108FCF7C", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "B5A19EB5-A1AF-4293-854D-347CD21065DA", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "B18ED293-B408-435F-9D1F-2365A2E51022", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FBE2567C-BF48-4255-9E56-590A6F9DD932", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "0C8DDD98-9A2D-402D-9172-F3C4C4C97FEF", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "20C8302B-631A-4DF7-839B-C6F3CC39E000", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB318EB9-1B49-452A-92CF-89D9BA990AB9", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "5913A53B-7B72-4CBD-ADAE-318333EB8B7B", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "815E58C0-327D-4F14-B496-05FC8179627E", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "3EF2D056-5120-4F98-8343-4EC31F962CFE", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "516E0E86-3D8A-43F9-9DD5-865F5C889FC4", "vulnerable": true}, {"criteria": "cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B45F3BF0-9EB6-4A06-B6F7-DE95DD13EFBF", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "PostgreSQL 8.0.0 and earlier allows local users to bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command."}], "id": "CVE-2005-0244", "lastModified": "2025-04-03T01:03:51.193", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2005-05-02T04:00:00.000", "references": [{"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://archives.postgresql.org/pgsql-hackers/2005-01/msg00922.php"}, {"source": "secalert@redhat.com", "url": "http://marc.info/?l=bugtraq&m=110806034116082&w=2"}, {"source": "secalert@redhat.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/12948"}, {"source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:040"}, {"source": "secalert@redhat.com", "url": "http://www.novell.com/linux/security/advisories/2005_36_sudo.html"}, {"source": "secalert@redhat.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.redhat.com/support/errata/RHSA-2005-138.html"}, {"source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/12417"}, {"source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19184"}, {"source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10927"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://archives.postgresql.org/pgsql-hackers/2005-01/msg00922.php"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq&m=110806034116082&w=2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/12948"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:040"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2005_36_sudo.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.redhat.com/support/errata/RHSA-2005-138.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/12417"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19184"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10927"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}