296,720
Total vulnerabilities in the database
When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.
| Software | From | Fixed in |
|---|---|---|
| postgresql / postgresql | 10.0 | 10.19 |
| postgresql / postgresql | 11.0 | 11.14 |
| postgresql / postgresql | 12.0 | 12.9 |
| postgresql / postgresql | 13.0 | 13.5 |
| postgresql / postgresql | 14.0 | 14.0.x |
| postgresql / postgresql | - | 9.6.24 |
| fedoraproject / fedora | 34 | 34.x |
| fedoraproject / fedora | 35 | 35.x |
| redhat / software_collections | 1.0 | 1.0.x |
| redhat / enterprise_linux | 8.0 | 8.0.x |
| redhat / enterprise_linux_for_power_little_endian | 8.0 | 8.0.x |
| redhat / enterprise_linux_for_ibm_z_systems | 8.0 | 8.0.x |