Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-6238 (GCVE-0-2024-6238)
Vulnerability from cvelistv5 – Published: 2024-06-25 16:12 – Updated: 2024-10-30 15:35
VLAI?
EPSS
Title
pgAdmin 4 Installation Directory permission issue
Summary
pgAdmin <= 8.8 has an installation Directory permission issue. Because of this issue, attackers can gain unauthorised access to the installation directory on the Debian or RHEL 8 platforms.
Severity ?
7.4 (High)
CWE
- CWE-276 - Incorrect Default Permissions
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://github.com/pgadmin-org/pgadmin4/issues/7605 | issue-tracking |
Impacted products
1 product
| Vendor | Product | Version | |
|---|---|---|---|
| pgadmin.org | pgAdmin 4 |
Affected:
0 , < 8.9
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-6238",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-06-25T17:18:04.192532Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-276",
"description": "CWE-276 Incorrect Default Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-30T15:35:29.424Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T21:33:05.447Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"issue-tracking",
"x_transferred"
],
"url": "https://github.com/pgadmin-org/pgadmin4/issues/7605"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"modules": [
"Packaging"
],
"product": "pgAdmin 4",
"programFiles": [
"https://github.com/pgadmin-org/pgadmin4/blob/master/pkg/debian/build.sh",
"https://github.com/pgadmin-org/pgadmin4/blob/master/pkg/redhat/build.sh"
],
"repo": "https://github.com/pgadmin-org/pgadmin4",
"vendor": "pgadmin.org",
"versions": [
{
"lessThan": "8.9",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003epgAdmin \u0026lt;= 8.8 has an installation Directory permission issue.\u0026nbsp;Because of this issue,\u003c/span\u003e\u0026nbsp;attackers can gain unauthorised access to the installation directory on the Debian or RHEL 8 platforms."
}
],
"value": "pgAdmin \u003c= 8.8 has an installation Directory permission issue.\u00a0Because of this issue,\u00a0attackers can gain unauthorised access to the installation directory on the Debian or RHEL 8 platforms."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-25T16:12:12.960Z",
"orgId": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"shortName": "PostgreSQL"
},
"references": [
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/pgadmin-org/pgadmin4/issues/7605"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "pgAdmin 4 Installation Directory permission issue",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"assignerShortName": "PostgreSQL",
"cveId": "CVE-2024-6238",
"datePublished": "2024-06-25T16:12:12.960Z",
"dateReserved": "2024-06-21T03:17:49.237Z",
"dateUpdated": "2024-10-30T15:35:29.424Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-6238",
"date": "2026-05-18",
"epss": "0.00067",
"percentile": "0.20629"
},
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"pgAdmin \u003c= 8.8 has an installation Directory permission issue.\\u00a0Because of this issue,\\u00a0attackers can gain unauthorised access to the installation directory on the Debian or RHEL 8 platforms.\"}, {\"lang\": \"es\", \"value\": \"pgAdmin \u0026lt;= 8.8 tiene un problema de permiso de directorio de instalaci\\u00f3n. Debido a este problema, los atacantes pueden obtener acceso no autorizado al directorio de instalaci\\u00f3n en las plataformas Debian o RHEL 8.\"}]",
"id": "CVE-2024-6238",
"lastModified": "2024-11-21T09:49:15.450",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L\", \"baseScore\": 7.4, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 3.1, \"impactScore\": 3.7}]}",
"published": "2024-06-25T16:15:25.727",
"references": "[{\"url\": \"https://github.com/pgadmin-org/pgadmin4/issues/7605\", \"source\": \"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\"}, {\"url\": \"https://github.com/pgadmin-org/pgadmin4/issues/7605\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-276\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-6238\",\"sourceIdentifier\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"published\":\"2024-06-25T16:15:25.727\",\"lastModified\":\"2025-09-23T01:47:35.057\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"pgAdmin \u003c= 8.8 has an installation Directory permission issue.\u00a0Because of this issue,\u00a0attackers can gain unauthorised access to the installation directory on the Debian or RHEL 8 platforms.\"},{\"lang\":\"es\",\"value\":\"pgAdmin \u0026lt;= 8.8 tiene un problema de permiso de directorio de instalaci\u00f3n. Debido a este problema, los atacantes pueden obtener acceso no autorizado al directorio de instalaci\u00f3n en las plataformas Debian o RHEL 8.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.1,\"impactScore\":3.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-276\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:postgresql:*:*\",\"versionEndExcluding\":\"8.9\",\"matchCriteriaId\":\"EC2FC1EA-956D-4EA8-98B3-F1C1B8AFBFE7\"}]}]}],\"references\":[{\"url\":\"https://github.com/pgadmin-org/pgadmin4/issues/7605\",\"source\":\"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/pgadmin-org/pgadmin4/issues/7605\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/pgadmin-org/pgadmin4/issues/7605\", \"tags\": [\"issue-tracking\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T21:33:05.447Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-6238\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-25T17:18:04.192532Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-276\", \"description\": \"CWE-276 Incorrect Default Permissions\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-25T17:18:09.843Z\"}}], \"cna\": {\"title\": \"pgAdmin 4 Installation Directory permission issue\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 7.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/pgadmin-org/pgadmin4\", \"vendor\": \"pgadmin.org\", \"modules\": [\"Packaging\"], \"product\": \"pgAdmin 4\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9\", \"versionType\": \"custom\"}], \"programFiles\": [\"https://github.com/pgadmin-org/pgadmin4/blob/master/pkg/debian/build.sh\", \"https://github.com/pgadmin-org/pgadmin4/blob/master/pkg/redhat/build.sh\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://github.com/pgadmin-org/pgadmin4/issues/7605\", \"tags\": [\"issue-tracking\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"pgAdmin \u003c= 8.8 has an installation Directory permission issue.\\u00a0Because of this issue,\\u00a0attackers can gain unauthorised access to the installation directory on the Debian or RHEL 8 platforms.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003epgAdmin \u0026lt;= 8.8 has an installation Directory permission issue.\u0026nbsp;Because of this issue,\u003c/span\u003e\u0026nbsp;attackers can gain unauthorised access to the installation directory on the Debian or RHEL 8 platforms.\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\", \"shortName\": \"PostgreSQL\", \"dateUpdated\": \"2024-06-25T16:12:12.960Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-6238\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-30T15:35:29.424Z\", \"dateReserved\": \"2024-06-21T03:17:49.237Z\", \"assignerOrgId\": \"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007\", \"datePublished\": \"2024-06-25T16:12:12.960Z\", \"assignerShortName\": \"PostgreSQL\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
FKIE_CVE-2024-6238
Vulnerability from fkie_nvd - Published: 2024-06-25 16:15 - Updated: 2025-09-23 01:47
Severity ?
7.4 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
pgAdmin <= 8.8 has an installation Directory permission issue. Because of this issue, attackers can gain unauthorised access to the installation directory on the Debian or RHEL 8 platforms.
References
| URL | Tags | ||
|---|---|---|---|
| f86ef6dc-4d3a-42ad-8f28-e6d5547a5007 | https://github.com/pgadmin-org/pgadmin4/issues/7605 | Issue Tracking, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/pgadmin-org/pgadmin4/issues/7605 | Issue Tracking, Patch |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pgadmin:pgadmin_4:*:*:*:*:*:postgresql:*:*",
"matchCriteriaId": "EC2FC1EA-956D-4EA8-98B3-F1C1B8AFBFE7",
"versionEndExcluding": "8.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "pgAdmin \u003c= 8.8 has an installation Directory permission issue.\u00a0Because of this issue,\u00a0attackers can gain unauthorised access to the installation directory on the Debian or RHEL 8 platforms."
},
{
"lang": "es",
"value": "pgAdmin \u0026lt;= 8.8 tiene un problema de permiso de directorio de instalaci\u00f3n. Debido a este problema, los atacantes pueden obtener acceso no autorizado al directorio de instalaci\u00f3n en las plataformas Debian o RHEL 8."
}
],
"id": "CVE-2024-6238",
"lastModified": "2025-09-23T01:47:35.057",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.1,
"impactScore": 3.7,
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-06-25T16:15:25.727",
"references": [
{
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/pgadmin-org/pgadmin4/issues/7605"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/pgadmin-org/pgadmin4/issues/7605"
}
],
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-276"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
WID-SEC-W-2024-1452
Vulnerability from csaf_certbund - Published: 2024-06-25 22:00 - Updated: 2025-04-13 22:00Summary
pgAdmin: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: pgAdmin ist eine Verwaltungs- und Entwicklungsplattform für die PostgreSQL-Datenbank.
Angriff: Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in pgAdmin ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme: - Linux
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— |
Last affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source pgAdmin <=8.8
Open Source / pgAdmin
|
<=8.8 |
References
5 references
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "pgAdmin ist eine Verwaltungs- und Entwicklungsplattform f\u00fcr die PostgreSQL-Datenbank.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in pgAdmin ausnutzen, um Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1452 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1452.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1452 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1452"
},
{
"category": "external",
"summary": "Red Hat Bugzilla vom 2024-06-25",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294249"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2024-06-25",
"url": "https://github.com/advisories/GHSA-783m-7jjf-pmgr"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14983-1 vom 2025-04-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BYON52PV4P44MGBG55FDOG2SP2G266ZO/"
}
],
"source_lang": "en-US",
"title": "pgAdmin: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen",
"tracking": {
"current_release_date": "2025-04-13T22:00:00.000+00:00",
"generator": {
"date": "2025-04-14T08:18:28.480+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2024-1452",
"initial_release_date": "2024-06-25T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-06-25T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von openSUSE aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=8.8",
"product": {
"name": "Open Source pgAdmin \u003c=8.8",
"product_id": "T035641"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.8",
"product": {
"name": "Open Source pgAdmin \u003c=8.8",
"product_id": "T035641-fixed"
}
}
],
"category": "product_name",
"name": "pgAdmin"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6238",
"product_status": {
"known_affected": [
"T027843"
],
"last_affected": [
"T035641"
]
},
"release_date": "2024-06-25T22:00:00.000+00:00",
"title": "CVE-2024-6238"
}
]
}
GHSA-783M-7JJF-PMGR
Vulnerability from github – Published: 2024-06-25 18:31 – Updated: 2025-09-23 03:30
VLAI?
Details
pgAdmin <= 8.8 has an installation Directory permission issue. Because of this issue, attackers can gain unauthorised access to the installation directory on the Debian or RHEL 8 platforms.
Severity ?
7.4 (High)
{
"affected": [],
"aliases": [
"CVE-2024-6238"
],
"database_specific": {
"cwe_ids": [
"CWE-276"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-06-25T16:15:25Z",
"severity": "HIGH"
},
"details": "pgAdmin \u003c= 8.8 has an installation Directory permission issue.\u00a0Because of this issue,\u00a0attackers can gain unauthorised access to the installation directory on the Debian or RHEL 8 platforms.",
"id": "GHSA-783m-7jjf-pmgr",
"modified": "2025-09-23T03:30:25Z",
"published": "2024-06-25T18:31:22Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6238"
},
{
"type": "WEB",
"url": "https://github.com/pgadmin-org/pgadmin4/issues/7605"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"type": "CVSS_V3"
}
]
}
OPENSUSE-SU-2025:14983-1
Vulnerability from csaf_opensuse - Published: 2025-04-10 00:00 - Updated: 2025-04-10 00:00Summary
pgadmin4-9.2-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: pgadmin4-9.2-1.1 on GA media
Description of the patch: These are all security issues fixed in the pgadmin4-9.2-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2025-14983
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
9.9 (Critical)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
9.1 (Critical)
Affected products
Recommended
24 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
References
16 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "pgadmin4-9.2-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the pgadmin4-9.2-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14983",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14983-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:14983-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYON52PV4P44MGBG55FDOG2SP2G266ZO/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:14983-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYON52PV4P44MGBG55FDOG2SP2G266ZO/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6238 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-9014 page",
"url": "https://www.suse.com/security/cve/CVE-2024-9014/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2945 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-2946 page",
"url": "https://www.suse.com/security/cve/CVE-2025-2946/"
}
],
"title": "pgadmin4-9.2-1.1 on GA media",
"tracking": {
"current_release_date": "2025-04-10T00:00:00Z",
"generator": {
"date": "2025-04-10T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14983-1",
"initial_release_date": "2025-04-10T00:00:00Z",
"revision_history": [
{
"date": "2025-04-10T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "pgadmin4-9.2-1.1.aarch64",
"product": {
"name": "pgadmin4-9.2-1.1.aarch64",
"product_id": "pgadmin4-9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "pgadmin4-cloud-9.2-1.1.aarch64",
"product": {
"name": "pgadmin4-cloud-9.2-1.1.aarch64",
"product_id": "pgadmin4-cloud-9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "pgadmin4-desktop-9.2-1.1.aarch64",
"product": {
"name": "pgadmin4-desktop-9.2-1.1.aarch64",
"product_id": "pgadmin4-desktop-9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "pgadmin4-doc-9.2-1.1.aarch64",
"product": {
"name": "pgadmin4-doc-9.2-1.1.aarch64",
"product_id": "pgadmin4-doc-9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"product": {
"name": "pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"product_id": "pgadmin4-web-uwsgi-9.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "system-user-pgadmin-9.2-1.1.aarch64",
"product": {
"name": "system-user-pgadmin-9.2-1.1.aarch64",
"product_id": "system-user-pgadmin-9.2-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "pgadmin4-9.2-1.1.ppc64le",
"product": {
"name": "pgadmin4-9.2-1.1.ppc64le",
"product_id": "pgadmin4-9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pgadmin4-cloud-9.2-1.1.ppc64le",
"product": {
"name": "pgadmin4-cloud-9.2-1.1.ppc64le",
"product_id": "pgadmin4-cloud-9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pgadmin4-desktop-9.2-1.1.ppc64le",
"product": {
"name": "pgadmin4-desktop-9.2-1.1.ppc64le",
"product_id": "pgadmin4-desktop-9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pgadmin4-doc-9.2-1.1.ppc64le",
"product": {
"name": "pgadmin4-doc-9.2-1.1.ppc64le",
"product_id": "pgadmin4-doc-9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"product": {
"name": "pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"product_id": "pgadmin4-web-uwsgi-9.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "system-user-pgadmin-9.2-1.1.ppc64le",
"product": {
"name": "system-user-pgadmin-9.2-1.1.ppc64le",
"product_id": "system-user-pgadmin-9.2-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "pgadmin4-9.2-1.1.s390x",
"product": {
"name": "pgadmin4-9.2-1.1.s390x",
"product_id": "pgadmin4-9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "pgadmin4-cloud-9.2-1.1.s390x",
"product": {
"name": "pgadmin4-cloud-9.2-1.1.s390x",
"product_id": "pgadmin4-cloud-9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "pgadmin4-desktop-9.2-1.1.s390x",
"product": {
"name": "pgadmin4-desktop-9.2-1.1.s390x",
"product_id": "pgadmin4-desktop-9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "pgadmin4-doc-9.2-1.1.s390x",
"product": {
"name": "pgadmin4-doc-9.2-1.1.s390x",
"product_id": "pgadmin4-doc-9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "pgadmin4-web-uwsgi-9.2-1.1.s390x",
"product": {
"name": "pgadmin4-web-uwsgi-9.2-1.1.s390x",
"product_id": "pgadmin4-web-uwsgi-9.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "system-user-pgadmin-9.2-1.1.s390x",
"product": {
"name": "system-user-pgadmin-9.2-1.1.s390x",
"product_id": "system-user-pgadmin-9.2-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "pgadmin4-9.2-1.1.x86_64",
"product": {
"name": "pgadmin4-9.2-1.1.x86_64",
"product_id": "pgadmin4-9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "pgadmin4-cloud-9.2-1.1.x86_64",
"product": {
"name": "pgadmin4-cloud-9.2-1.1.x86_64",
"product_id": "pgadmin4-cloud-9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "pgadmin4-desktop-9.2-1.1.x86_64",
"product": {
"name": "pgadmin4-desktop-9.2-1.1.x86_64",
"product_id": "pgadmin4-desktop-9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "pgadmin4-doc-9.2-1.1.x86_64",
"product": {
"name": "pgadmin4-doc-9.2-1.1.x86_64",
"product_id": "pgadmin4-doc-9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"product": {
"name": "pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"product_id": "pgadmin4-web-uwsgi-9.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "system-user-pgadmin-9.2-1.1.x86_64",
"product": {
"name": "system-user-pgadmin-9.2-1.1.x86_64",
"product_id": "system-user-pgadmin-9.2-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64"
},
"product_reference": "pgadmin4-9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le"
},
"product_reference": "pgadmin4-9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x"
},
"product_reference": "pgadmin4-9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64"
},
"product_reference": "pgadmin4-9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-cloud-9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64"
},
"product_reference": "pgadmin4-cloud-9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-cloud-9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le"
},
"product_reference": "pgadmin4-cloud-9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-cloud-9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x"
},
"product_reference": "pgadmin4-cloud-9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-cloud-9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64"
},
"product_reference": "pgadmin4-cloud-9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-desktop-9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64"
},
"product_reference": "pgadmin4-desktop-9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-desktop-9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le"
},
"product_reference": "pgadmin4-desktop-9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-desktop-9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x"
},
"product_reference": "pgadmin4-desktop-9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-desktop-9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64"
},
"product_reference": "pgadmin4-desktop-9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-doc-9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64"
},
"product_reference": "pgadmin4-doc-9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-doc-9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le"
},
"product_reference": "pgadmin4-doc-9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-doc-9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x"
},
"product_reference": "pgadmin4-doc-9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-doc-9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64"
},
"product_reference": "pgadmin4-doc-9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-web-uwsgi-9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64"
},
"product_reference": "pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-web-uwsgi-9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le"
},
"product_reference": "pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-web-uwsgi-9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x"
},
"product_reference": "pgadmin4-web-uwsgi-9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pgadmin4-web-uwsgi-9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64"
},
"product_reference": "pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-pgadmin-9.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64"
},
"product_reference": "system-user-pgadmin-9.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-pgadmin-9.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le"
},
"product_reference": "system-user-pgadmin-9.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-pgadmin-9.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x"
},
"product_reference": "system-user-pgadmin-9.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "system-user-pgadmin-9.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
},
"product_reference": "system-user-pgadmin-9.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6238"
}
],
"notes": [
{
"category": "general",
"text": "pgAdmin \u003c= 8.8 has an installation Directory permission issue. Because of this issue, attackers can gain unauthorised access to the installation directory on the Debian or RHEL 8 platforms.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6238",
"url": "https://www.suse.com/security/cve/CVE-2024-6238"
},
{
"category": "external",
"summary": "SUSE Bug 1227080 for CVE-2024-6238",
"url": "https://bugzilla.suse.com/1227080"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-04-10T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-6238"
},
{
"cve": "CVE-2024-9014",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-9014"
}
],
"notes": [
{
"category": "general",
"text": "pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-9014",
"url": "https://www.suse.com/security/cve/CVE-2024-9014"
},
{
"category": "external",
"summary": "SUSE Bug 1230928 for CVE-2024-9014",
"url": "https://bugzilla.suse.com/1230928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-04-10T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-9014"
},
{
"cve": "CVE-2025-2945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2945"
}
],
"notes": [
{
"category": "general",
"text": "Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules).\n\nThe vulnerability is associated with the 2 POST endpoints; /sqleditor/query_tool/download, where the query_commited parameter and /cloud/deploy endpoint, where the high_availability parameter is unsafely passed to the Python eval() function, allowing arbitrary code execution.\n\n\nThis issue affects pgAdmin 4: before 9.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2945",
"url": "https://www.suse.com/security/cve/CVE-2025-2945"
},
{
"category": "external",
"summary": "SUSE Bug 1240746 for CVE-2025-2945",
"url": "https://bugzilla.suse.com/1240746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-04-10T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-2945"
},
{
"cve": "CVE-2025-2946",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-2946"
}
],
"notes": [
{
"category": "general",
"text": "pgAdmin \u003c= 9.1 is affected by a security vulnerability with Cross-Site Scripting(XSS). If attackers execute any arbitrary HTML/JavaScript in a user\u0027s browser through query result rendering, then HTML/JavaScript runs on the browser.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-2946",
"url": "https://www.suse.com/security/cve/CVE-2025-2946"
},
{
"category": "external",
"summary": "SUSE Bug 1240748 for CVE-2025-2946",
"url": "https://bugzilla.suse.com/1240748"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-cloud-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-desktop-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-doc-9.2-1.1.x86_64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.aarch64",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.s390x",
"openSUSE Tumbleweed:pgadmin4-web-uwsgi-9.2-1.1.x86_64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.aarch64",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.ppc64le",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.s390x",
"openSUSE Tumbleweed:system-user-pgadmin-9.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-04-10T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-2946"
}
]
}
BDU:2024-04899
Vulnerability from fstec - Published: 25.06.2024
VLAI Severity ?
Title
Уязвимость инструмента управления базами данных pgAdmin 4, связанная с ошибками обработки разрешений, позволяющая нарушителю выполнить произвольный код
Description
Уязвимость инструмента управления базами данных pgAdmin 4 связана с ошибками обработки разрешений. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, выполнить произвольный код
Severity ?
Vendor
PostgreSQL Community Association of Canada
Software Name
pgAdmin 4
Software Version
до 8.8 включительно (pgAdmin 4)
Possible Mitigations
Использование рекомендаций:
https://github.com/pgadmin-org/pgadmin4/issues/7605
Reference
https://github.com/pgadmin-org/pgadmin4/issues/7605
https://vuldb.com/?id.269676
https://feedly.com/cve/CVE-2024-6238
CWE
CWE-275
{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "PostgreSQL Community Association of Canada",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 8.8 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (pgAdmin 4)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://github.com/pgadmin-org/pgadmin4/issues/7605",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "25.06.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "01.07.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "01.07.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-04899",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-6238",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "pgAdmin 4",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 pgAdmin 4, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u0439, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u0439 (CWE-275)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 pgAdmin 4 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u0439. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/pgadmin-org/pgadmin4/issues/7605\nhttps://vuldb.com/?id.269676\nhttps://feedly.com/cve/CVE-2024-6238",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u0421\u0423\u0411\u0414",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-275",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,4)"
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…