{"containers":{"cna":{"affected":[{"product":"PostgreSQL","vendor":"PostgreSQL Global Development Group","versions":[{"status":"affected","version":"before 9.0.19"},{"status":"affected","version":"9.1.x before 9.1.15"},{"status":"affected","version":"9.2.x before 9.2.10"},{"status":"affected","version":"9.3.x before 9.3.6"},{"status":"affected","version":"9.4.x before 9.4.1"}]}],"datePublic":"2015-02-05T00:00:00.000Z","descriptions":[{"lang":"en","value":"PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message."}],"problemTypes":[{"descriptions":[{"description":"Path Disclosure","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-01-27T15:29:21.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"http://www.postgresql.org/docs/9.4/static/release-9-4-1.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.postgresql.org/docs/current/static/release-9-0-19.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.postgresql.org/docs/current/static/release-9-1-15.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.postgresql.org/docs/current/static/release-9-2-10.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.postgresql.org/docs/current/static/release-9-3-6.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.postgresql.org/about/news/1569/"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.debian.org/security/2015/dsa-3155"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2014-8161","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"PostgreSQL","version":{"version_data":[{"version_value":"before 9.0.19"},{"version_value":"9.1.x before 9.1.15"},{"version_value":"9.2.x before 9.2.10"},{"version_value":"9.3.x before 9.3.6"},{"version_value":"9.4.x before 9.4.1"}]}}]},"vendor_name":"PostgreSQL Global Development Group"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Path Disclosure"}]}]},"references":{"reference_data":[{"name":"http://www.postgresql.org/docs/9.4/static/release-9-4-1.html","refsource":"CONFIRM","url":"http://www.postgresql.org/docs/9.4/static/release-9-4-1.html"},{"name":"http://www.postgresql.org/docs/current/static/release-9-0-19.html","refsource":"CONFIRM","url":"http://www.postgresql.org/docs/current/static/release-9-0-19.html"},{"name":"http://www.postgresql.org/docs/current/static/release-9-1-15.html","refsource":"CONFIRM","url":"http://www.postgresql.org/docs/current/static/release-9-1-15.html"},{"name":"http://www.postgresql.org/docs/current/static/release-9-2-10.html","refsource":"CONFIRM","url":"http://www.postgresql.org/docs/current/static/release-9-2-10.html"},{"name":"http://www.postgresql.org/docs/current/static/release-9-3-6.html","refsource":"CONFIRM","url":"http://www.postgresql.org/docs/current/static/release-9-3-6.html"},{"name":"http://www.postgresql.org/about/news/1569/","refsource":"CONFIRM","url":"http://www.postgresql.org/about/news/1569/"},{"name":"http://www.debian.org/security/2015/dsa-3155","refsource":"CONFIRM","url":"http://www.debian.org/security/2015/dsa-3155"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T13:10:51.110Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.postgresql.org/docs/9.4/static/release-9-4-1.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.postgresql.org/docs/current/static/release-9-0-19.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.postgresql.org/docs/current/static/release-9-1-15.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.postgresql.org/docs/current/static/release-9-2-10.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.postgresql.org/docs/current/static/release-9-3-6.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.postgresql.org/about/news/1569/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.debian.org/security/2015/dsa-3155"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2014-8161","datePublished":"2020-01-27T15:29:21.000Z","dateReserved":"2014-10-10T00:00:00.000Z","dateUpdated":"2024-08-06T13:10:51.110Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}