libpq vulnerabilities

  • licenses detected

    • [10.20]; [10.23]; [11.15]; [11.21]; [12.10]; [12.16]; [13.12]; [13.6]; [14.2]; [14.5]; [14.7]; [14.8]; [9.6.24]
    • [14.9]; [15.12]; [15.3]; [15.4]; [15.5]; [16.8]
  • Direct Vulnerabilities

    Known vulnerabilities in the libpq package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Buffer Over-read

    [0,)
    • C
    Improper Neutralization of Quoting Syntax

    [,15.12)
    • L
    Use of Less Trusted Source

    [12.10,14.5)[15.3,15.12)
    • L
    Improper Preservation of Consistency Between Independent Representations of Shared State

    [,15.12)
    • L
    Incorrect Privilege Assignment

    [12.10,15.12)
    • C
    Arbitrary Code Execution

    [,15.12)
    • H
    Time-of-Check Time-of-Use (TOCTOU) Race Condition

    [,15.12)
    • L
    Improper Access Control

    [14.2,15.12)
    • H
    Privilege Management Errors

    [,15.12)
    • H
    Buffer Overflow

    [,15.5)
    • L
    Improper Privilege Management

    [,15.5)
    • M
    Information Exposure

    [,15.5)
    • H
    Denial of Service (DoS)

    [0,)
    • H
    SQL Injection

    [,11.21)[12.10,12.16)[13.6,13.12)[14.2,14.9)[15.3,15.4)
    • L
    Access Control Bypass

    [15.3,15.4)
    • H
    Arbitrary Code Execution

    [,11.21)[12.10,12.16)[13.6,13.12)[14.2,14.8)
    • M
    Improper Privilege Management

    [,11.21)[12.10,12.16)[13.6,13.12)[14.2,14.8)
    • L
    Information Exposure

    [,11.21)[12.10,12.16)[13.6,13.12)[14.2,14.7)
    • H
    Arbitrary Code Execution

    [,10.23)[11.15,11.21)[12.10,12.16)[13.6,13.12)[14.2,14.5)
    • H
    Incorrect Authorization

    [,10.23)[12.10,12.16)[13.6,13.12)[14.2,14.7)
    • M
    Symlink Attack

    [0,)
    • H
    Access Restriction Bypass

    [9.6.24,10.20)
    • M
    Out-of-Bounds

    [0,)
    • H
    CVE-2005-1409

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    CVE-2002-1657

    [0,)
    • M
    Out-of-Bounds

    [0,)
    • H
    Arbitrary Code Execution

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • C
    CVE-2007-3279

    [0,)
    • M
    Access Restriction Bypass

    [0,)
    • M
    Information Exposure

    [,10.20)
    • H
    Denial of Service (DoS)

    [0,)
    • H
    Access Restriction Bypass

    [0,)
    • H
    Improper Input Validation

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • H
    Remote Code Execution (RCE)

    [0,)
    • M
    Information Exposure

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Information Exposure

    [,11.15)
    • H
    Improper Input Validation

    [0,)
    • H
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Information Exposure

    [0,)
    • M
    CVE-2004-0977

    [0,)
    • M
    Remote Code Execution (RCE)

    [0,)