postgresql14 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the postgresql14 package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
CVE-2024-10976

<14.14-r0
  • L
CVE-2024-10979

<14.14-r0
  • L
CVE-2024-10978

<14.14-r0
  • L
CVE-2024-10977

<14.14-r0
  • H
Time-of-check Time-of-use (TOCTOU)

<14.13-r0
  • H
Missing Authorization

<9.6.4-r0
  • M
CVE-2023-5868

<14.10-r0
  • M
CVE-2023-5870

<14.10-r0
  • M
CVE-2023-2455

<14.8-r0
  • M
Information Exposure

<13.3-r0
  • H
Information Exposure

<9.6.3-r0
  • H
CVE-2023-2454

<14.8-r0
  • M
Information Exposure

<13.2-r0
  • H
Information Exposure

<10.1-r0
  • H
SQL Injection

<12.5-r0
  • H
SQL Injection

<14.9-r0
  • H
Incomplete Cleanup

<14.3-r0
  • M
CVE-2023-39418

<14.9-r0
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<14.5-r0
  • H
Information Exposure

<9.6.3-r0
  • M
Information Exposure

<13.4-r0
  • M
CVE-2021-32029

<13.3-r0
  • H
Out-of-Bounds

<13.3-r0
  • M
Incorrect Authorization

<13.2-r0
  • C
Improper Authentication

<9.6.4-r0
  • H
SQL Injection

<12.4-r0
  • M
Out-of-bounds Read

<11.3-r0
  • H
Untrusted Search Path

<12.4-r0
  • M
Information Exposure

<10.2-r0
  • M
Missing Encryption of Sensitive Data

<9.6.3-r0
  • H
Insufficiently Protected Credentials

<9.6.4-r0
  • L
CVE-2022-41862

<14.7-r0
  • H
CVE-2024-0985

<14.11-r0
  • H
Integer Overflow or Wraparound

<14.10-r0
  • M
Insufficiently Protected Credentials

<14.1-r0
  • M
Missing Authorization

<12.2-r0
  • H
SQL Injection

<14.1-r0
  • H
Use of a Broken or Risky Cryptographic Algorithm

<12.5-r0
  • H
Insufficient Comparison

<12.5-r0
  • H
Incorrect Authorization

<10.5-r0
  • M
Improper Access Control

<11.3-r0
  • H
Out-of-bounds Write

<11.4-r0
  • L
Out-of-bounds Read

<11.5-r0
  • C
SQL Injection

<11.1-r0
  • H
Incorrect Permission Assignment for Critical Resource

<10.2-r0
  • C
Incorrect Permission Assignment for Critical Resource

<10.4-r0
  • H
Improper Input Validation

<10.3-r0
  • M
Information Exposure

<10.1-r0
  • H
SQL Injection

<11.5-r0
  • H
SQL Injection

<10.5-r0