postgresql15 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the postgresql15 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-10979

<15.9-r0
  • L
CVE-2024-10978

<15.9-r0
  • L
CVE-2024-10977

<15.9-r0
  • L
CVE-2024-10976

<15.9-r0
  • H
Time-of-check Time-of-use (TOCTOU)

<15.8-r0
  • H
CVE-2024-0985

<15.6-r0
  • H
Integer Overflow or Wraparound

<15.5-r0
  • M
CVE-2023-5868

<15.5-r0
  • M
CVE-2023-5870

<15.5-r0
  • H
SQL Injection

<15.4-r0
  • M
Insufficient Granularity of Access Control

<15.4-r0
  • M
CVE-2023-2455

<15.3-r0
  • H
CVE-2023-2454

<15.3-r0
  • L
CVE-2022-41862

<15.2-r0
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<14.5-r0
  • H
Incomplete Cleanup

<14.3-r0
  • H
SQL Injection

<14.1-r0
  • M
Insufficiently Protected Credentials

<14.1-r0
  • M
Information Exposure

<13.4-r0
  • M
CVE-2021-32029

<13.3-r0
  • M
Information Exposure

<13.3-r0
  • H
Out-of-Bounds

<13.3-r0
  • M
Incorrect Authorization

<13.2-r0
  • M
Information Exposure

<13.2-r0
  • H
Insufficient Comparison

<12.5-r0
  • H
SQL Injection

<12.5-r0
  • H
Use of a Broken or Risky Cryptographic Algorithm

<12.5-r0
  • H
Untrusted Search Path

<12.4-r0
  • H
SQL Injection

<12.4-r0
  • M
Missing Authorization

<12.2-r0
  • H
SQL Injection

<11.5-r0
  • L
Out-of-bounds Read

<11.5-r0
  • H
Out-of-bounds Write

<11.4-r0
  • M
Out-of-bounds Read

<11.3-r0
  • M
Improper Access Control

<11.3-r0
  • C
SQL Injection

<11.1-r0
  • H
Incorrect Authorization

<10.5-r0
  • H
SQL Injection

<10.5-r0
  • C
Incorrect Permission Assignment for Critical Resource

<10.4-r0
  • H
Improper Input Validation

<10.3-r0
  • M
Information Exposure

<10.2-r0
  • H
Incorrect Permission Assignment for Critical Resource

<10.2-r0
  • M
Information Exposure

<10.1-r0
  • H
Information Exposure

<10.1-r0
  • H
Missing Authorization

<9.6.4-r0
  • H
Insufficiently Protected Credentials

<9.6.4-r0
  • C
Improper Authentication

<9.6.4-r0
  • H
Information Exposure

<9.6.3-r0
  • M
Missing Encryption of Sensitive Data

<9.6.3-r0
  • H
Information Exposure

<9.6.3-r0