postgresql15 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the postgresql15 package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
CVE-2024-10979

<15.9-r0
  • L
CVE-2024-10978

<15.9-r0
  • L
CVE-2024-10977

<15.9-r0
  • L
CVE-2024-10976

<15.9-r0
  • H
Time-of-check Time-of-use (TOCTOU)

<15.8-r0
  • H
CVE-2024-0985

<15.6-r0
  • H
Integer Overflow or Wraparound

<15.5-r0
  • M
CVE-2023-5868

<15.5-r0
  • M
CVE-2023-5870

<15.5-r0
  • H
SQL Injection

<15.4-r0
  • M
CVE-2023-39418

<15.4-r0
  • M
CVE-2023-2455

<15.3-r0
  • H
CVE-2023-2454

<15.3-r0
  • L
CVE-2022-41862

<15.2-r0
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<14.5-r0
  • H
Incomplete Cleanup

<14.3-r0
  • H
SQL Injection

<14.1-r0
  • M
Insufficiently Protected Credentials

<14.1-r0
  • M
Information Exposure

<13.4-r0
  • M
CVE-2021-32029

<13.3-r0
  • M
Information Exposure

<13.3-r0
  • H
Out-of-Bounds

<13.3-r0
  • M
Incorrect Authorization

<13.2-r0
  • M
Information Exposure

<13.2-r0
  • H
Insufficient Comparison

<12.5-r0
  • H
SQL Injection

<12.5-r0
  • H
Use of a Broken or Risky Cryptographic Algorithm

<12.5-r0
  • H
Untrusted Search Path

<12.4-r0
  • H
SQL Injection

<12.4-r0
  • M
Missing Authorization

<12.2-r0
  • H
SQL Injection

<11.5-r0
  • L
Out-of-bounds Read

<11.5-r0
  • H
Out-of-bounds Write

<11.4-r0
  • M
Out-of-bounds Read

<11.3-r0
  • M
Improper Access Control

<11.3-r0
  • C
SQL Injection

<11.1-r0
  • H
Incorrect Authorization

<10.5-r0
  • H
SQL Injection

<10.5-r0
  • C
Incorrect Permission Assignment for Critical Resource

<10.4-r0
  • H
Improper Input Validation

<10.3-r0
  • M
Information Exposure

<10.2-r0
  • H
Incorrect Permission Assignment for Critical Resource

<10.2-r0
  • M
Information Exposure

<10.1-r0
  • H
Information Exposure

<10.1-r0
  • H
Insufficiently Protected Credentials

<9.6.4-r0
  • H
Missing Authorization

<9.6.4-r0
  • C
Improper Authentication

<9.6.4-r0
  • H
Information Exposure

<9.6.3-r0
  • M
Missing Encryption of Sensitive Data

<9.6.3-r0
  • H
Information Exposure

<9.6.3-r0