postgresql15 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the postgresql15 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-10976 dsfsdf

<15.9-r0
  • L
CVE-2024-10979 dsfsdf

<15.9-r0
  • L
CVE-2024-10978 dsfsdf

<15.9-r0
  • L
CVE-2024-10977 dsfsdf

<15.9-r0
  • H
Time-of-check Time-of-use (TOCTOU) dsfsdf

<15.8-r0
  • H
CVE-2024-0985 dsfsdf

<15.6-r0
  • H
Integer Overflow or Wraparound dsfsdf

<15.5-r0
  • M
CVE-2023-5870 dsfsdf

<15.5-r0
  • M
CVE-2023-5868 dsfsdf

<15.5-r0
  • H
SQL Injection dsfsdf

<15.4-r0
  • M
CVE-2023-39418 dsfsdf

<15.4-r0
  • M
CVE-2023-2455 dsfsdf

<15.3-r0
  • H
CVE-2023-2454 dsfsdf

<15.3-r0
  • L
CVE-2022-41862 dsfsdf

<15.2-r0
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') dsfsdf

<14.5-r0
  • H
Incomplete Cleanup dsfsdf

<14.3-r0
  • H
SQL Injection dsfsdf

<14.1-r0
  • M
Insufficiently Protected Credentials dsfsdf

<14.1-r0
  • M
Information Exposure dsfsdf

<13.4-r0
  • M
CVE-2021-32029 dsfsdf

<13.3-r0
  • M
Information Exposure dsfsdf

<13.3-r0
  • H
Out-of-Bounds dsfsdf

<13.3-r0
  • M
Incorrect Authorization dsfsdf

<13.2-r0
  • M
Information Exposure dsfsdf

<13.2-r0
  • H
Insufficient Comparison dsfsdf

<12.5-r0
  • H
SQL Injection dsfsdf

<12.5-r0
  • H
Use of a Broken or Risky Cryptographic Algorithm dsfsdf

<12.5-r0
  • H
Untrusted Search Path dsfsdf

<12.4-r0
  • H
SQL Injection dsfsdf

<12.4-r0
  • M
Missing Authorization dsfsdf

<12.2-r0
  • H
SQL Injection dsfsdf

<11.5-r0
  • L
Out-of-bounds Read dsfsdf

<11.5-r0
  • H
Out-of-bounds Write dsfsdf

<11.4-r0
  • M
Out-of-bounds Read dsfsdf

<11.3-r0
  • M
Improper Access Control dsfsdf

<11.3-r0
  • C
SQL Injection dsfsdf

<11.1-r0
  • H
Incorrect Authorization dsfsdf

<10.5-r0
  • H
SQL Injection dsfsdf

<10.5-r0
  • C
Incorrect Permission Assignment for Critical Resource dsfsdf

<10.4-r0
  • H
Improper Input Validation dsfsdf

<10.3-r0
  • H
Incorrect Permission Assignment for Critical Resource dsfsdf

<10.2-r0
  • M
Information Exposure dsfsdf

<10.2-r0
  • M
Information Exposure dsfsdf

<10.1-r0
  • H
Information Exposure dsfsdf

<10.1-r0
  • H
Insufficiently Protected Credentials dsfsdf

<9.6.4-r0
  • C
Improper Authentication dsfsdf

<9.6.4-r0
  • H
Missing Authorization dsfsdf

<9.6.4-r0
  • M
Missing Encryption of Sensitive Data dsfsdf

<9.6.3-r0
  • H
Information Exposure dsfsdf

<9.6.3-r0
  • H
Information Exposure dsfsdf

<9.6.3-r0