postgresql15 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the postgresql15 package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
CVE-2024-10979

<15.9-r0
  • L
CVE-2024-10976

<15.9-r0
  • L
CVE-2024-10977

<15.9-r0
  • L
CVE-2024-10978

<15.9-r0
  • H
Time-of-check Time-of-use (TOCTOU)

<15.8-r0
  • H
Information Exposure

<9.6.3-r0
  • H
Information Exposure

<9.6.3-r0
  • M
CVE-2023-5870

<15.5-r0
  • H
SQL Injection

<15.4-r0
  • H
Missing Authorization

<9.6.4-r0
  • C
Improper Authentication

<9.6.4-r0
  • M
Missing Encryption of Sensitive Data

<9.6.3-r0
  • H
Integer Overflow or Wraparound

<15.5-r0
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<14.5-r0
  • H
Insufficiently Protected Credentials

<9.6.4-r0
  • H
CVE-2024-0985

<15.6-r0
  • M
CVE-2023-5868

<15.5-r0
  • H
Out-of-bounds Write

<11.4-r0
  • M
Missing Authorization

<12.2-r0
  • M
Out-of-bounds Read

<11.3-r0
  • H
CVE-2023-2454

<15.3-r0
  • L
CVE-2022-41862

<15.2-r0
  • M
CVE-2023-2455

<15.3-r0
  • H
Incomplete Cleanup

<14.3-r0
  • H
SQL Injection

<14.1-r0
  • M
Information Exposure

<13.4-r0
  • M
Insufficiently Protected Credentials

<14.1-r0
  • M
CVE-2021-32029

<13.3-r0
  • M
Information Exposure

<13.3-r0
  • H
Insufficient Comparison

<12.5-r0
  • M
Information Exposure

<10.1-r0
  • M
Information Exposure

<13.2-r0
  • H
Information Exposure

<10.1-r0
  • H
Use of a Broken or Risky Cryptographic Algorithm

<12.5-r0
  • H
SQL Injection

<12.5-r0
  • L
Out-of-bounds Read

<11.5-r0
  • M
CVE-2023-39418

<15.4-r0
  • H
SQL Injection

<11.5-r0
  • C
SQL Injection

<11.1-r0
  • H
SQL Injection

<10.5-r0
  • M
Information Exposure

<10.2-r0
  • H
Incorrect Permission Assignment for Critical Resource

<10.2-r0
  • H
Out-of-Bounds

<13.3-r0
  • M
Incorrect Authorization

<13.2-r0
  • H
SQL Injection

<12.4-r0
  • H
Untrusted Search Path

<12.4-r0
  • H
Incorrect Authorization

<10.5-r0
  • M
Improper Access Control

<11.3-r0
  • C
Incorrect Permission Assignment for Critical Resource

<10.4-r0
  • H
Improper Input Validation

<10.3-r0