php56-pgsql vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the php56-pgsql package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Resource Exhaustion

<0:5.6.40-1.144.amzn1
  • C
Out-of-bounds Write

<0:5.6.40-1.143.amzn1
  • M
NULL Pointer Dereference

<0:5.6.39-1.141.amzn1
  • M
Arbitrary Argument Injection

<0:5.6.39-1.141.amzn1
  • M
Cross-site Scripting (XSS)

<0:5.6.38-1.140.amzn1
  • L
Out-of-bounds Read

<0:5.6.37-1.139.amzn1
  • L
Out-of-bounds Read

<0:5.6.37-1.139.amzn1
  • M
NULL Pointer Dereference

<0:5.6.36-1.138.amzn1
  • M
Out-of-bounds Read

<0:5.6.36-1.138.amzn1
  • M
Cross-site Scripting (XSS)

<0:5.6.36-1.138.amzn1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:5.6.36-1.138.amzn1
  • M
Out-of-Bounds

<0:5.6.35-1.137.amzn1
  • M
Cross-site Scripting (XSS)

<0:5.6.33-1.136.amzn1
  • M
Incorrect Conversion between Numeric Types

<0:5.6.33-1.136.amzn1
  • H
Out-of-Bounds

<0:5.6.32-1.135.amzn1
  • M
NULL Pointer Dereference

<0:5.6.31-1.134.amzn1
  • M
Out-of-bounds Write

<0:5.6.31-1.134.amzn1
  • M
Out-of-bounds Read

<0:5.6.31-1.134.amzn1
  • M
Out-of-bounds Read

<0:5.6.31-1.134.amzn1
  • M
Out-of-bounds Write

<0:5.6.31-1.134.amzn1
  • M
Integer Overflow or Wraparound

<0:5.6.30-1.133.amzn1
  • M
Improper Input Validation

<0:5.6.30-1.133.amzn1
  • M
Out-of-Bounds

<0:5.6.30-1.133.amzn1
  • M
Integer Overflow or Wraparound

<0:5.6.30-1.133.amzn1
  • M
Numeric Errors

<0:5.6.30-1.133.amzn1
  • M
Out-of-bounds Read

<0:5.6.30-1.133.amzn1
  • M
Out-of-bounds Read

<0:5.6.29-1.131.amzn1
  • M
Out-of-Bounds

<0:5.6.29-1.131.amzn1
  • M
Out-of-Bounds

<0:5.6.29-1.131.amzn1
  • M
NULL Pointer Dereference

<0:5.6.29-1.131.amzn1
  • M
Use After Free

<0:5.6.29-1.131.amzn1
  • M
NULL Pointer Dereference

<0:5.6.26-1.128.amzn1
  • M
Unchecked Return Value

<0:5.6.26-1.128.amzn1
  • M
Out-of-Bounds

<0:5.6.26-1.128.amzn1
  • M
Out-of-bounds Read

<0:5.6.26-1.128.amzn1
  • M
Use After Free

<0:5.6.26-1.128.amzn1
  • M
Out-of-Bounds

<0:5.6.26-1.128.amzn1
  • M
Use After Free

<0:5.6.26-1.128.amzn1
  • M
Use After Free

<0:5.6.24-1.126.amzn1
  • M
Double Free

<0:5.6.24-1.126.amzn1
  • M
Use After Free

<0:5.6.24-1.126.amzn1
  • M
Integer Overflow or Wraparound

<0:5.6.24-1.126.amzn1
  • M
Integer Overflow or Wraparound

<0:5.6.24-1.126.amzn1
  • M
Double Free

<0:5.6.24-1.126.amzn1
  • M
Integer Overflow or Wraparound

<0:5.6.24-1.126.amzn1
  • M
Integer Overflow or Wraparound

<0:5.6.24-1.126.amzn1
  • M
Improper Access Control

<0:5.6.24-1.126.amzn1
  • M
Out-of-Bounds

<0:5.6.24-1.126.amzn1
  • M
Integer Overflow or Wraparound

<0:5.6.22-1.125.amzn1
  • M
Integer Overflow or Wraparound

<0:5.6.22-1.125.amzn1
  • M
Integer Overflow or Wraparound

<0:5.6.22-1.125.amzn1
  • M
Out-of-bounds Read

<0:5.6.22-1.125.amzn1
  • M
Out-of-bounds Read

<0:5.6.22-1.125.amzn1
  • H
Out-of-Bounds

<0:5.6.21-1.124.amzn1
  • H
Improper Input Validation

<0:5.6.21-1.124.amzn1
  • H
Improper Input Validation

<0:5.6.21-1.124.amzn1
  • H
Numeric Errors

<0:5.6.21-1.124.amzn1
  • H
Numeric Errors

<0:5.6.21-1.124.amzn1
  • H
Out-of-Bounds

<0:5.6.21-1.124.amzn1
  • M
Out-of-Bounds

<0:5.6.19-1.123.amzn1
  • M
Out-of-Bounds

<0:5.6.17-1.120.amzn1
  • M
Numeric Errors

<0:5.6.14-1.119.amzn1
  • M
CVE-2015-7803

<0:5.6.14-1.119.amzn1
  • M
CVE-2015-6838

<0:5.6.14-1.119.amzn1
  • M
CVE-2015-6836

<0:5.6.14-1.119.amzn1
  • M
CVE-2015-6837

<0:5.6.14-1.119.amzn1
  • M
Use After Free

<0:5.6.14-1.119.amzn1
  • M
CVE-2015-6834

<0:5.6.14-1.119.amzn1
  • M
Directory Traversal

<0:5.6.12-1.116.amzn1
  • M
CVE-2015-6832

<0:5.6.12-1.116.amzn1
  • M
CVE-2015-6831

<0:5.6.12-1.116.amzn1
  • M
Out-of-Bounds

<0:5.6.12-1.116.amzn1
  • M
Improper Input Validation

<0:5.6.12-1.116.amzn1
  • M
Improper Access Control

<0:5.6.12-1.116.amzn1
  • M
CVE-2015-4644

<0:5.6.10-1.115.amzn1
  • M
Out-of-Bounds

<0:5.6.10-1.115.amzn1
  • M
OS Command Injection

<0:5.6.10-1.115.amzn1
  • M
Improper Input Validation

<0:5.6.10-1.115.amzn1
  • M
Improper Input Validation

<0:5.6.10-1.115.amzn1
  • M
Out-of-bounds Read

<0:5.6.10-1.115.amzn1
  • M
Out-of-bounds Read

<0:5.6.10-1.115.amzn1
  • M
Access Restriction Bypass

<0:5.6.10-1.115.amzn1
  • H
Improper Data Handling

<0:5.6.9-1.112.amzn1
  • H
Improper Data Handling

<0:5.6.9-1.112.amzn1
  • H
Resource Management Errors

<0:5.6.9-1.112.amzn1
  • H
Numeric Errors

<0:5.6.9-1.112.amzn1
  • H
Numeric Errors

<0:5.6.9-1.112.amzn1
  • H
Out-of-bounds Read

<0:5.6.9-1.112.amzn1
  • H
Out-of-bounds Read

<0:5.6.9-1.112.amzn1
  • L
Out-of-Bounds

<0:5.6.8-1.111.amzn1
  • L
CVE-2015-1352

<0:5.6.8-1.111.amzn1
  • L
Use After Free

<0:5.6.8-1.111.amzn1
  • H
Numeric Errors

<0:5.6.7-1.110.amzn1
  • H
Numeric Errors

<0:5.6.7-1.110.amzn1
  • H
CVE-2015-0231

<0:5.6.7-1.110.amzn1