postgresql-pltcl vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the postgresql-pltcl package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Integer Overflow or Wraparound

*
  • L
Missing Authorization

*
  • L
Exposure of Sensitive Information Through Metadata

*
  • H
CRLF Injection

*
  • H
Inclusion of Functionality from Untrusted Control Sphere

*
  • M
Buffer Over-read

*
  • H
External Control of System or Configuration Setting

*
  • H
Improper Neutralization

*
  • H
Time-of-check Time-of-use (TOCTOU)

*
  • L
Missing Authorization

*
  • H
Privilege Dropping / Lowering Errors

*
  • H
Integer Overflow or Wraparound

*
  • L
Resource Exhaustion

*
  • M
Function Call With Incorrect Argument Type

*
  • L
Buffer Overflow

*
  • M
SQL Injection

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Incomplete Cleanup

*
  • L
Insufficiently Protected Credentials

*
  • M
SQL Injection

*
  • H
Stack-based Buffer Overflow

<0:8.4.20-1.el6_5
  • H
Race Condition

<0:8.4.20-1.el6_5
  • H
Access Restriction Bypass

<0:8.4.20-1.el6_5
  • H
Access Restriction Bypass

<0:8.4.20-1.el6_5
  • H
NULL Pointer Dereference

<0:8.4.20-1.el6_5
  • H
Out-of-Bounds

<0:8.4.20-1.el6_5
  • H
Integer Overflow or Wraparound

<0:8.4.20-1.el6_5
  • M
Improper Authentication

<0:8.4.20-8.el6_9
  • M
Improper Input Validation

<0:8.4.18-1.el6_4
  • M
Numeric Errors

<0:8.4.18-1.el6_4
  • M
Improper Input Validation

<0:8.4.13-1.el6_3
  • M
Access Restriction Bypass

<0:8.4.13-1.el6_3
  • H
Integer Overflow or Wraparound

<0:8.4.20-5.el6_7
  • M
Resource Management Errors

<0:8.4.12-1.el6_2
  • M
Cryptographic Issues

<0:8.4.12-1.el6_2
  • M
Access Restriction Bypass

<0:8.4.11-1.el6_2
  • M
SQL Injection

<0:8.4.11-1.el6_2
  • M
Improper Input Validation

<0:8.4.11-1.el6_2
  • M
Incorrect Calculation of Buffer Size

<0:8.4.20-4.el6_7
  • M
Information Exposure

<0:8.4.20-3.el6_6
  • M
Cryptographic Issues

<0:8.4.9-1.el6_1.1
  • M
Unchecked Error Condition

<0:8.4.20-3.el6_6
  • M
Use After Free

<0:8.4.20-3.el6_6
  • M
Improper Synchronization

<0:8.4.20-2.el6_6
  • M
Heap-based Buffer Overflow

<0:8.4.20-2.el6_6
  • M
Heap-based Buffer Overflow

<0:8.4.20-2.el6_6
  • M
Improper Synchronization

<0:8.4.20-2.el6_6
  • M
Stack-based Buffer Overflow

<0:8.4.7-1.el6_0.1
  • M
Access Restriction Bypass

<0:8.4.5-1.el6_0.2
  • H
Integer Overflow or Wraparound

*
  • H
Use of a Broken or Risky Cryptographic Algorithm

*
  • H
SQL Injection

*
  • M
Information Exposure

*
  • M
Out-of-bounds Read

*
  • M
Permissive Whitelist

*
  • M
Improper Input Validation

*
  • M
SQL Injection

*
  • M
Improper Input Validation

*
  • M
Missing Authorization

*
  • M
Improper Authorization

*
  • M
Link Following

*
  • M
Link Following

*
  • M
Improper Input Validation

*
  • M
Untrusted Pointer Dereference

*
  • L
Incorrect Authorization

*
  • L
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Arbitrary Code Injection

*