postgres-decoderbufs vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the postgres-decoderbufs package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
External Control of System or Configuration Setting

<0:0.10.0-2.module+el8.9.0+20664+9c30cf7f
  • H
Incorrect Privilege Assignment

<0:0.10.0-2.module+el8.9.0+20664+9c30cf7f
  • H
Improper Preservation of Consistency Between Independent Representations of Shared State

<0:0.10.0-2.module+el8.9.0+20664+9c30cf7f
  • L
Use of Less Trusted Source

*
  • H
Improper Neutralization

<0:1.9.7-1.Final.module+el8.9.0+19797+c4ce5969
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.9.7-1.Final.module+el8.9.0+19797+c4ce5969
  • H
Missing Authorization

<0:1.9.7-1.Final.module+el8.9.0+19797+c4ce5969
  • H
Privilege Dropping / Lowering Errors

<0:1.9.7-1.Final.module+el8.9.0+19797+c4ce5969
  • L
Resource Exhaustion

<0:0.10.0-2.module+el8.9.0+20664+9c30cf7f
  • M
Function Call With Incorrect Argument Type

<0:0.10.0-2.module+el8.9.0+20664+9c30cf7f
  • H
Integer Overflow or Wraparound

<0:0.10.0-2.module+el8.9.0+20664+9c30cf7f
  • L
Buffer Overflow

*
  • L
Insufficient Granularity of Access Control

<0:1.9.7-1.Final.module+el8.9.0+19797+c4ce5969
  • M
SQL Injection

<0:0.10.0-2.module+el8.9.0+20664+9c30cf7f
  • M
Improper Input Validation

<0:1.9.7-1.Final.module+el8.8.0+17071+aaaceaa4
  • M
Improper Input Validation

<0:1.9.7-1.Final.module+el8.8.0+17071+aaaceaa4
  • M
Information Exposure

<0:0.10.0-2.module+el8.5.0+11354+78b3c9c5
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:0.10.0-2.module+el8.4.0+8873+b821c30a
  • H
Incomplete Cleanup

<0:0.10.0-2.module+el8.5.0+11354+78b3c9c5
  • M
SQL Injection

<0:0.10.0-2.module+el8.5.0+11354+78b3c9c5
  • M
Information Exposure

<0:0.10.0-2.module+el8.5.0+11354+78b3c9c5
  • H
Information Exposure

<0:0.10.0-2.module+el8.4.0+11288+c193d6d7
  • M
Improper Input Validation

<0:0.10.0-2.module+el8.3.0+9042+664538f4
  • H
Improper Authorization

<0:0.10.0-2.module+el8.3.0+9042+664538f4
  • H
Integer Overflow or Wraparound

<0:0.10.0-2.module+el8.4.0+11288+c193d6d7
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:0.10.0-2.module+el8.3.0+9042+664538f4
  • H
SQL Injection

<0:0.10.0-2.module+el8.3.0+9042+664538f4
  • H
Information Exposure

<0:0.10.0-2.module+el8.4.0+11288+c193d6d7
  • H
Out-of-bounds Read

<0:0.10.0-2.module+el8.4.0+11288+c193d6d7
  • H
Permissive Whitelist

<0:0.10.0-2.module+el8.3.0+9042+664538f4
  • H
Improper Input Validation

<0:0.10.0-2.module+el8.3.0+9042+664538f4