postgresql-docs vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the postgresql-docs package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Time-of-check Time-of-use (TOCTOU)

<0:13.16-1.module+el8.10.0+22213+5adc94fe
  • L
Missing Authorization

<0:15.8-1.module+el8.10.0+22212+a51fe170
  • H
Privilege Dropping / Lowering Errors

<0:13.14-1.module+el8.9.0+21288+3d364c44
  • L
Resource Exhaustion

<0:13.13-1.module+el8.9.0+20664+9c30cf7f
  • M
Function Call With Incorrect Argument Type

<0:13.13-1.module+el8.9.0+20664+9c30cf7f
  • H
Integer Overflow or Wraparound

<0:13.13-1.module+el8.9.0+20664+9c30cf7f
  • L
Buffer Overflow

*
  • L
Insufficient Granularity of Access Control

<0:15.5-1.module+el8.9.0+20663+03952ce4
  • M
SQL Injection

<0:13.13-1.module+el8.9.0+20664+9c30cf7f
  • M
Improper Input Validation

<0:13.11-1.module+el8.8.0+19081+0a277c66
  • M
Improper Input Validation

<0:13.11-1.module+el8.8.0+19081+0a277c66
  • M
Information Exposure

<0:13.10-1.module+el8.7.0+18279+1ca8cf12
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:13.10-1.module+el8.7.0+18279+1ca8cf12
  • H
Incomplete Cleanup

<0:13.7-2.module+el8.6.0+15347+b8eabcef
  • M
SQL Injection

<0:13.5-1.module+el8.5.0+13344+8c0fd184
  • M
Information Exposure

<0:13.5-1.module+el8.5.0+13344+8c0fd184
  • H
Information Exposure

<0:12.7-1.module+el8.4.0+11288+c193d6d7
  • H
Improper Input Validation

<0:12.5-1.module+el8.3.0+9042+664538f4
  • H
Improper Authorization

<0:12.5-1.module+el8.3.0+9042+664538f4
  • H
Improper Access Control

<0:9.6.20-1.module+el8.3.0+8938+7f0e88b6
  • H
Integer Overflow or Wraparound

<0:13.3-1.module+el8.4.0+11254+85259292
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:12.5-1.module+el8.3.0+9042+664538f4
  • H
SQL Injection

<0:12.5-1.module+el8.3.0+9042+664538f4
  • H
Information Exposure

<0:13.3-1.module+el8.4.0+11254+85259292
  • H
Out-of-bounds Read

<0:13.3-1.module+el8.4.0+11254+85259292
  • H
Permissive Whitelist

<0:12.5-1.module+el8.3.0+9042+664538f4
  • H
Improper Input Validation

<0:12.5-1.module+el8.3.0+9042+664538f4
  • H
SQL Injection

<0:9.6.20-1.module+el8.3.0+8938+7f0e88b6
  • M
Stack-based Buffer Overflow

<0:10.14-1.module+el8.2.0+7801+be0fed80