postgresql-test-rpm-macros vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the postgresql-test-rpm-macros package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Integer Overflow or Wraparound

*
  • L
Missing Authorization

*
  • L
Exposure of Sensitive Information Through Metadata

*
  • H
CRLF Injection

<0:16.10-1.module+el8.10.0+23424+e26efc6c
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:16.10-1.module+el8.10.0+23424+e26efc6c
  • M
Buffer Over-read

*
  • H
External Control of System or Configuration Setting

<0:16.6-1.module+el8.10.0+22551+c0330dc9
  • H
Incorrect Privilege Assignment

<0:16.6-1.module+el8.10.0+22551+c0330dc9
  • H
Improper Preservation of Consistency Between Independent Representations of Shared State

<0:16.6-1.module+el8.10.0+22551+c0330dc9
  • L
Use of Less Trusted Source

*
  • H
Improper Neutralization

<0:16.8-1.module+el8.10.0+22867+e4e13b1c
  • H
Time-of-check Time-of-use (TOCTOU)

<0:16.4-1.module+el8.10.0+22209+060d7a0a
  • H
Missing Authorization

<0:16.4-1.module+el8.10.0+22209+060d7a0a
  • H
Privilege Dropping / Lowering Errors

<0:10.23-4.module+el8.9.0+21317+d2c6bf8a
  • L
Resource Exhaustion

<0:12.17-1.module+el8.9.0+20789+410e66ce
  • M
Function Call With Incorrect Argument Type

<0:12.17-1.module+el8.9.0+20789+410e66ce
  • H
Integer Overflow or Wraparound

<0:10.23-3.module+el8.9.0+20831+78489779
  • L
Buffer Overflow

*
  • H
Insufficient Granularity of Access Control

<0:15.5-1.module+el8.9.0+20663+03952ce4
  • M
SQL Injection

*
  • M
Improper Input Validation

<0:12.15-1.module+el8.8.0+19427+d1071523
  • M
Improper Input Validation

<0:12.15-1.module+el8.8.0+19427+d1071523
  • L
Information Exposure

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<0:10.23-1.module+el8.7.0+17280+3a452e1f
  • H
Incomplete Cleanup

<0:10.21-2.module+el8.6.0+15342+53518fac
  • M
SQL Injection

<0:13.5-1.module+el8.5.0+13344+8c0fd184
  • M
Information Exposure

<0:13.5-1.module+el8.5.0+13344+8c0fd184
  • L
Information Exposure

<0:12.7-1.module+el8.4.0+11288+c193d6d7
  • M
Improper Input Validation

<0:10.14-1.module+el8.2.0+7801+be0fed80
  • M
Improper Authorization

<0:10.14-1.module+el8.2.0+7801+be0fed80
  • M
Improper Access Control

<0:10.14-1.module+el8.2.0+7801+be0fed80
  • H
Integer Overflow or Wraparound

<0:10.17-1.module+el8.4.0+11249+895597ab
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:10.15-1.module+el8.3.0+8944+1ca16b1f
  • H
SQL Injection

<0:10.15-1.module+el8.3.0+8944+1ca16b1f
  • H
Information Exposure

<0:10.17-1.module+el8.4.0+11249+895597ab
  • M
Out-of-bounds Read

<0:13.3-1.module+el8.4.0+11254+85259292
  • H
Permissive Whitelist

<0:10.15-1.module+el8.3.0+8944+1ca16b1f
  • M
Improper Input Validation

<0:10.14-1.module+el8.2.0+7801+be0fed80
  • M
SQL Injection

<0:10.14-1.module+el8.2.0+7801+be0fed80
  • M
Stack-based Buffer Overflow

<0:10.14-1.module+el8.2.0+7801+be0fed80