postgresql vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the postgresql package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Authentication

<0:8.4.20-8.el6_9
  • H
Out-of-Bounds

<0:8.4.20-5.el6_7
  • M
Information Exposure

<0:8.4.20-4.el6_7
  • M
Out-of-Bounds

<0:8.4.20-3.el6_6
  • M
CVE-2015-3165

<0:8.4.20-3.el6_6
  • M
Information Exposure

<0:8.4.20-3.el6_6
  • M
Information Exposure

<0:8.4.20-2.el6_6
  • M
Buffer Overflow

<0:8.4.20-2.el6_6
  • M
SQL Injection

<0:8.4.20-2.el6_6
  • M
Buffer Overflow

<0:8.4.20-2.el6_6
  • H
Improper Input Validation

<0:8.4.20-1.el6_5
  • H
Access Restriction Bypass

<0:8.4.20-1.el6_5
  • H
Out-of-Bounds

<0:8.4.20-1.el6_5
  • H
Race Condition

<0:8.4.20-1.el6_5
  • H
Numeric Errors

<0:8.4.20-1.el6_5
  • H
Access Restriction Bypass

<0:8.4.20-1.el6_5
  • H
Out-of-Bounds

<0:8.4.20-1.el6_5
  • M
Improper Input Validation

<0:8.4.18-1.el6_4
  • M
Numeric Errors

<0:8.4.18-1.el6_4
  • M
XML External Entity (XXE) Injection

<0:8.4.13-1.el6_3
  • M
Access Restriction Bypass

<0:8.4.13-1.el6_3
  • M
Cryptographic Issues

<0:8.4.12-1.el6_2
  • M
Resource Management Errors

<0:8.4.12-1.el6_2
  • M
Improper Input Validation

<0:8.4.11-1.el6_2
  • M
SQL Injection

<0:8.4.11-1.el6_2
  • M
Access Restriction Bypass

<0:8.4.11-1.el6_2
  • M
Cryptographic Issues

<0:8.4.9-1.el6_1.1
  • M
Numeric Errors

<0:8.4.7-1.el6_0.1