postgresql-server vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the postgresql-server package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
External Control of System or Configuration Setting

*
  • H
Time-of-check Time-of-use (TOCTOU)

*
  • L
Missing Authorization

*
  • H
Privilege Dropping / Lowering Errors

*
  • H
Integer Overflow or Wraparound

*
  • L
Resource Exhaustion

*
  • M
Function Call With Incorrect Argument Type

*
  • L
Buffer Overflow

*
  • M
SQL Injection

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Incomplete Cleanup

*
  • L
Insufficiently Protected Credentials

*
  • M
SQL Injection

*
  • H
Stack-based Buffer Overflow

<0:8.4.20-1.el6_5
  • H
Race Condition

<0:8.4.20-1.el6_5
  • H
Access Restriction Bypass

<0:8.4.20-1.el6_5
  • H
Access Restriction Bypass

<0:8.4.20-1.el6_5
  • H
NULL Pointer Dereference

<0:8.4.20-1.el6_5
  • H
Out-of-Bounds

<0:8.4.20-1.el6_5
  • H
Integer Overflow or Wraparound

<0:8.4.20-1.el6_5
  • M
Improper Authentication

<0:8.4.20-8.el6_9
  • M
Improper Input Validation

<0:8.4.18-1.el6_4
  • M
Numeric Errors

<0:8.4.18-1.el6_4
  • M
Improper Input Validation

<0:8.4.13-1.el6_3
  • M
Access Restriction Bypass

<0:8.4.13-1.el6_3
  • H
Integer Overflow or Wraparound

<0:8.4.20-5.el6_7
  • M
Resource Management Errors

<0:8.4.12-1.el6_2
  • M
Cryptographic Issues

<0:8.4.12-1.el6_2
  • M
Access Restriction Bypass

<0:8.4.11-1.el6_2
  • M
SQL Injection

<0:8.4.11-1.el6_2
  • M
Improper Input Validation

<0:8.4.11-1.el6_2
  • M
Incorrect Calculation of Buffer Size

<0:8.4.20-4.el6_7
  • M
Information Exposure

<0:8.4.20-3.el6_6
  • M
Cryptographic Issues

<0:8.4.9-1.el6_1.1
  • M
Unchecked Error Condition

<0:8.4.20-3.el6_6
  • M
Use After Free

<0:8.4.20-3.el6_6
  • M
Improper Synchronization

<0:8.4.20-2.el6_6
  • M
Heap-based Buffer Overflow

<0:8.4.20-2.el6_6
  • M
Heap-based Buffer Overflow

<0:8.4.20-2.el6_6
  • M
Improper Synchronization

<0:8.4.20-2.el6_6
  • M
Stack-based Buffer Overflow

<0:8.4.7-1.el6_0.1
  • M
Access Restriction Bypass

<0:8.4.5-1.el6_0.2
  • H
Integer Overflow or Wraparound

*
  • H
Use of a Broken or Risky Cryptographic Algorithm

*
  • H
SQL Injection

*
  • M
Information Exposure

*
  • M
Out-of-bounds Read

*
  • M
Permissive Whitelist

*
  • M
Improper Input Validation

*
  • M
SQL Injection

*
  • M
Improper Input Validation

*
  • M
Missing Authorization

*
  • M
Improper Authorization

*
  • M
Link Following

*
  • M
Link Following

*
  • M
Improper Input Validation

*
  • M
Untrusted Pointer Dereference

*
  • L
Incorrect Authorization

*
  • L
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Arbitrary Code Injection

*