postgresql-static vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the postgresql-static package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Incorrect Privilege Assignment

*
  • M
Improper Preservation of Consistency Between Independent Representations of Shared State

*
  • L
Use of Less Trusted Source

*
  • H
Time-of-check Time-of-use (TOCTOU)

<0:9.2.24-9.el7_9.1
  • H
SQL Injection

<0:9.2.24-6.el7_9
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:9.2.24-6.el7_9
  • H
SQL Injection

<0:9.2.24-6.el7_9
  • H
Integer Overflow or Wraparound

<0:9.2.24-9.el7_9
  • H
Incomplete Cleanup

<0:9.2.24-8.el7_9
  • H
Integer Overflow or Wraparound

<0:9.2.24-7.el7_9
  • H
Improper Initialization

<0:9.2.24-1.el7_5
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Insufficiently Protected Credentials

<0:9.2.23-1.el7_4
  • M
Improper Authentication

<0:9.2.23-1.el7_4
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • H
Time-of-check Time-of-use (TOCTOU)

*
  • L
Missing Authorization

*
  • H
Integer Overflow or Wraparound

<0:9.2.24-9.el7_9
  • M
Function Call With Incorrect Argument Type

*
  • L
Resource Exhaustion

*
  • L
Buffer Overflow

*
  • M
SQL Injection

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Incomplete Cleanup

<0:9.2.24-8.el7_9
  • L
Insufficiently Protected Credentials

*
  • M
SQL Injection

*
  • H
Improper Initialization

<0:9.2.24-1.el7_5
  • H
Improper Initialization

<0:9.2.24-1.el7_5
  • H
Improper Initialization

<0:9.2.24-1.el7_5
  • H
Improper Initialization

<0:9.2.24-1.el7_5
  • H
Improper Initialization

<0:9.2.24-1.el7_5
  • H
Improper Initialization

<0:9.2.24-1.el7_5
  • H
Improper Initialization

<0:9.2.24-1.el7_5
  • H
Improper Initialization

<0:9.2.24-1.el7_5
  • H
Improper Initialization

<0:9.2.24-1.el7_5
  • H
Improper Initialization

<0:9.2.24-1.el7_5
  • M
Improper Authentication

<0:9.2.23-1.el7_4
  • M
Improper Authentication

<0:9.2.23-1.el7_4
  • M
Improper Authentication

<0:9.2.23-1.el7_4
  • M
Improper Authentication

<0:9.2.23-1.el7_4
  • M
Improper Authentication

<0:9.2.23-1.el7_4
  • M
Improper Authentication

<0:9.2.23-1.el7_4
  • M
Improper Authentication

<0:9.2.23-1.el7_4
  • M
Improper Authentication

<0:9.2.23-1.el7_4
  • M
Improper Authentication

<0:9.2.23-1.el7_4
  • M
Improper Authentication

<0:9.2.23-1.el7_4
  • M
Improper Authentication

<0:9.2.23-1.el7_4
  • M
Improper Authentication

<0:9.2.23-1.el7_4
  • M
Improper Authentication

<0:9.2.23-1.el7_4
  • M
Improper Authentication

<0:9.2.23-1.el7_4
  • M
Insufficiently Protected Credentials

<0:9.2.23-1.el7_4
  • M
Insufficiently Protected Credentials

<0:9.2.23-1.el7_4
  • M
Insufficiently Protected Credentials

<0:9.2.23-1.el7_4
  • M
Insufficiently Protected Credentials

<0:9.2.23-1.el7_4
  • M
Insufficiently Protected Credentials

<0:9.2.23-1.el7_4
  • M
Insufficiently Protected Credentials

<0:9.2.23-1.el7_4
  • M
Insufficiently Protected Credentials

<0:9.2.23-1.el7_4
  • M
Insufficiently Protected Credentials

<0:9.2.23-1.el7_4
  • M
Insufficiently Protected Credentials

<0:9.2.23-1.el7_4
  • M
Insufficiently Protected Credentials

<0:9.2.23-1.el7_4
  • M
Insufficiently Protected Credentials

<0:9.2.23-1.el7_4
  • M
Insufficiently Protected Credentials

<0:9.2.23-1.el7_4
  • M
Insufficiently Protected Credentials

<0:9.2.23-1.el7_4
  • M
Insufficiently Protected Credentials

<0:9.2.23-1.el7_4
  • H
Integer Overflow or Wraparound

<0:9.2.24-7.el7_9
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:9.2.24-6.el7_9
  • H
SQL Injection

<0:9.2.24-6.el7_9
  • M
Information Exposure

*
  • M
Out-of-bounds Read

*
  • M
Permissive Whitelist

*
  • M
Improper Input Validation

*
  • H
SQL Injection

<0:9.2.24-6.el7_9
  • M
Improper Input Validation

*
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • L
Incorrect Authorization

*