postgresql:15/postgresql-docs vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the postgresql:15/postgresql-docs package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Incorrect Privilege Assignment

<0:15.10-1.module+el8.10.0+22550+22c7d5ca
  • H
Improper Preservation of Consistency Between Independent Representations of Shared State

<0:15.10-1.module+el8.10.0+22550+22c7d5ca
  • H
External Control of System or Configuration Setting

<0:15.10-1.module+el8.10.0+22550+22c7d5ca
  • L
Use of Less Trusted Source

*
  • H
Time-of-check Time-of-use (TOCTOU)

<0:15.8-1.module+el8.8.0+22236+c63904f0
  • H
Missing Authorization

<0:15.8-1.module+el8.8.0+22236+c63904f0
  • H
Time-of-check Time-of-use (TOCTOU)

<0:15.8-1.module+el8.8.0+22236+c63904f0
  • H
Missing Authorization

<0:15.8-1.module+el8.8.0+22236+c63904f0
  • H
Time-of-check Time-of-use (TOCTOU)

<0:15.8-1.module+el8.8.0+22236+c63904f0
  • H
Missing Authorization

<0:15.8-1.module+el8.8.0+22236+c63904f0
  • H
Time-of-check Time-of-use (TOCTOU)

<0:15.8-1.module+el8.8.0+22236+c63904f0
  • H
Missing Authorization

<0:15.8-1.module+el8.8.0+22236+c63904f0
  • H
Time-of-check Time-of-use (TOCTOU)

<0:15.8-1.module+el8.10.0+22212+a51fe170
  • H
Missing Authorization

<0:15.8-1.module+el8.10.0+22212+a51fe170
  • H
Privilege Dropping / Lowering Errors

<0:15.6-1.module+el8.8.0+21343+fedbca97
  • H
Privilege Dropping / Lowering Errors

<0:15.6-1.module+el8.8.0+21343+fedbca97
  • H
Privilege Dropping / Lowering Errors

<0:15.6-1.module+el8.8.0+21343+fedbca97
  • H
Privilege Dropping / Lowering Errors

<0:15.6-1.module+el8.8.0+21343+fedbca97
  • H
Privilege Dropping / Lowering Errors

<0:15.6-1.module+el8.9.0+21287+d0eecfe6
  • H
Resource Exhaustion

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
Integer Overflow or Wraparound

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
Function Call With Incorrect Argument Type

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
Insufficient Granularity of Access Control

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
SQL Injection

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
Resource Exhaustion

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
Integer Overflow or Wraparound

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
Function Call With Incorrect Argument Type

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
Insufficient Granularity of Access Control

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
SQL Injection

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
Resource Exhaustion

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
Integer Overflow or Wraparound

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
Function Call With Incorrect Argument Type

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
Insufficient Granularity of Access Control

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
SQL Injection

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
Resource Exhaustion

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
Integer Overflow or Wraparound

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
Function Call With Incorrect Argument Type

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
Insufficient Granularity of Access Control

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
SQL Injection

<0:15.5-1.module+el8.8.0+20658+5fb3eedd
  • H
Resource Exhaustion

<0:15.5-1.module+el8.9.0+20663+03952ce4
  • H
Function Call With Incorrect Argument Type

<0:15.5-1.module+el8.9.0+20663+03952ce4
  • H
Integer Overflow or Wraparound

<0:15.5-1.module+el8.9.0+20663+03952ce4
  • H
Insufficient Granularity of Access Control

<0:15.5-1.module+el8.9.0+20663+03952ce4
  • H
SQL Injection

<0:15.5-1.module+el8.9.0+20663+03952ce4
  • M
Improper Input Validation

<0:15.3-1.module+el8.8.0+19565+1b0ddae0
  • M
Improper Input Validation

<0:15.3-1.module+el8.8.0+19565+1b0ddae0
  • M
Improper Input Validation

<0:15.3-1.module+el8.8.0+19565+1b0ddae0
  • M
Improper Input Validation

<0:15.3-1.module+el8.8.0+19565+1b0ddae0
  • M
Improper Input Validation

<0:15.3-1.module+el8.8.0+19565+1b0ddae0
  • M
Improper Input Validation

<0:15.3-1.module+el8.8.0+19565+1b0ddae0
  • M
Improper Input Validation

<0:15.3-1.module+el8.8.0+19565+1b0ddae0
  • M
Improper Input Validation

<0:15.3-1.module+el8.8.0+19565+1b0ddae0
  • M
Improper Input Validation

<0:15.3-1.module+el8.8.0+19565+1b0ddae0
  • M
Improper Input Validation

<0:15.3-1.module+el8.8.0+19565+1b0ddae0