postgresql vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://ftp.postgresql.org|postgresql package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Use of Less Trusted Source

[12.0,12.21)[13.0,13.17)[14.0,14.4)[15.0,15.9)[16.0,16.5)[17.0,17.1)
  • L
Improper Preservation of Consistency Between Independent Representations of Shared State

[,12.21)[13.0,13.17)[14.0,14.14)[15.0,15.9)[16.0,16.5)[17.0,17.1)
  • L
Incorrect Privilege Assignment

[12.0,12.21)[13.0,13.17)[14.0,14.14)[15.0,15.9)[16.0,16.5)[17.0,17.1)
  • C
Arbitrary Code Execution

[,12.21)[13.0,13.17)[14.0,14.14)[15.0,15.9)[16.0,16.5)[17.0,17.1)
  • H
Time-of-Check Time-of-Use (TOCTOU) Race Condition

[,12.20)[13.0,13.16)[14.0,14.13)[15.0,15.8)[16.0,16.4)
  • L
Improper Access Control

[14.0,14.12)[15.0,15.7)[16.0,16.3)
  • H
Privilege Management Errors

[,12.18)[13.0.0,13.14)[14.0.0,14.11)[15.0.0,15.6)
  • H
Buffer Overflow

[,11.22)[12.0,12.17)[13.0,13.13)[14.0,14.10)[15.0,15.5)[16.0,16.1)
  • L
Improper Privilege Management

[,11.22)[12.0,12.17)[13.0,13.13)[14.0,14.10)[15.0,15.5)[16.0,16.1)
  • M
Information Exposure

[,11.22)[12.0,12.17)[13.0,13.13)[14.0,14.10)[15.0,15.5)[16.0,16.1)
  • H
Denial of Service (DoS)

[0,)
  • H
SQL Injection

[,11.21)[12.0,12.16)[13.0,13.12)[14.0,14.9)[15.0,15.4)
  • L
Access Control Bypass

[15.0,15.4)
  • H
Arbitrary Code Execution

[,11.20)[12.0,12.15)[13.0,13.11)[14.0,14.8)[15.0,15.3)
  • M
Improper Privilege Management

[,11.20)[12.0,12.15)[13.0,13.11)[14.0,14.8)[15.0,15.3)
  • L
Information Exposure

[,11.19)[12.0,12.14)[13.0,13.10)[14.0,14.7)[15.0,15.2)
  • H
Arbitrary Code Execution

[,10.22)[11.0,11.17)[12.0,12.12)[13.0,13.8)[14.0,14.5)
  • H
Incorrect Authorization

[,10.21)[11.0,11.6)[12.0,12.11)[13.0,13.7)[14.0,14.7)
  • M
Information Exposure

[9.6.0,9.6.22)[10.0,10.17)[11.0,11.12)[12.0,12.7)[13.0,13.3)
  • M
Information Exposure

[11.0,11.12)[12.0,12.7)[13.0,13.3)
  • M
Symlink Attack

[0,)
  • M
Access Restriction Bypass

[,8.4.20)
  • M
Access Restriction Bypass

[9.6,9.6.17)[10.0,10.12)[11.0,11.7)[12.0,12.2)
  • M
Access Restriction Bypass

[,7.4.26)[8.0.0,8.0.22)[8.1.0,8.1.18)[8.2.0,8.2.14)[8.3.0,8.3.8)[8.4.0,8.4.1)
  • M
Remote Code Execution (RCE)

[,9.0.13)[9.1.0,9.1.9)[9.2.0,9.2.4)
  • C
Information Exposure

[,9.6.9)[10.0,10.4)
  • H
Access Restriction Bypass

[,9.1.20)
  • H
Security Features

[,9.5.2)
  • M
Denial of Service (DoS)

[,8.2.6-1.fc8)
  • M
Improper Input Validation

[,8.3.23)[8.4.0,8.4.16)[9.0.0,9.0.12)[9.1.0,9.1.8)[9.2.0,9.2.3)
  • M
Denial of Service (DoS)

[,7.2.1)
  • M
Improper Input Validation

[,8.4.20)
  • M
Improper Input Validation

[,8.4.11)[9.0.0,9.0.7)[9.1.0,9.1.3)
  • H
Improper Access Control

[,9.4.22)[9.5.0,9.5.17)[9.6.0,9.6.13)[10.0,10.8)[11.0,11.3)
  • H
Remote Code Execution (RCE)

[,9.1.23)
  • H
Buffer Overflow

[,9.0.19)[9.1.0,9.1.15)[9.2.0,9.2.10)[9.3.0,9.3.6)[9.4.0,9.4.1)
  • M
Denial of Service (DoS)

[,8.1.6)
  • M
Information Exposure

[,9.0.19)[9.1.0,9.1.15)[9.2.0,9.2.10)[9.3.0,9.3.6)[9.4.0,9.4.1)
  • H
Access Restriction Bypass

[9.3,10)
  • M
Improper Access Control

[9.5.0,9.5.17)[9.6.0,9.6.13)[10.0,10.8)[11.0,11.3)
  • H
Improper Access Control

[,9.4.22)[9.5.0,9.5.17)[9.6.0,9.6.13)[10.0,10.8)[11.0,11.3)
  • M
Out-of-Bounds

[7.2,8.0.1]
  • H
Arbitrary Code Execution

[,7.2.2)
  • H
Information Exposure

[,9.0.20)[9.1,9.1.16)[9.2,9.2.11)[9.3,9.3.7)[9.4,9.4.2)
  • H
Information Exposure

[,9.3.20)[9.4.0,9.4.15)[9.5.0,9.5.10)[9.6.0,9.6.6)[10.0,10.1)
  • M
Out-of-Bounds

[,9.0.23)
  • M
Resource Management Errors

[,8.3.19)[8.4.0,8.4.12)[9.0.0,9.0.8)[9.1.0,9.1.4)
  • C
Access Restriction Bypass

[,8.3.23)[8.4.0,8.4.17)[9.0.0,9.0.13)[9.1.0,9.1.9)[9.2.0,9.2.4)
  • H
CVE-2005-1409

[7.2.1,8.0.2]
  • L
Denial of Service (DoS)

[,8.4.2)
  • M
Denial of Service (DoS)

[,9.0.16)[9.1.0,9.1.12)[9.2.0,9.2.7)[9.3.0,9.3.3)
  • H
Improper Authorization

[,9.2.22)[9.3.0,9.3.18)[9.4.0,9.4.13)[9.5.0,9.5.8)[9.6.0,9.6.4)
  • M
Access Restriction Bypass

[8.1.0,8.1.2]
  • M
Improper Authentication

[,8.2.14)[8.3.0,8.3.8)
  • C
SQL Injection

[,9.0.19)[9.1.0,9.1.15)[9.2.0,9.2.10)[9.3.0,9.3.6)[9.4.0,9.4.1)
  • M
CVE-2002-1657

[,7.3.19]
  • H
SQL Injection

[,7.3.15)[7.4.0,7.4.13)[8.0.0,8.0.8)[8.1.0,8.1.4)
  • M
Denial of Service (DoS)

[,8.0.11)[8.1.0,8.1.7)[8.2.0,8.2.2)
  • M
Out-of-Bounds

[6.3.2,7.2.3]
  • H
SQL Injection

[9.4.0,9.4.24)[9.5.0,9.5.19)[9.6.0,9.6.15)[10.0,10.10)[11.0,11.5)
  • H
Denial of Service (DoS)

[,8.4.17)[9.0.0,9.0.13)[9.1.0,9.1.9)[9.2.0,9.2.4)
  • M
Access Restriction Bypass

[,9.1.9)[9.2.0,9.2.4)
  • H
Arbitrary Code Execution

[7.2,8.0]
  • M
Denial of Service (DoS)

[6.3.2,7.2.1]
  • C
CVE-2007-3279

[,8.1]
  • C
SQL Injection

[9.3.0,9.3.25)[9.4.0,9.4.20)[9.5.0,9.5.15)[9.6.0,9.6.11)[10.0,10.6)[11.0,11.1)
  • H
Access Restriction Bypass

[,7.4.29)[8.0.0,8.0.25)[8.1.0,8.1.21)[8.2.0,8.2.17)[8.3.0,8.3.11)[8.4.0,8.4.4)
  • H
Out-of-Bounds

[9.6.0,9.6.22)[10.0,10.17)[11.0,11.12)[12.0,12.7)[13.0,13.3)
  • H
Improper Authorization

[,9.4.13)[9.5.0,9.5.8)[9.6.0,9.6.4)
  • M
Race Condition

[,8.4.20)
  • H
Use of a Risky Cryptographic Algorithm

[,9.5.24)[9.6.0,9.6.20)[10.0,10.15)[11.0,11.10)[12.0,12.5)[13.0,13.1)
  • M
Access Restriction Bypass

[7.2,8.0.0]
  • M
Denial of Service (DoS)

[,9.0.20)
  • M
Denial of Service (DoS)

[,8.4.20)
  • H
NULL Pointer Dereference

[,9.1.23)
  • M
Denial of Service (DoS)

[,8.0.6)[8.1.0,8.1.2)
  • M
Cryptographic Issues

[,9.2.21)[9.3.0,9.3.17)[9.4.0,9.4.12)[9.5.0,9.5.7)[9.6.0,9.6.3)
  • H
Improper Access Control

[,9.3.15)[9.4.0,9.4.10)[9.5.0,9.5.5)
  • M
Denial of Service (DoS)

[7.4.1,7.4.14)[,8.0.9)[8.1.0,8.1.5)
  • M
Access Restriction Bypass

[,8.3.20)[8.4.0,8.4.13)[9.0.0,9.0.9)[9.1.0,9.1.5)
  • M
Information Exposure

[,10.2)
  • C
Access Restriction Bypass

[,9.5.2)
  • C
CVE-2002-1399

[,7.2.3)
  • H
Denial of Service (DoS)

[7.2,7.2.2]
  • C
Arbitrary Code Execution

[,9.4.24)[9.5.0,9.5.19)[9.6.0,9.6.15)[10.0,10.10)[11.0,11.5)
  • M
Symlink Attack

[,9.2.24)[9.3.0,9.3.20)[9.4.0,9.4.15)[9.5.0,9.5.10)[9.6.0,9.6.6)[10.0,10.1)
  • M
Incorrect Authorization

[13.0,13.2)
  • H
SQL Injection

[10.0,10.14)[11.0,11.9)[12.0,12.4)
  • M
Access Restriction Bypass

[,7.3.19)[7.4,7.4.17)[8.0,8.0.13)[8.1,8.1.9)[8.2,8.2.4)
  • M
Access Restriction Bypass

[,7.4.27)[8.0.0,8.0.23)[8.1.0,8.1.19)[8.2.0,8.2.15)[8.3.0,8.3.9)[8.4.0,8.4.2)
  • H
SQL Injection

[,7.3.15)[7.4.0,7.4.13)[8.0.0,8.0.8)[8.1.0,8.1.4)
  • H
Untrusted Search Path

[9.5,9.5.23)[9.6,9.6.19)[10.0,10.14)[11.0,11.9)[12.0,12.4)
  • M
Out-of-Bounds

[,8.4.20)
  • H
SQL Injection

[,9.5.24)[9.6.0,9.6.20)[10.0,10.15)[11.0,11.10)[12.0,12.5)[13.0,13.1)
  • C
CVE-2013-1902

[,8.3.23)[8.4.0,8.4.17)[9.0.0,9.0.13)[9.1.0,9.1.9)[9.2.0,9.2.4)
  • M
Denial of Service (DoS)

[,8.2.20)[8.3.0,8.3.14)[8.4.0,8.4.7)[9.0.0,9.0.3)
  • H
Access Restriction Bypass

[,8.1]
  • H
Improper Input Validation

[,6.5.0]
  • L
Out-of-bounds Read

[11.0,11.5)
  • M
Denial of Service (DoS)

[7.2,8.0.0]
  • M
Denial of Service (DoS)

[,8.2.6-1.fc8)
  • H
Remote Code Execution (RCE)

[,8.1]
  • H
Access Restriction Bypass

[9.3.0,9.3.21)[9.4.0,9.4.16)[9.5.0,9.5.11)[9.6.0,9.6.7)
  • M
Improper Input Validation

[,8.3.20)[8.4.0,8.4.13)[9.0.0,9.0.9)[9.1.0,9.1.5)
  • H
Out-of-bounds Write

[10.0,10.9)[11.0,11.4)
  • M
Out-of-Bounds

[,8.4.20)
  • H
Out-of-bounds Write

[,9.0.19)[9.1.0,9.1.15)[9.2.0,9.2.10)[9.3.0,9.3.6)[9.4.0,9.4.1)
  • M
Information Exposure

[,9.0.23)
  • M
Cryptographic Issues

[,7.4.27)[8.0.0,8.0.23)[8.1.0,8.1.19)[8.2.0,8.2.15)[8.3.0,8.3.9)[8.4.0,8.4.2)
  • M
Access Restriction Bypass

[,8.4.20)
  • M
Access Restriction Bypass

[,7.4.30)[8.0.0,8.0.26)[8.1.0,8.1.22)[8.2.0,8.2.18)[8.3.0,8.3.12)[8.4.0,8.4.5)[9.0.0,9.0.1)
  • H
Information Exposure

[,9.2.21)
  • H
Information Exposure

[,9.2.21)[9.3.0,9.3.17)[9.4.0,9.4.12)[9.5.0,9.5.7)[9.6.0,9.6.3)
  • H
Access Restriction Bypass

[,9.4-0.5.3.1)
  • M
Denial of Service (DoS)

[,8.1.5)
  • C
Improper Authentication

[,9.2.22)[9.3.0,9.3.18)[9.4.0,9.4.13)[9.5.0,9.5.8)[9.6.0,9.6.4)
  • M
Denial of Service (DoS)

[,8.2.14)[8.3.0,8.3.8)[8.4.0,8.4.1)
  • M
Information Exposure

[6.3.2,6.5.3.1]
  • M
Access Restriction Bypass

[,8.2.6-1.fc8)
  • M
Denial of Service (DoS)

[7.4,8.0.2]
  • M
Information Exposure

[,11.11)[12.0,12.6)[13.0,13.2)
  • M
Resource Management Errors

[7.4,7.4.19)[8.0,8.0.15)[8.1,8.1.11)[8.2,8.2.6)
  • H
Improper Access Control

[,9.0.0)
  • H
Improper Input Validation

[8.1,9.1]
  • H
Denial of Service (DoS)

[6.3.2,7.2]
  • H
Incorrect Comparison

[9.5.0,9.5.24)[9.6.0,9.6.20)[10.0,10.15)[11.0,11.10)[12.0,12.5)[13.0,13.1)
  • H
Arbitrary Code Execution

[,7.3.4)
  • M
Denial of Service (DoS)

[6.3.2,7.2.1]
  • H
SQL Injection

[9.3.0,9.3.24)[9.4.0,9.4.19)[9.5.0,9.5.14)[9.6.0,9.6.10)[10.0,10.5)
  • M
Access Restriction Bypass

[,8.4.20)
  • M
Access Restriction Bypass

[,8.3.18)[8.4.0,8.4.11)[9.0.0,9.0.7)[9.1.0,9.1.3)
  • H
Buffer Overflow

[,9.0.19)[9.1.0,9.1.15)[9.2.0,9.2.10)[9.3.0,9.3.6)[9.4.0,9.4.1)
  • L
Denial of Service (DoS)

[,7.3.14)[7.4.0,7.4.12)[8.0.0,8.0.7)[8.1.0,8.1.3)
  • M
SQL Injection

[,8.3.18)[8.4.0,8.4.11)[9.0.0,9.0.7)[9.1.0,9.1.3)
  • H
Out-of-Bounds

[,9.1.20)
  • M
Denial of Service (DoS)

[8.0.23,8.3.8]
  • C
Out-of-Bounds

[,9.0.20)[9.1,9.1.16)[9.2,9.2.11)[9.3,9.3.7)[9.4,9.4.2)
  • M
Resource Management Errors

[,8.3.7)
  • H
Untrusted Search Path

[9.5,9.5.22)[9.6,9.6.18)[10.0,10.13)[11.0,11.8)[12.0,12.3)
  • H
Insufficiently Protected Credentials

[,9.4.24)[9.5.0,9.5.19)[9.6.0,9.6.15)[10.0,10.10)[11.0,11.5)
  • M
Information Exposure

[6.3.2,6.5.3]
  • M
Access Restriction Bypass

[,7.4.29)[8.0.0,8.0.25)[8.1.0,8.1.21)[8.2.0,8.2.17)[8.3.0,8.3.11)[8.4.0,8.4.4)
  • M
Access Restriction Bypass

[,7.4.29)[8.0.0,8.0.25)[8.1.0,8.1.21)[8.2.0,8.2.17)[8.3.0,8.3.11)[8.4.0,8.4.4)
  • H
Incorrect Authorization

[9.3.0,9.3.24)[9.4.0,9.4.19)[9.5.0,9.5.14)[9.6.0,9.6.10)[10.0,10.5)
  • M
Information Exposure

[,9.5.10)[9.6.0,9.6.6)[10.0,10.1)
  • M
Denial of Service (DoS)

[,7.2.2)
  • M
CVE-2004-0977

[7.2.1,7.4.5]
  • M
Remote Code Execution (RCE)

[7.2.1,7.4.7]
  • H
Remote Code Execution (RCE)

[,7.4.29)[8.0.0,8.0.25)[8.1.0,8.1.21)[8.2.0,8.2.17)[8.3.0,8.3.11)[8.4.0,8.4.4)
  • H
Improper Authentication

[,8.2.6-1.fc8)
  • M
Out-of-bounds Read

[11.0,11.3)
  • H
Denial of Service (DoS)

[,7.3.13)[7.4.0,7.4.16)[8.0.0,8.0.11)[8.1.0,8.1.7)[8.2.0,8.2.2)
  • M
Cryptographic Issues

[,8.3.19)[8.4.0,8.4.12)[9.0.0,9.0.8)[9.1.0,9.1.4)