postgresql15 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the postgresql15 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2025-8713

<15.14-r0
  • L
CVE-2025-8715

<15.14-r0
  • L
CVE-2025-8714

<15.14-r0
  • L
CVE-2025-4207

<15.13-r0
  • L
CVE-2025-1094

<15.11-r0
  • H
Externally Controlled Reference to a Resource in Another Sphere

<15.9-r0
  • M
CVE-2024-10976

<15.9-r0
  • L
Insufficient Verification of Data Authenticity

<15.9-r0
  • M
CVE-2024-10978

<15.9-r0
  • H
Time-of-check Time-of-use (TOCTOU)

<15.8-r0
  • H
Information Exposure

<9.6.3-r0
  • H
Information Exposure

<9.6.3-r0
  • M
CVE-2023-5870

<15.5-r0
  • H
SQL Injection

<15.4-r0
  • H
Missing Authorization

<9.6.4-r0
  • C
Improper Authentication

<9.6.4-r0
  • M
Missing Encryption of Sensitive Data

<9.6.3-r0
  • H
Integer Overflow or Wraparound

<15.5-r0
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<14.5-r0
  • H
Insufficiently Protected Credentials

<9.6.4-r0
  • H
CVE-2024-0985

<15.6-r0
  • M
CVE-2023-5868

<15.5-r0
  • H
Out-of-bounds Write

<11.4-r0
  • M
Missing Authorization

<12.2-r0
  • M
Out-of-bounds Read

<11.3-r0
  • H
CVE-2023-2454

<15.3-r0
  • L
CVE-2022-41862

<15.2-r0
  • M
CVE-2023-2455

<15.3-r0
  • H
Incomplete Cleanup

<14.3-r0
  • H
SQL Injection

<14.1-r0
  • M
Information Exposure

<13.4-r0
  • M
Insufficiently Protected Credentials

<14.1-r0
  • M
CVE-2021-32029

<13.3-r0
  • M
Information Exposure

<13.3-r0
  • H
Insufficient Comparison

<12.5-r0
  • M
Information Exposure

<10.1-r0
  • M
Information Exposure

<13.2-r0
  • H
Information Exposure

<10.1-r0
  • H
Use of a Broken or Risky Cryptographic Algorithm

<12.5-r0
  • H
SQL Injection

<12.5-r0
  • L
Out-of-bounds Read

<11.5-r0
  • M
Insufficient Granularity of Access Control

<15.4-r0
  • H
SQL Injection

<11.5-r0
  • C
SQL Injection

<11.1-r0
  • H
SQL Injection

<10.5-r0
  • M
Information Exposure

<10.2-r0
  • H
Incorrect Permission Assignment for Critical Resource

<10.2-r0
  • H
Out-of-Bounds

<13.3-r0
  • M
Incorrect Authorization

<13.2-r0
  • H
SQL Injection

<12.4-r0
  • H
Untrusted Search Path

<12.4-r0
  • H
Incorrect Authorization

<10.5-r0
  • M
Improper Access Control

<11.3-r0
  • C
Incorrect Permission Assignment for Critical Resource

<10.4-r0
  • H
Improper Input Validation

<10.3-r0