postgresql15 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the postgresql15 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2025-4207

<15.13-r0
  • L
CVE-2025-1094

<15.11-r0
  • M
CVE-2024-10976

<15.9-r0
  • H
Externally Controlled Reference to a Resource in Another Sphere

<15.9-r0
  • M
CVE-2024-10978

<15.9-r0
  • L
Insufficient Verification of Data Authenticity

<15.9-r0
  • H
Time-of-check Time-of-use (TOCTOU)

<15.8-r0
  • H
CVE-2024-0985

<15.6-r0
  • H
Integer Overflow or Wraparound

<15.5-r0
  • M
CVE-2023-5870

<15.5-r0
  • M
CVE-2023-5868

<15.5-r0
  • H
SQL Injection

<15.4-r0
  • M
Insufficient Granularity of Access Control

<15.4-r0
  • M
CVE-2023-2455

<15.3-r0
  • H
CVE-2023-2454

<15.3-r0
  • L
CVE-2022-41862

<15.2-r0
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<14.5-r0
  • H
Incomplete Cleanup

<14.3-r0
  • H
SQL Injection

<14.1-r0
  • M
Insufficiently Protected Credentials

<14.1-r0
  • M
Information Exposure

<13.4-r0
  • M
CVE-2021-32029

<13.3-r0
  • M
Information Exposure

<13.3-r0
  • H
Out-of-Bounds

<13.3-r0
  • M
Incorrect Authorization

<13.2-r0
  • M
Information Exposure

<13.2-r0
  • H
Insufficient Comparison

<12.5-r0
  • H
SQL Injection

<12.5-r0
  • H
Use of a Broken or Risky Cryptographic Algorithm

<12.5-r0
  • H
Untrusted Search Path

<12.4-r0
  • H
SQL Injection

<12.4-r0
  • M
Missing Authorization

<12.2-r0
  • H
SQL Injection

<11.5-r0
  • L
Out-of-bounds Read

<11.5-r0
  • H
Out-of-bounds Write

<11.4-r0
  • M
Out-of-bounds Read

<11.3-r0
  • M
Improper Access Control

<11.3-r0
  • C
SQL Injection

<11.1-r0
  • H
Incorrect Authorization

<10.5-r0
  • H
SQL Injection

<10.5-r0
  • C
Incorrect Permission Assignment for Critical Resource

<10.4-r0
  • H
Improper Input Validation

<10.3-r0
  • M
Information Exposure

<10.2-r0
  • H
Incorrect Permission Assignment for Critical Resource

<10.2-r0
  • M
Information Exposure

<10.1-r0
  • H
Information Exposure

<10.1-r0
  • H
Missing Authorization

<9.6.4-r0
  • C
Improper Authentication

<9.6.4-r0
  • H
Insufficiently Protected Credentials

<9.6.4-r0
  • H
Information Exposure

<9.6.3-r0
  • H
Information Exposure

<9.6.3-r0
  • M
Missing Encryption of Sensitive Data

<9.6.3-r0