trino vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the trino package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-xxh7-fcf3-rj7f

<479-r7
  • L
Resource Exhaustion

<479-r7
  • L
CVE-2026-25679

<479-r6
  • L
CVE-2026-27139

<479-r6
  • L
GHSA-j4j7-vw47-rhfq

<479-r6
  • L
GHSA-j3gx-2473-5fp8

<479-r6
  • L
CVE-2026-27142

<479-r6
  • L
GHSA-rv83-g57w-fr8j

<479-r6
  • L
GHSA-72hv-8253-57qq

<479-r5
  • L
GHSA-84h7-rjj3-6jx4

<479-r1
  • L
GHSA-qqpg-mvqg-649v

<479-r3
  • L
Improper Handling of Insufficient Permissions or Privileges

<476-r9
  • L
GHSA-jq43-27x9-3v86

<477-r2
  • L
GHSA-7286-pgfv-vxvh

<478-r2
  • C
CVE-2025-68121

<479-r3
  • L
CVE-2026-1225

<479-r3
  • L
GHSA-r7pg-v2c8-mfg3

<472-r0
  • L
GHSA-j7vj-rw65-4v26

<469-r2
  • L
Race Condition

<476-r4
  • L
CVE-2025-61732

<479-r3
  • L
GHSA-pq2g-wx69-c263

<471-r0
  • L
CVE-2024-12798

<468-r1
  • L
CVE-2024-34158

<469-r2
  • L
GHSA-735f-pc8j-v9w8

<464-r0
  • L
GHSA-33g6-495w-v8j2

<472-r0
  • L
GHSA-wxr5-93ph-8wr9

<475-r6
  • L
GHSA-fj2m-w3wv-x9pr

<453-r2
  • L
GHSA-qphf-w3cq-jpmx

<472-r0
  • L
GHSA-53wx-pr6q-m3j5

<475-r6
  • L
GHSA-4g8c-wm8x-jfhw

<470-r3
  • L
GHSA-3f6r-qh9c-x6mm

<469-r2
  • H
Incorrect Conversion between Numeric Types

<469-r0
  • L
CVE-2024-45336

<469-r2
  • C
XML External Entity (XXE) Injection

<453-r2
  • L
GHSA-w7f5-jrpr-5c2m

<453-r2
  • L
CVE-2025-48734

<475-r6
  • H
Improper Initialization

<453-r2
  • L
CVE-2024-43382

<472-r0
  • L
CVE-2025-24970

<470-r3
  • L
CRLF Injection

<479-r1
  • L
GHSA-25qh-j22f-pwp8

<477-r4
  • H
External Control of File Name or Path

<475-r6
  • L
CVE-2025-22871

<474-r2
  • L
GHSA-m494-w24q-6f7w

<478-r2
  • L
GHSA-2hmj-97jw-28jh

<476-r9
  • L
GHSA-prj3-ccx8-p6x4

<476-r5
  • H
Resource Exhaustion

<476-r6
  • L
CRLF Injection

<477-r2
  • L
Information Exposure Through Log Files

<472-r0
  • L
GHSA-h355-32pf-p2xm

<479-r3
  • H
Improper Input Validation

<478-r2
  • L
GHSA-j5pm-7495-qmr3

<476-r4
  • L
GHSA-pr98-23f8-jwxv

<468-r1
  • L
GHSA-x3wm-hffr-chwm

<472-r0
  • L
CVE-2024-34156

<469-r2
  • L
CVE-2024-12801

<468-r1
  • L
GHSA-fghv-69vj-qj49

<476-r8
  • L
CVE-2024-45341

<469-r2
  • L
GHSA-crqm-pwhx-j97f

<469-r2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<472-r0
  • L
CVE-2024-34155

<469-r2
  • L
GHSA-3p8m-j85q-pgmj

<476-r7
  • L
GHSA-8355-xj3p-hv6q

<472-r0
  • H
Out-of-bounds Read

<479-r4
  • L
GHSA-mm8h-8587-p46h

<478-r2
  • L
CVE-2025-11226

<477-r4
  • L
GHSA-g9pc-8g42-g6vq

<474-r2
  • L
Deserialization of Untrusted Data

<472-r0
  • L
Untrusted Search Path

<472-r0
  • L
Incorrect Default Permissions

<472-r0
  • H
HTTP Request Smuggling

<476-r8
  • L
GHSA-8jvr-vh7g-f8gx

<479-r3
  • L
GHSA-f686-hw9c-xw9c

<472-r0
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

<476-r7
  • L
GHSA-7wrw-r4p8-38rx

<469-r2
  • L
GHSA-8xfx-rj4p-23jm

<469-r2
  • C
Deserialization of Untrusted Data

<472-r0
  • L
GHSA-6v67-2wr5-gvf4

<468-r1
  • L
GHSA-w33c-445m-f8w7

<469-r0
  • L
GHSA-vx9q-rhv9-3jvg

<479-r4
  • L
GHSA-q298-375f-5q63

<472-r0
  • H
Allocation of Resources Without Limits or Throttling

<476-r5
  • C
Authorization Bypass Through User-Controlled Key

<478-r2
  • H
Resource Exhaustion

<478-r2
  • H
Out-of-bounds Write

<464-r0
  • L
GHSA-7hpq-3g6w-pvhf

<472-r0
  • L
GHSA-mmxm-8w33-wc4h

<476-r6
  • L
GHSA-xpw8-rcwv-8f8p

<464-r0
  • L
CVE-2024-57699

<471-r0
  • L
CVE-2024-32888

<472-r0
  • H
Missing Encryption of Sensitive Data

<453-r1
  • L
GHSA-5v8f-xx9m-wj44

<453-r1
  • L
GHSA-m5vv-6r4h-3vj9

<452-r0
  • M
Race Condition

<452-r0
  • C
Deserialization of Untrusted Data

<449-r0
  • L
GHSA-jhcr-hph9-g7wm

<449-r0
  • L
CVE-2024-36114

<449-r0
  • L
GHSA-973x-65j7-xcf4

<449-r0
  • L
GHSA-3832-9276-x7gf

<445-r0
  • M
Improper Certificate Validation

<445-r0
  • L
GHSA-9w38-p64v-xpmv

<444-r1
  • L
Out-of-bounds Write

<444-r1
  • L
GHSA-xjp4-hw94-mvp5

<444-r1
  • L
Out-of-bounds Write

<444-r1
  • H
CVE-2024-23450

<444-r0
  • L
GHSA-cgwf-w82q-5jrr

<444-r0
  • L
GHSA-w5gg-2q56-6h4f

<444-r0
  • M
CVE-2023-42503

<444-r0
  • L
GHSA-r978-9m6m-6gm6

<443-r0
  • L
Missing Authorization

<443-r0
  • L
GHSA-rj7p-rfgp-852x

<440-r0
  • L
GHSA-g2fg-mr77-6vrm

<440-r0
  • H
Resource Exhaustion

<440-r0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<440-r0
  • M
File and Directory Information Exposure

<440-r0
  • L
GHSA-vx85-mj8c-4qm6

<440-r0
  • M
CVE-2020-13956

<440-r0
  • L
GHSA-7r82-7xv7-xcpj

<440-r0
  • L
GHSA-24rp-q3w6-vc56

<439-r2
  • C
SQL Injection

<439-r2
  • L
GHSA-4g9r-vxhx-9pgx

<439-r2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<439-r2
  • L
GHSA-4265-ccf5-phj5

<439-r2
  • M
Allocation of Resources Without Limits or Throttling

<439-r2
  • L
GHSA-xfg6-62px-cxc2

<439-r2
  • L
GHSA-6phf-73q6-gh87

<439-r0
  • H
Deserialization of Untrusted Data

<439-r0
  • H
CVE-2022-3509

<439-r0
  • L
GHSA-4jrv-ppp4-jm57

<439-r0
  • L
GHSA-5mg8-w23w-74h3

<439-r0
  • L
Incorrect Permission Assignment for Critical Resource

<439-r0
  • M
CVE-2021-22569

<439-r0
  • L
GHSA-4gg5-vx3j-xwc7

<439-r0
  • H
CVE-2022-3171

<439-r0
  • L
GHSA-7g45-4rm6-3mm3

<439-r0
  • H
CVE-2022-3510

<439-r0
  • H
Files or Directories Accessible to External Parties

<439-r0
  • L
GHSA-h4h5-3hr4-j3g2

<439-r0
  • L
GHSA-g5ww-5jh7-63cx

<439-r0
  • H
Deserialization of Untrusted Data

<439-r0
  • L
GHSA-wrvw-hg22-4m67

<439-r0
  • L
GHSA-pfh2-hfmq-phg5

<437-r0
  • M
CVE-2023-51074

<437-r0
  • L
GHSA-xjhv-p3fv-x24r

<433-r1
  • L
GHSA-vmq6-5m68-f53m

<434-r0
  • H
Deserialization of Untrusted Data

<434-r0
  • H
Directory Traversal

<433-r1