mariadb vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the mariadb package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2023-22084

<10.6.16-r0
  • M
NULL Pointer Dereference

<10.6.13-r0
  • H
Use After Free

<10.6.9-r0
  • H
Reachable Assertion

<10.6.9-r0
  • H
CVE-2022-32089

<10.6.9-r0
  • H
Use After Free

<10.6.9-r0
  • H
CVE-2022-32084

<10.6.9-r0
  • M
Improper Locking

<10.6.7-r0
  • M
Improper Locking

<10.6.7-r0
  • H
SQL Injection

<10.6.7-r0
  • M
Improper Locking

<10.6.7-r0
  • M
Improper Locking

<10.6.7-r0
  • H
SQL Injection

<10.6.8-r0
  • H
CVE-2022-27444

<10.6.8-r0
  • H
Buffer Overflow

<10.6.8-r0
  • H
Use After Free

<10.6.8-r0
  • H
Reachable Assertion

<10.6.8-r0
  • H
Use After Free

<10.6.8-r0
  • H
CVE-2022-27452

<10.6.8-r0
  • H
SQL Injection

<10.6.8-r0
  • H
Use After Free

<10.6.8-r0
  • H
Use After Free

<10.6.8-r0
  • H
SQL Injection

<10.6.8-r0
  • H
CVE-2022-27451

<10.6.8-r0
  • H
Use After Free

<10.6.8-r0
  • H
SQL Injection

<10.6.8-r0
  • H
SQL Injection

<10.6.8-r0
  • H
CVE-2022-27446

<10.6.8-r0
  • H
Use After Free

<10.6.8-r0
  • H
CVE-2022-27449

<10.6.8-r0
  • H
Use After Free

<10.6.8-r0
  • H
CVE-2022-27445

<10.6.8-r0
  • H
Use After Free

<10.6.8-r0
  • H
SQL Injection

<10.6.8-r0
  • H
Reachable Assertion

<10.6.8-r0
  • H
Out-of-bounds Write

<10.6.9-r0
  • M
Integer Overflow or Wraparound

<10.6.7-r0
  • M
CVE-2021-46661

<10.6.7-r0
  • M
CVE-2021-46659

<10.6.7-r0
  • M
CVE-2021-46662

<10.6.7-r0
  • H
Stack-based Buffer Overflow

<10.6.7-r0
  • H
Heap-based Buffer Overflow

<10.6.7-r0
  • H
Use of Externally-Controlled Format String

<10.6.7-r0
  • M
CVE-2021-46665

<10.6.7-r0
  • M
CVE-2021-46663

<10.6.7-r0
  • H
Use After Free

<10.6.7-r0
  • M
NULL Pointer Dereference

<10.6.7-r0
  • M
Resource Exhaustion

<10.6.7-r0
  • M
CVE-2021-2372

<10.6.4-r0
  • M
CVE-2021-2389

<10.6.4-r0
  • M
CVE-2021-2166

<10.5.11-r0
  • M
CVE-2021-2154

<10.5.11-r0
  • H
OS Command Injection

<10.5.9-r0
  • M
CVE-2020-14789

<10.5.8-r0
  • M
CVE-2020-14812

<10.5.8-r0
  • M
CVE-2020-14776

<10.5.8-r0
  • M
CVE-2020-14765

<10.5.8-r0
  • C
Improper Input Validation

<10.5.6-r0
  • M
CVE-2020-2752

<10.4.13-r0
  • M
CVE-2020-2760

<10.4.13-r0
  • M
CVE-2020-2812

<10.4.13-r0
  • M
CVE-2020-2814

<10.4.13-r0
  • M
CVE-2020-2574

<10.4.12-r0
  • M
CVE-2019-2974

<10.4.10-r0
  • M
CVE-2019-2938

<10.4.10-r0
  • M
CVE-2019-2737

<10.4.7-r0
  • M
CVE-2019-2758

<10.4.7-r0
  • M
CVE-2019-2740

<10.4.7-r0
  • M
CVE-2019-2739

<10.4.7-r0
  • M
CVE-2019-2805

<10.4.7-r0
  • M
CVE-2019-2627

<10.3.15-r0
  • M
CVE-2019-2628

<10.3.15-r0
  • M
CVE-2019-2614

<10.3.15-r0
  • M
CVE-2019-2510

<10.3.13-r0
  • M
CVE-2019-2537

<10.3.13-r0
  • M
CVE-2018-3162

<10.3.11-r0
  • M
CVE-2018-3173

<10.3.11-r0
  • M
CVE-2018-3200

<10.3.11-r0
  • M
CVE-2018-3284

<10.3.11-r0
  • M
CVE-2018-3251

<10.3.11-r0
  • M
CVE-2018-3185

<10.3.11-r0
  • M
CVE-2018-3282

<10.3.11-r0
  • M
CVE-2018-3143

<10.3.11-r0
  • M
CVE-2018-3174

<10.3.11-r0
  • M
CVE-2018-3277

<10.3.11-r0
  • M
CVE-2018-3156

<10.3.11-r0
  • H
CVE-2018-2755

<10.2.15-r0
  • M
CVE-2018-2782

<10.2.15-r0
  • M
CVE-2018-2771

<10.2.15-r0
  • M
CVE-2018-2787

<10.2.15-r0
  • M
CVE-2018-2759

<10.2.15-r0
  • M
CVE-2018-2781

<10.2.15-r0
  • M
CVE-2018-2784

<10.2.15-r0
  • M
CVE-2018-2819

<10.2.15-r0
  • M
CVE-2018-2761

<10.2.15-r0
  • M
CVE-2018-2817

<10.2.15-r0
  • M
CVE-2018-2777

<10.2.15-r0
  • M
CVE-2018-2813

<10.2.15-r0
  • M
CVE-2018-2786

<10.2.15-r0
  • M
CVE-2018-2810

<10.2.15-r0
  • M
CVE-2018-2766

<10.2.15-r0
  • C
Numeric Errors

<10.3.11-r0
  • H
Use After Free

<10.1.22-r0
  • M
CVE-2017-3243

<10.1.21-r0
  • M
CVE-2017-3318

<10.1.21-r0
  • M
CVE-2017-3317

<10.1.21-r0
  • M
CVE-2017-3312

<10.1.21-r0
  • M
CVE-2017-3244

<10.1.21-r0
  • M
CVE-2017-3238

<10.1.21-r0
  • M
CVE-2017-3265

<10.1.21-r0
  • M
Improper Input Validation

<10.1.21-r0
  • M
CVE-2017-3291

<10.1.21-r0
  • M
Information Exposure

<10.1.22-r0
  • M
Improper Privilege Management

<10.1.21-r0
  • H
Link Following

<10.1.21-r0