mariadb vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the mariadb package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2025-21490

<11.4.5-r0
  • H
Reachable Assertion

<10.6.8-r0
  • H
CVE-2022-32089

<10.6.9-r0
  • H
Use After Free

<10.6.9-r0
  • H
SQL Injection

<10.6.8-r0
  • M
CVE-2021-46662

<10.6.7-r0
  • H
Use After Free

<10.6.9-r0
  • H
CVE-2022-27449

<10.6.8-r0
  • H
Out-of-bounds Write

<10.6.9-r0
  • H
CVE-2022-27446

<10.6.8-r0
  • H
CVE-2022-32084

<10.6.9-r0
  • H
CVE-2022-27444

<10.6.8-r0
  • H
Use After Free

<10.6.8-r0
  • M
CVE-2021-46663

<10.6.7-r0
  • H
Use After Free

<10.6.8-r0
  • H
SQL Injection

<10.6.8-r0
  • H
CVE-2022-27445

<10.6.8-r0
  • H
Use After Free

<10.6.8-r0
  • H
Reachable Assertion

<10.6.8-r0
  • H
Use After Free

<10.6.8-r0
  • H
SQL Injection

<10.6.8-r0
  • H
SQL Injection

<10.6.8-r0
  • H
Buffer Overflow

<10.6.8-r0
  • H
CVE-2022-27452

<10.6.8-r0
  • H
Reachable Assertion

<10.6.9-r0
  • H
Use After Free

<10.6.8-r0
  • H
Use After Free

<10.6.8-r0
  • H
Use After Free

<10.6.7-r0
  • H
Use After Free

<10.6.8-r0
  • H
SQL Injection

<10.6.8-r0
  • H
Use After Free

<10.6.8-r0
  • H
SQL Injection

<10.6.8-r0
  • M
Resource Exhaustion

<10.6.7-r0
  • M
CVE-2021-46659

<10.6.7-r0
  • M
CVE-2021-46665

<10.6.7-r0
  • M
NULL Pointer Dereference

<10.6.7-r0
  • M
Improper Locking

<10.6.7-r0
  • H
Use of Externally-Controlled Format String

<10.6.7-r0
  • M
Improper Locking

<10.6.7-r0
  • H
CVE-2022-27451

<10.6.8-r0
  • M
CVE-2020-14765

<10.5.8-r0
  • M
CVE-2020-14789

<10.5.8-r0
  • M
CVE-2019-2627

<10.3.15-r0
  • M
CVE-2021-2372

<10.6.4-r0
  • H
SQL Injection

<10.6.7-r0
  • M
CVE-2021-2389

<10.6.4-r0
  • M
CVE-2020-14776

<10.5.8-r0
  • H
OS Command Injection

<10.5.9-r0
  • M
CVE-2020-14812

<10.5.8-r0
  • M
CVE-2018-3277

<10.3.11-r0
  • M
CVE-2018-3185

<10.3.11-r0
  • M
CVE-2021-46661

<10.6.7-r0
  • M
CVE-2018-3143

<10.3.11-r0
  • M
CVE-2018-3200

<10.3.11-r0
  • C
Improper Input Validation

<10.5.6-r0
  • M
CVE-2019-2805

<10.4.7-r0
  • M
CVE-2021-2166

<10.5.11-r0
  • M
CVE-2019-2739

<10.4.7-r0
  • M
Integer Overflow or Wraparound

<10.6.7-r0
  • M
CVE-2019-2740

<10.4.7-r0
  • H
Stack-based Buffer Overflow

<10.6.7-r0
  • M
CVE-2019-2758

<10.4.7-r0
  • M
Improper Locking

<10.6.7-r0
  • M
CVE-2020-2760

<10.4.13-r0
  • M
CVE-2019-2974

<10.4.10-r0
  • M
Improper Locking

<10.6.7-r0
  • M
CVE-2019-2737

<10.4.7-r0
  • M
CVE-2021-2154

<10.5.11-r0
  • M
CVE-2020-2812

<10.4.13-r0
  • H
Heap-based Buffer Overflow

<10.6.7-r0
  • M
CVE-2020-2752

<10.4.13-r0
  • M
CVE-2018-2761

<10.2.15-r0
  • M
CVE-2019-2938

<10.4.10-r0
  • M
CVE-2019-2614

<10.3.15-r0
  • M
CVE-2019-2628

<10.3.15-r0
  • M
CVE-2018-3162

<10.3.11-r0
  • C
Numeric Errors

<10.3.11-r0
  • M
CVE-2018-3173

<10.3.11-r0
  • M
CVE-2018-2777

<10.2.15-r0
  • M
CVE-2019-2510

<10.3.13-r0
  • M
CVE-2018-3174

<10.3.11-r0
  • M
CVE-2018-3282

<10.3.11-r0
  • M
CVE-2018-2766

<10.2.15-r0
  • M
CVE-2018-2771

<10.2.15-r0
  • M
CVE-2018-2781

<10.2.15-r0
  • M
CVE-2020-2814

<10.4.13-r0
  • M
CVE-2018-2813

<10.2.15-r0
  • M
CVE-2020-2574

<10.4.12-r0
  • M
CVE-2018-2759

<10.2.15-r0
  • M
CVE-2019-2537

<10.3.13-r0
  • M
CVE-2018-2784

<10.2.15-r0
  • H
CVE-2018-2755

<10.2.15-r0
  • M
CVE-2018-3284

<10.3.11-r0
  • M
CVE-2018-2786

<10.2.15-r0
  • M
CVE-2018-2819

<10.2.15-r0
  • M
CVE-2018-2817

<10.2.15-r0
  • M
CVE-2023-22084

<10.11.6-r0
  • H
Use After Free

<10.1.22-r0
  • M
Information Exposure

<10.1.22-r0
  • M
CVE-2024-21096

<10.11.8-r0
  • M
CVE-2018-2782

<10.2.15-r0
  • M
Improper Privilege Management

<10.1.21-r0
  • M
CVE-2017-3238

<10.1.21-r0
  • M
CVE-2018-3251

<10.3.11-r0
  • M
CVE-2017-3312

<10.1.21-r0
  • M
CVE-2018-3156

<10.3.11-r0
  • M
CVE-2017-3318

<10.1.21-r0
  • M
CVE-2017-3291

<10.1.21-r0
  • M
CVE-2017-3244

<10.1.21-r0
  • M
CVE-2017-3265

<10.1.21-r0
  • H
Link Following

<10.1.21-r0
  • M
CVE-2017-3243

<10.1.21-r0
  • M
CVE-2018-2810

<10.2.15-r0
  • M
CVE-2018-2787

<10.2.15-r0
  • M
CVE-2017-3317

<10.1.21-r0
  • M
Improper Input Validation

<10.1.21-r0