sqlite3 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the sqlite3 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2025-52099

<3.46.1-4
  • L
CVE-2025-7709

<3.46.1-8
  • C
CVE-2025-7458

<3.42.0-1
  • C
CVE-2025-6965

<3.46.1-7
  • C
Integer Overflow or Wraparound

<3.46.1-3
  • L
Integer Overflow or Wraparound

<3.46.1-4
  • H
Integer Overflow or Wraparound

<3.46.1-3
  • M
Use After Free

<3.43.2-1
  • H
Out-of-Bounds

<3.43.1-1
  • H
Out-of-bounds Read

<3.36.0-2
  • M
Buffer Overflow

<3.27.2-1
  • H
CVE-2022-46908

<3.40.0-2
  • C
Out-of-Bounds

<3.32.0-1
  • H
NULL Pointer Dereference

<3.32.0-1
  • L
Improper Validation of Array Index

<3.39.2-1
  • L
Memory Leak

*
  • L
Out-of-bounds Read

<3.36.0-2
  • M
Use After Free

<3.34.1-1
  • M
Out-of-bounds Write

<3.32.3-1
  • H
Use After Free

<3.32.2-2
  • H
Use After Free

<3.32.0-1
  • M
NULL Pointer Dereference

<3.32.0-1
  • M
CVE-2020-13631

<3.32.0-1
  • M
NULL Pointer Dereference

<3.32.1-1
  • M
Integer Overflow or Wraparound

<3.32.1-1
  • L
Use After Free

<3.32.0-1
  • H
Improper Initialization

<3.31.1-5
  • H
NULL Pointer Dereference

<3.31.1-3
  • H
CVE-2019-19959

<3.30.1+fossil191229-1
  • H
Improper Handling of Exceptional Conditions

<3.30.1+fossil191229-1
  • H
NULL Pointer Dereference

<3.30.1+fossil191229-1
  • H
Unrestricted Upload of File with Dangerous Type

<3.30.1+fossil191229-1
  • M
Improper Handling of Exceptional Conditions

<3.30.1+fossil191229-1
  • H
NULL Pointer Dereference

<3.30.1+fossil191229-1
  • H
CVE-2019-19603

<3.30.1+fossil191229-1
  • M
Uncontrolled Recursion

<3.30.1+fossil191229-1
  • L
CVE-2019-19244

<3.30.1+fossil191229-1
  • M
NULL Pointer Dereference

<3.30.1+fossil191229-1
  • M
Divide By Zero

<3.29.0-2
  • C
Out-of-bounds Read

<3.27.2-3
  • H
Use After Free

<3.27.2-3
  • H
Out-of-bounds Write

<3.27.2-3
  • H
Integer Overflow or Wraparound

<3.25.3-1
  • H
SQL Injection

<3.25.3-1
  • L
Out-of-bounds Read

<3.27.2-2
  • L
NULL Pointer Dereference

<3.27.2-2
  • H
Integer Overflow or Wraparound

<3.25.3-1
  • H
NULL Pointer Dereference

<3.22.0-2
  • L
NULL Pointer Dereference

<3.20.1-2
  • L
Improper Input Validation

<3.20.1-1
  • C
Out-of-bounds Read

<3.19.3-3
  • C
Use After Free

<3.15.2-1
  • C
Use After Free

<3.15.2-1
  • C
CVE-2017-2519

<3.16.0-1
  • C
Out-of-bounds Write

<3.16.2-1
  • M
Improper Input Validation

<3.13.0-1
  • M
Out-of-Bounds

<3.8.3-1
  • H
Improper Input Validation

<3.8.9-1
  • H
Out-of-Bounds

<3.8.9-1
  • H
Improper Input Validation

<3.8.9-1