sqlite3 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the sqlite3 package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Out-of-Bounds

<3.27.2-3+deb10u2
  • H
NULL Pointer Dereference

<3.27.2-3+deb10u2
  • L
Improper Validation of Array Index

*
  • L
Memory Leak

*
  • L
CVE-2021-36690

*
  • M
Out-of-bounds Write

<3.27.2-3+deb10u1
  • H
Use After Free

<3.27.2-3+deb10u1
  • M
NULL Pointer Dereference

<3.27.2-3+deb10u1
  • L
CVE-2020-13631

*
  • M
NULL Pointer Dereference

<3.27.2-3+deb10u1
  • M
Integer Overflow or Wraparound

<3.27.2-3+deb10u1
  • L
Use After Free

*
  • H
CVE-2019-19959

<3.27.2-3+deb10u1
  • H
Improper Handling of Exceptional Conditions

<3.27.2-3+deb10u1
  • H
NULL Pointer Dereference

<3.27.2-3+deb10u1
  • H
Unrestricted Upload of File with Dangerous Type

<3.27.2-3+deb10u1
  • L
Improper Handling of Exceptional Conditions

*
  • L
CVE-2019-19603

*
  • L
Uncontrolled Recursion

*
  • L
CVE-2019-19244

*
  • M
Divide By Zero

<3.27.2-3+deb10u1
  • C
Out-of-bounds Read

<3.27.2-3
  • H
Use After Free

<3.27.2-3
  • H
Out-of-bounds Write

<3.27.2-3
  • H
Integer Overflow or Wraparound

<3.25.3-1
  • H
SQL Injection

<3.25.3-1
  • L
Out-of-bounds Read

<3.27.2-2
  • L
NULL Pointer Dereference

<3.27.2-2
  • H
Integer Overflow or Wraparound

<3.25.3-1
  • H
NULL Pointer Dereference

<3.22.0-2
  • L
NULL Pointer Dereference

<3.20.1-2
  • L
Improper Input Validation

<3.20.1-1
  • C
Out-of-bounds Read

<3.19.3-3
  • C
Use After Free

<3.15.2-1
  • C
CVE-2017-2519

<3.16.0-1
  • C
Out-of-bounds Write

<3.16.2-1
  • C
Use After Free

<3.15.2-1
  • M
Improper Input Validation

<3.13.0-1
  • M
Out-of-Bounds

<3.8.3-1
  • H
Integer Overflow or Wraparound

<3.8.9-1
  • H
Improper Resource Shutdown or Release

<3.8.9-1
  • H
Use of Uninitialized Resource

<3.8.9-1