sqlite3 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the sqlite3 package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
Out-of-Bounds

*
  • L
Out-of-bounds Read

*
  • M
Buffer Overflow

<3.27.2-1
  • C
Out-of-Bounds

<3.32.0-1
  • H
NULL Pointer Dereference

<3.32.0-1
  • L
Improper Validation of Array Index

*
  • L
Memory Leak

*
  • L
Out-of-bounds Read

*
  • M
Use After Free

<3.34.1-1
  • M
Out-of-bounds Write

<3.32.3-1
  • H
Use After Free

<3.32.2-2
  • H
Use After Free

<3.32.0-1
  • M
NULL Pointer Dereference

<3.32.0-1
  • M
CVE-2020-13631

<3.32.0-1
  • M
NULL Pointer Dereference

<3.32.1-1
  • M
Integer Overflow or Wraparound

<3.32.1-1
  • L
Use After Free

<3.32.0-1
  • H
Improper Initialization

<3.31.1-5
  • H
NULL Pointer Dereference

<3.31.1-3
  • H
CVE-2019-19959

<3.30.1+fossil191229-1
  • H
Improper Handling of Exceptional Conditions

<3.30.1+fossil191229-1
  • H
NULL Pointer Dereference

<3.30.1+fossil191229-1
  • H
Unrestricted Upload of File with Dangerous Type

<3.30.1+fossil191229-1
  • M
Improper Handling of Exceptional Conditions

<3.30.1+fossil191229-1
  • H
NULL Pointer Dereference

<3.30.1+fossil191229-1
  • H
CVE-2019-19603

<3.30.1+fossil191229-1
  • M
Uncontrolled Recursion

<3.30.1+fossil191229-1
  • L
CVE-2019-19244

<3.30.1+fossil191229-1
  • M
NULL Pointer Dereference

<3.30.1+fossil191229-1
  • M
Divide By Zero

<3.29.0-2
  • C
Out-of-bounds Read

<3.27.2-3
  • H
Use After Free

<3.27.2-3
  • H
Out-of-bounds Write

<3.27.2-3
  • H
Integer Overflow or Wraparound

<3.25.3-1
  • H
SQL Injection

<3.25.3-1
  • L
Out-of-bounds Read

<3.27.2-2
  • L
NULL Pointer Dereference

<3.27.2-2
  • H
Integer Overflow or Wraparound

<3.25.3-1
  • H
NULL Pointer Dereference

<3.22.0-2
  • L
NULL Pointer Dereference

<3.20.1-2
  • L
Improper Input Validation

<3.20.1-1
  • C
Out-of-bounds Read

<3.19.3-3
  • C
Out-of-bounds Write

<3.16.2-1
  • C
Use After Free

<3.15.2-1
  • C
CVE-2017-2519

<3.16.0-1
  • C
Use After Free

<3.15.2-1
  • M
Improper Input Validation

<3.13.0-1
  • M
Out-of-Bounds

<3.8.3-1
  • H
Improper Input Validation

<3.8.9-1
  • H
Improper Input Validation

<3.8.9-1
  • H
Out-of-Bounds

<3.8.9-1