mariadb vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the mariadb package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Resource Shutdown or Release

*
  • H
Directory Traversal

*
  • M
CVE-2025-30693

*
  • M
CVE-2025-30722

*
  • M
Insecure Automated Optimizations

*
  • M
Insecure Automated Optimizations

*
  • M
Insecure Automated Optimizations

*
  • L
CVE-2019-2910

*
  • L
CVE-2019-2910

*
  • M
CVE-2019-2924

*
  • M
CVE-2019-2924

*
  • M
CVE-2019-2923

*
  • M
CVE-2019-2923

*
  • M
CVE-2019-2922

*
  • M
CVE-2019-2922

*
  • M
CVE-2021-2389

*
  • M
CVE-2020-14725

*
  • M
CVE-2020-2922

*
  • M
CVE-2019-2974

*
  • M
CVE-2019-2974

*
  • M
CVE-2019-2938

*
  • M
CVE-2019-2938

*
  • M
CVE-2019-2805

*
  • M
CVE-2019-2805

*
  • M
CVE-2019-2739

*
  • M
CVE-2019-2739

*
  • M
CVE-2019-2740

*
  • M
CVE-2019-2740

*
  • M
CVE-2019-2737

*
  • M
CVE-2019-2737

*
  • M
CVE-2019-2627

*
  • M
CVE-2019-2627

*
  • M
CVE-2019-2614

*
  • M
CVE-2019-2614

*
  • M
CVE-2019-2529

*
  • M
CVE-2019-2529

*
  • M
CVE-2019-2537

*
  • M
CVE-2019-2537

*
  • M
CVE-2019-2503

*
  • M
CVE-2019-2503

*
  • M
CVE-2019-2455

*
  • M
CVE-2019-2455

*
  • M
CVE-2018-3081

*
  • L
CVE-2018-3066

*
  • M
CVE-2018-3058

*
  • M
CVE-2018-3063

*
  • L
CVE-2021-2007

*
  • H
CVE-2021-2144

*
  • M
CVE-2020-14789

*
  • M
CVE-2021-2011

*
  • M
CVE-2021-2022

*
  • M
CVE-2021-2180

*
  • M
CVE-2021-2194

*
  • M
CVE-2021-2174

*
  • M
CVE-2018-3156

*
  • M
CVE-2018-3156

*
  • M
CVE-2018-3143

*
  • M
CVE-2018-3143

*
  • M
CVE-2018-3133

*
  • M
CVE-2018-3133

*
  • M
CVE-2018-3282

*
  • M
CVE-2018-3282

*
  • M
CVE-2018-3251

*
  • M
CVE-2018-3251

*
  • M
CVE-2021-2154

*
  • M
CVE-2021-2372

*
  • M
CVE-2021-2166

*
  • M
Integer Overflow or Wraparound

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Improper Resource Shutdown or Release

*
  • M
Improper Locking

*
  • L
Improper Input Validation

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
Use After Free

*
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
Use After Free

*
  • M
Improper Use of Validation Framework

*
  • M
CVE-2021-35604

*
  • M
CVE-2022-21451

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Improper Use of Validation Framework

*
  • L
Improper Input Validation

*
  • M
SQL Injection

*
  • M
Buffer Overflow

*
  • L
Resource Exhaustion

*
  • M
Heap-based Buffer Overflow

*
  • M
Buffer Overflow

*
  • M
Use After Free

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
Use After Free

*
  • M
Reachable Assertion

*
  • M
Out-of-Bounds

*
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
Reachable Assertion

*
  • M
CVE-2022-27445

*
  • M
Improper Resource Shutdown or Release

*
  • M
SQL Injection

*
  • M
Improper Locking

*
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • M
Use After Free

*
  • M
CVE-2020-2814

*
  • M
CVE-2020-2814

*
  • M
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • M
CVE-2020-2780

*
  • M
CVE-2020-2780

*
  • M
CVE-2020-2752

*
  • M
CVE-2020-2812

*
  • M
CVE-2020-2812

*
  • M
CVE-2020-14765

*
  • M
CVE-2020-14776

*
  • M
CVE-2020-14812

*
  • M
Improper Locking

*
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • M
Reachable Assertion

*