mariadb vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the mariadb package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2019-2910

*
  • L
CVE-2019-2910

*
  • M
CVE-2019-2924

*
  • M
CVE-2019-2924

*
  • M
CVE-2019-2923

*
  • M
CVE-2019-2923

*
  • M
CVE-2019-2922

*
  • M
CVE-2019-2922

*
  • M
CVE-2021-2389

*
  • M
CVE-2020-14725

*
  • M
CVE-2020-2922

*
  • M
CVE-2019-2974

*
  • M
CVE-2019-2974

*
  • M
CVE-2019-2938

*
  • M
CVE-2019-2938

*
  • M
CVE-2019-2805

*
  • M
CVE-2019-2805

*
  • M
CVE-2019-2739

*
  • M
CVE-2019-2739

*
  • M
CVE-2019-2740

*
  • M
CVE-2019-2740

*
  • M
CVE-2019-2737

*
  • M
CVE-2019-2737

*
  • M
CVE-2019-2627

*
  • M
CVE-2019-2627

*
  • M
CVE-2019-2614

*
  • M
CVE-2019-2614

*
  • M
CVE-2019-2529

*
  • M
CVE-2019-2529

*
  • M
CVE-2019-2537

*
  • M
CVE-2019-2537

*
  • M
CVE-2019-2503

*
  • M
CVE-2019-2503

*
  • M
CVE-2019-2455

*
  • M
CVE-2019-2455

*
  • M
CVE-2018-3081

*
  • L
CVE-2018-3066

*
  • M
CVE-2018-3058

*
  • M
CVE-2018-3063

*
  • L
CVE-2021-2007

*
  • H
CVE-2021-2144

*
  • M
CVE-2020-14789

*
  • M
CVE-2021-2011

*
  • M
CVE-2021-2022

*
  • M
CVE-2021-2180

*
  • M
CVE-2021-2194

*
  • M
CVE-2021-2174

*
  • M
CVE-2018-3156

*
  • M
CVE-2018-3156

*
  • M
CVE-2018-3143

*
  • M
CVE-2018-3143

*
  • M
CVE-2018-3133

*
  • M
CVE-2018-3133

*
  • M
CVE-2018-3282

*
  • M
CVE-2018-3282

*
  • M
CVE-2018-3251

*
  • M
CVE-2018-3251

*
  • M
CVE-2021-2154

*
  • M
CVE-2021-2372

*
  • M
CVE-2021-2166

*
  • M
Integer Overflow or Wraparound

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Improper Resource Shutdown or Release

*
  • M
Improper Locking

*
  • L
Improper Input Validation

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
Use After Free

*
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
Use After Free

*
  • M
Improper Use of Validation Framework

*
  • M
CVE-2021-35604

*
  • M
CVE-2022-21451

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Improper Use of Validation Framework

*
  • L
Improper Input Validation

*
  • M
SQL Injection

*
  • M
Buffer Overflow

*
  • L
Resource Exhaustion

*
  • M
Heap-based Buffer Overflow

*
  • M
Buffer Overflow

*
  • M
Use After Free

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
Use After Free

*
  • M
Reachable Assertion

*
  • M
Out-of-Bounds

*
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • M
Reachable Assertion

*
  • M
CVE-2022-27445

*
  • M
Improper Resource Shutdown or Release

*
  • M
SQL Injection

*
  • M
Improper Locking

*
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • M
Use After Free

*
  • M
CVE-2020-2814

*
  • M
CVE-2020-2814

*
  • M
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • M
CVE-2020-2780

*
  • M
CVE-2020-2780

*
  • M
CVE-2020-2752

*
  • M
CVE-2020-2812

*
  • M
CVE-2020-2812

*
  • M
CVE-2020-14765

*
  • M
CVE-2020-14776

*
  • M
CVE-2020-14812

*
  • M
Improper Locking

*
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • M
Reachable Assertion

*