Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1036353?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1036353?format=api", "purl": "pkg:deb/debian/sqlite3@3.8.7.1-1", "type": "deb", "namespace": "debian", "name": "sqlite3", "version": "3.8.7.1-1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "3.46.1-7+deb13u1", "latest_non_vulnerable_version": "3.46.1-7+deb13u1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59800?format=api", "vulnerability_id": "VCID-1t89-sr37-s3f6", "summary": "Multiple vulnerabilities have been found in SQLite, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5827.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5827.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5827", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04961", "scoring_system": "epss", "scoring_elements": "0.89676", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04961", "scoring_system": "epss", "scoring_elements": "0.89672", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04961", "scoring_system": "epss", "scoring_elements": "0.89666", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04961", "scoring_system": "epss", "scoring_elements": "0.8968", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04961", "scoring_system": "epss", "scoring_elements": "0.89681", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05052", "scoring_system": "epss", "scoring_elements": "0.89775", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05052", "scoring_system": "epss", "scoring_elements": "0.89782", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05052", "scoring_system": "epss", "scoring_elements": "0.89732", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05052", "scoring_system": "epss", "scoring_elements": "0.89735", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05052", "scoring_system": "epss", "scoring_elements": "0.8975", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05052", "scoring_system": "epss", "scoring_elements": "0.89752", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05052", "scoring_system": "epss", "scoring_elements": "0.89769", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13698" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5805", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5805" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5806" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5809" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5811", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5811" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5818", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5818" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5819", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5819" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5820", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5820" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5821", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5821" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5826", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5826" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5828", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5828" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5829", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5829" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5830", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5830" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5831" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5832", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5832" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5833", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5833" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5834", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5834" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5836" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5837", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5837" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5838", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5838" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5839", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5839" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5840", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5840" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5847", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5847" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5848", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5848" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5849", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5849" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5850" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5852" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5853" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5854" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6503", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6503" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6504", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6504" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1706805", "reference_id": "1706805", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1706805" }, { "reference_url": "https://security.gentoo.org/glsa/202003-16", "reference_id": "GLSA-202003-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1243", "reference_id": "RHSA-2019:1243", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1243" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4396", "reference_id": "RHSA-2021:4396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4396" }, { "reference_url": "https://usn.ubuntu.com/4205-1/", "reference_id": "USN-4205-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4205-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049482?format=api", "purl": "pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1" } ], "aliases": [ "CVE-2019-5827" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1t89-sr37-s3f6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31392?format=api", "vulnerability_id": "VCID-1ufy-3uwy-afgx", "summary": "Multiple vulnerabilities have been found in SQLite, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13630.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13630.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13630", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22675", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2285", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22895", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22687", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22763", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22814", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22836", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24785", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24815", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24808", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31248", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31205", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13630" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1841562", "reference_id": "1841562", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1841562" }, { "reference_url": "https://security.gentoo.org/glsa/202007-26", "reference_id": "GLSA-202007-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4442", "reference_id": "RHSA-2020:4442", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4442" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1968", "reference_id": "RHSA-2021:1968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16504", "reference_id": "RHSA-2025:16504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16504" }, { "reference_url": "https://usn.ubuntu.com/4394-1/", "reference_id": "USN-4394-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4394-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2020-13630" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1ufy-3uwy-afgx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45190?format=api", "vulnerability_id": "VCID-2w6e-cvgg-pqax", "summary": "Multiple vulnerabilities have been found in SQLite, allowing\n context-dependent attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3415.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3415.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3415", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90375", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90321", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90324", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90336", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.9034", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90354", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.9036", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90369", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90368", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90362", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90377", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90376", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3415" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212356", "reference_id": "1212356", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212356" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968", "reference_id": "783968", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968" }, { "reference_url": "https://security.gentoo.org/glsa/201507-05", "reference_id": "GLSA-201507-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1635", "reference_id": "RHSA-2015:1635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1635" }, { "reference_url": "https://usn.ubuntu.com/2698-1/", "reference_id": "USN-2698-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2698-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036354?format=api", "purl": "pkg:deb/debian/sqlite3@3.8.7.1-1%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1t89-sr37-s3f6" }, { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2w6e-cvgg-pqax" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4r35-q18a-2kd2" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5kd2-8zpg-6fah" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-6w13-qjnb-xbb4" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-88s4-hq8j-dba4" }, { "vulnerability": "VCID-8d7j-g2rf-tydw" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-gprj-j4v6-z7ev" }, { "vulnerability": "VCID-hfyf-qs8x-pkba" }, { "vulnerability": "VCID-j7cb-3ptn-9qeb" }, { "vulnerability": "VCID-j97s-6d3q-2yb8" }, { "vulnerability": "VCID-jc4t-g7qn-tfc7" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-kvpm-8vj2-8qcj" }, { "vulnerability": "VCID-mqb8-wfvg-xbgz" }, { "vulnerability": "VCID-mvbm-keyp-akf1" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-q8wn-gjw8-fkhu" }, { "vulnerability": "VCID-qhcj-2nua-8kde" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-tpxf-9kf6-dbf8" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-uxd9-2vze-w3ge" }, { "vulnerability": "VCID-vchu-y7qg-pucp" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-ym2v-jfk4-q3f5" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.8.7.1-1%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049267?format=api", "purl": "pkg:deb/debian/sqlite3@3.16.2-3~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1t89-sr37-s3f6" }, { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4r35-q18a-2kd2" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5kd2-8zpg-6fah" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-88s4-hq8j-dba4" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-gprj-j4v6-z7ev" }, { "vulnerability": "VCID-hfyf-qs8x-pkba" }, { "vulnerability": "VCID-j7cb-3ptn-9qeb" }, { "vulnerability": "VCID-jc4t-g7qn-tfc7" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-mqb8-wfvg-xbgz" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-qhcj-2nua-8kde" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-tpxf-9kf6-dbf8" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-vchu-y7qg-pucp" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-ym2v-jfk4-q3f5" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-3~bpo8%252B1" } ], "aliases": [ "CVE-2015-3415" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2w6e-cvgg-pqax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31388?format=api", "vulnerability_id": "VCID-2xdd-xysv-sufz", "summary": "Multiple vulnerabilities have been found in SQLite, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11656.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11656.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11656", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04569", "scoring_system": "epss", "scoring_elements": "0.89158", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04569", "scoring_system": "epss", "scoring_elements": "0.892", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04569", "scoring_system": "epss", "scoring_elements": "0.89179", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04569", "scoring_system": "epss", "scoring_elements": "0.89182", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04569", "scoring_system": "epss", "scoring_elements": "0.89204", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04569", "scoring_system": "epss", "scoring_elements": "0.89215", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04569", "scoring_system": "epss", "scoring_elements": "0.89211", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04569", "scoring_system": "epss", "scoring_elements": "0.89208", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04569", "scoring_system": "epss", "scoring_elements": "0.89164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06078", "scoring_system": "epss", "scoring_elements": "0.90776", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06078", "scoring_system": "epss", "scoring_elements": "0.9078", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06078", "scoring_system": "epss", "scoring_elements": "0.90777", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11656" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20200416-0001/" }, { "reference_url": "https://www3.sqlite.org/cgi/src/info/b64674919f673602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www3.sqlite.org/cgi/src/info/b64674919f673602" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "reference_url": "https://www.sqlite.org/src/info/d09f8c3621d5f7f8", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.sqlite.org/src/info/d09f8c3621d5f7f8" }, { "reference_url": "https://www.tenable.com/security/tns-2021-14", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2021-14" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824185", "reference_id": "1824185", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824185" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11656", "reference_id": "CVE-2020-11656", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11656" }, { "reference_url": "https://security.gentoo.org/glsa/202007-26", "reference_id": "GLSA-202007-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16504", "reference_id": "RHSA-2025:16504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16504" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2020-11656" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2xdd-xysv-sufz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81708?format=api", "vulnerability_id": "VCID-3686-kxzp-gbcf", "summary": "sqlite: mishandles certain uses of INSERT INTO in situations involving embedded '\\0' characters in filenames", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19959.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19959.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19959", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66739", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66777", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66775", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66824", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66838", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66858", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66844", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66812", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66845", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66859", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0052", "scoring_system": "epss", "scoring_elements": "0.66843", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19959" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789595", "reference_id": "1789595", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789595" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1810", "reference_id": "RHSA-2020:1810", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1810" }, { "reference_url": "https://usn.ubuntu.com/4298-1/", "reference_id": "USN-4298-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4298-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2019-19959" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3686-kxzp-gbcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84207?format=api", "vulnerability_id": "VCID-4r35-q18a-2kd2", "summary": "sqlite: Heap-buffer overflow in the getNodeSize function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10989.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10989.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10989", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12478", "scoring_system": "epss", "scoring_elements": "0.93876", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12478", "scoring_system": "epss", "scoring_elements": "0.93885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12478", "scoring_system": "epss", "scoring_elements": "0.93894", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12478", "scoring_system": "epss", "scoring_elements": "0.93898", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12478", "scoring_system": "epss", "scoring_elements": "0.93906", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12478", "scoring_system": "epss", "scoring_elements": "0.9391", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12478", "scoring_system": "epss", "scoring_elements": "0.93913", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.12478", "scoring_system": "epss", "scoring_elements": "0.93914", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12478", "scoring_system": "epss", "scoring_elements": "0.93935", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12478", "scoring_system": "epss", "scoring_elements": "0.9394", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.12478", "scoring_system": "epss", "scoring_elements": "0.93941", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10989" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10989", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10989" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1469672", "reference_id": "1469672", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1469672" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867618", "reference_id": "867618", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867618" }, { "reference_url": "https://usn.ubuntu.com/4019-1/", "reference_id": "USN-4019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-1/" }, { "reference_url": "https://usn.ubuntu.com/4019-2/", "reference_id": "USN-4019-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049482?format=api", "purl": "pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1" } ], "aliases": [ "CVE-2017-10989" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4r35-q18a-2kd2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81766?format=api", "vulnerability_id": "VCID-4u4w-a4gk-rqfx", "summary": "sqlite: infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19645.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19645.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19645", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.5277", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52793", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.5282", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52788", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52839", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52833", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52883", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52867", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52851", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.6081", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.6082", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60826", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783305", "reference_id": "1783305", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783305" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946612", "reference_id": "946612", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16504", "reference_id": "RHSA-2025:16504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16504" }, { "reference_url": "https://usn.ubuntu.com/4394-1/", "reference_id": "USN-4394-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4394-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2019-19645" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4u4w-a4gk-rqfx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82961?format=api", "vulnerability_id": "VCID-5kd2-8zpg-6fah", "summary": "sqlite: Multiple flaws in sqlite which can be triggered via corrupted internal databases (Magellan)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20505.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20505.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20505", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07368", "scoring_system": "epss", "scoring_elements": "0.9168", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07368", "scoring_system": "epss", "scoring_elements": "0.91702", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07368", "scoring_system": "epss", "scoring_elements": "0.91715", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07368", "scoring_system": "epss", "scoring_elements": "0.91722", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07368", "scoring_system": "epss", "scoring_elements": "0.91725", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07368", "scoring_system": "epss", "scoring_elements": "0.91727", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07368", "scoring_system": "epss", "scoring_elements": "0.91723", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07368", "scoring_system": "epss", "scoring_elements": "0.91688", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07368", "scoring_system": "epss", "scoring_elements": "0.91694", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08735", "scoring_system": "epss", "scoring_elements": "0.92516", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08735", "scoring_system": "epss", "scoring_elements": "0.92512", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20505" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20505" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jan/62", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jan/62" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jan/64", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jan/64" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jan/66", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jan/66" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jan/67", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jan/67" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jan/68", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jan/68" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jan/69", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jan/69" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jan/28", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jan/28" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jan/29", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jan/29" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jan/31", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jan/31" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jan/32", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jan/32" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jan/33", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jan/33" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jan/39", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jan/39" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190502-0004/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190502-0004/" }, { "reference_url": "https://sqlite.org/src/info/1a84668dcfdebaf12415d", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sqlite.org/src/info/1a84668dcfdebaf12415d" }, { "reference_url": "https://support.apple.com/kb/HT209443", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT209443" }, { "reference_url": "https://support.apple.com/kb/HT209446", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT209446" }, { "reference_url": "https://support.apple.com/kb/HT209447", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT209447" }, { "reference_url": "https://support.apple.com/kb/HT209448", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT209448" }, { "reference_url": "https://support.apple.com/kb/HT209450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT209450" }, { "reference_url": "https://support.apple.com/kb/HT209451", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT209451" }, { "reference_url": "http://www.securityfocus.com/bid/106698", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106698" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1659379", "reference_id": "1659379", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1659379" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20505", "reference_id": "CVE-2018-20505", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20505" }, { "reference_url": "https://usn.ubuntu.com/4019-1/", "reference_id": "USN-4019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049482?format=api", "purl": "pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1" } ], "aliases": [ "CVE-2018-20505" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5kd2-8zpg-6fah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81684?format=api", "vulnerability_id": "VCID-5wf9-5w85-2ybf", "summary": "sqlite: incorrect sqlite3WindowRewrite() error handling leads to mishandling certain parser-tree rewriting", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19924.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19924.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19924", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04739", "scoring_system": "epss", "scoring_elements": "0.89369", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04739", "scoring_system": "epss", "scoring_elements": "0.89373", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04739", "scoring_system": "epss", "scoring_elements": "0.89384", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04739", "scoring_system": "epss", "scoring_elements": "0.89386", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04739", "scoring_system": "epss", "scoring_elements": "0.89402", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04739", "scoring_system": "epss", "scoring_elements": "0.89406", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04739", "scoring_system": "epss", "scoring_elements": "0.89414", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06298", "scoring_system": "epss", "scoring_elements": "0.90976", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06298", "scoring_system": "epss", "scoring_elements": "0.90955", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06298", "scoring_system": "epss", "scoring_elements": "0.90954", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06298", "scoring_system": "epss", "scoring_elements": "0.90978", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788842", "reference_id": "1788842", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1810", "reference_id": "RHSA-2020:1810", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1810" }, { "reference_url": "https://usn.ubuntu.com/4298-1/", "reference_id": "USN-4298-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4298-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2019-19924" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5wf9-5w85-2ybf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85041?format=api", "vulnerability_id": "VCID-6w13-qjnb-xbb4", "summary": "sqlite: Tempdir selection vulnerability", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6153.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6153.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6153", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09212", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09213", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09259", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09185", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09264", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09307", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09313", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09283", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0927", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09164", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09158", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09311", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6153" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1352437", "reference_id": "1352437", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1352437" }, { "reference_url": "https://usn.ubuntu.com/4019-1/", "reference_id": "USN-4019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-1/" }, { "reference_url": "https://usn.ubuntu.com/4019-2/", "reference_id": "USN-4019-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049267?format=api", "purl": "pkg:deb/debian/sqlite3@3.16.2-3~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1t89-sr37-s3f6" }, { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4r35-q18a-2kd2" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5kd2-8zpg-6fah" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-88s4-hq8j-dba4" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-gprj-j4v6-z7ev" }, { "vulnerability": "VCID-hfyf-qs8x-pkba" }, { "vulnerability": "VCID-j7cb-3ptn-9qeb" }, { "vulnerability": "VCID-jc4t-g7qn-tfc7" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-mqb8-wfvg-xbgz" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-qhcj-2nua-8kde" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-tpxf-9kf6-dbf8" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-vchu-y7qg-pucp" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-ym2v-jfk4-q3f5" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-3~bpo8%252B1" } ], "aliases": [ "CVE-2016-6153" ], "risk_score": 1.0, "exploitability": "0.5", "weighted_severity": "2.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6w13-qjnb-xbb4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81767?format=api", "vulnerability_id": "VCID-7wt9-4myp-w3gu", "summary": "sqlite: mishandling of certain SELECT statements with non-existent VIEW can lead to DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19603.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19603.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19603", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70622", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70637", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70656", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70633", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70679", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70695", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70717", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70701", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70686", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70731", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00645", "scoring_system": "epss", "scoring_elements": "0.70738", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785318", "reference_id": "1785318", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785318" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4396", "reference_id": "RHSA-2021:4396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4396" }, { "reference_url": "https://usn.ubuntu.com/4394-1/", "reference_id": "USN-4394-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4394-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2019-19603" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7wt9-4myp-w3gu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60260?format=api", "vulnerability_id": "VCID-88s4-hq8j-dba4", "summary": "Multiple vulnerabilities have been found in SQLite, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9936.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9936.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9936", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04543", "scoring_system": "epss", "scoring_elements": "0.89131", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04543", "scoring_system": "epss", "scoring_elements": "0.89191", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04543", "scoring_system": "epss", "scoring_elements": "0.89185", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04543", "scoring_system": "epss", "scoring_elements": "0.89182", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04543", "scoring_system": "epss", "scoring_elements": "0.89195", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04543", "scoring_system": "epss", "scoring_elements": "0.89138", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04543", "scoring_system": "epss", "scoring_elements": "0.89153", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04543", "scoring_system": "epss", "scoring_elements": "0.89156", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04543", "scoring_system": "epss", "scoring_elements": "0.89174", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04543", "scoring_system": "epss", "scoring_elements": "0.89178", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04543", "scoring_system": "epss", "scoring_elements": "0.89189", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9936" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9936" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190416-0005/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190416-0005/" }, { "reference_url": "https://sqlite.org/src/info/b3fa58dd7403dbd4", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sqlite.org/src/info/b3fa58dd7403dbd4" }, { "reference_url": "https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114382.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114382.html" }, { "reference_url": "https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114394.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114394.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "reference_url": "http://www.securityfocus.com/bid/107562", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/107562" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692365", "reference_id": "1692365", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692365" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925289", "reference_id": "925289", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925289" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9936", "reference_id": "CVE-2019-9936", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9936" }, { "reference_url": "https://security.gentoo.org/glsa/201908-09", "reference_id": "GLSA-201908-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-09" }, { "reference_url": "https://usn.ubuntu.com/4019-1/", "reference_id": "USN-4019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049482?format=api", "purl": "pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1" } ], "aliases": [ "CVE-2019-9936" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-88s4-hq8j-dba4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93199?format=api", "vulnerability_id": "VCID-8d7j-g2rf-tydw", "summary": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"SQLite\" component. A use-after-free vulnerability allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SQL statement.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2513", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02496", "scoring_system": "epss", "scoring_elements": "0.85252", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02496", "scoring_system": "epss", "scoring_elements": "0.85264", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02496", "scoring_system": "epss", "scoring_elements": "0.85282", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02496", "scoring_system": "epss", "scoring_elements": "0.85285", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02496", "scoring_system": "epss", "scoring_elements": "0.85307", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02496", "scoring_system": "epss", "scoring_elements": "0.85315", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02496", "scoring_system": "epss", "scoring_elements": "0.85329", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02496", "scoring_system": "epss", "scoring_elements": "0.85327", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02496", "scoring_system": "epss", "scoring_elements": "0.85324", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02496", "scoring_system": "epss", "scoring_elements": "0.85344", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02496", "scoring_system": "epss", "scoring_elements": "0.85346", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02496", "scoring_system": "epss", "scoring_elements": "0.85343", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2513" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049267?format=api", "purl": "pkg:deb/debian/sqlite3@3.16.2-3~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1t89-sr37-s3f6" }, { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4r35-q18a-2kd2" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5kd2-8zpg-6fah" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-88s4-hq8j-dba4" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-gprj-j4v6-z7ev" }, { "vulnerability": "VCID-hfyf-qs8x-pkba" }, { "vulnerability": "VCID-j7cb-3ptn-9qeb" }, { "vulnerability": "VCID-jc4t-g7qn-tfc7" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-mqb8-wfvg-xbgz" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-qhcj-2nua-8kde" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-tpxf-9kf6-dbf8" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-vchu-y7qg-pucp" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-ym2v-jfk4-q3f5" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-3~bpo8%252B1" } ], "aliases": [ "CVE-2017-2513" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8d7j-g2rf-tydw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81726?format=api", "vulnerability_id": "VCID-8m3z-fgqg-4fgn", "summary": "sqlite: invalid pointer dereference in exprListAppendList in window.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19880.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19880.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19880", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06395", "scoring_system": "epss", "scoring_elements": "0.90977", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06395", "scoring_system": "epss", "scoring_elements": "0.90982", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06395", "scoring_system": "epss", "scoring_elements": "0.90991", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06395", "scoring_system": "epss", "scoring_elements": "0.91001", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06395", "scoring_system": "epss", "scoring_elements": "0.91013", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06395", "scoring_system": "epss", "scoring_elements": "0.91019", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06395", "scoring_system": "epss", "scoring_elements": "0.91027", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.08438", "scoring_system": "epss", "scoring_elements": "0.92355", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08438", "scoring_system": "epss", "scoring_elements": "0.92347", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08438", "scoring_system": "epss", "scoring_elements": "0.92345", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08438", "scoring_system": "epss", "scoring_elements": "0.92356", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19880" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787032", "reference_id": "1787032", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1787032" }, { "reference_url": "https://security.archlinux.org/ASA-202002-3", "reference_id": "ASA-202002-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202002-3" }, { "reference_url": "https://security.archlinux.org/AVG-1092", "reference_id": "AVG-1092", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1092" }, { "reference_url": "https://usn.ubuntu.com/4298-1/", "reference_id": "USN-4298-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4298-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2019-19880" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8m3z-fgqg-4fgn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31394?format=api", "vulnerability_id": "VCID-9ggb-qwny-qqhb", "summary": "Multiple vulnerabilities have been found in SQLite, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13632.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13632.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13632", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06449", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06481", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06509", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.065", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0655", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06592", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06586", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06578", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06569", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06505", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06513", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06663", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13632" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1841574", "reference_id": "1841574", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1841574" }, { "reference_url": "https://security.gentoo.org/glsa/202007-26", "reference_id": "GLSA-202007-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4442", "reference_id": "RHSA-2020:4442", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4442" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1968", "reference_id": "RHSA-2021:1968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16504", "reference_id": "RHSA-2025:16504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16504" }, { "reference_url": "https://usn.ubuntu.com/4394-1/", "reference_id": "USN-4394-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4394-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2020-13632" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ggb-qwny-qqhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81795?format=api", "vulnerability_id": "VCID-ajrb-8r3r-afe3", "summary": "sqlite: SQL injection in sqlite3ExprCodeTarget in expr.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19242.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19242.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19242", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42084", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42143", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.4217", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42109", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.4216", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42171", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42194", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42157", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.4213", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42181", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42156", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.002", "scoring_system": "epss", "scoring_elements": "0.42085", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19242" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19242" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778867", "reference_id": "1778867", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778867" }, { "reference_url": "https://usn.ubuntu.com/4205-1/", "reference_id": "USN-4205-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4205-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2019-19242" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ajrb-8r3r-afe3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94830?format=api", "vulnerability_id": "VCID-bgz9-v5cv-8kea", "summary": "A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-36690", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76623", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76626", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76655", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76636", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82401", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.8243", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82435", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82386", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82405", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82395", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-36690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/AVG-2318", "reference_id": "AVG-2318", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2318" }, { "reference_url": "https://security.archlinux.org/AVG-2319", "reference_id": "AVG-2319", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2319" }, { "reference_url": "https://usn.ubuntu.com/5403-1/", "reference_id": "USN-5403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049484?format=api", "purl": "pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2k32-4p92-1ygz" }, { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-jree-ndwj-kfcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2" } ], "aliases": [ "CVE-2021-36690" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bgz9-v5cv-8kea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59150?format=api", "vulnerability_id": "VCID-bxfk-dmdp-53f3", "summary": "A vulnerability in SQLite could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20227.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20227.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20227", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43493", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43554", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43581", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43519", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.4357", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43584", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43602", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43572", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43556", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43616", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43605", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43541", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20227" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20227", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20227" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924886", "reference_id": "1924886", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924886" }, { "reference_url": "https://security.archlinux.org/AVG-1536", "reference_id": "AVG-1536", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1536" }, { "reference_url": "https://security.gentoo.org/glsa/202103-04", "reference_id": "GLSA-202103-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202103-04" }, { "reference_url": "https://usn.ubuntu.com/4732-1/", "reference_id": "USN-4732-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4732-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2021-20227" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bxfk-dmdp-53f3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31396?format=api", "vulnerability_id": "VCID-chtp-rtmg-6ud5", "summary": "Multiple vulnerabilities have been found in SQLite, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15358.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15358.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15358", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11073", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11216", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11279", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11092", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11171", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11228", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11237", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11205", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11179", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11044", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11053", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11185", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851957", "reference_id": "1851957", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851957" }, { "reference_url": "https://security.gentoo.org/glsa/202007-26", "reference_id": "GLSA-202007-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1581", "reference_id": "RHSA-2021:1581", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1581" }, { "reference_url": "https://usn.ubuntu.com/4438-1/", "reference_id": "USN-4438-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4438-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2020-15358" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-chtp-rtmg-6ud5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81573?format=api", "vulnerability_id": "VCID-edrj-chna-ekam", "summary": "sqlite: Out of bounds access during table rename", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35527.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35527.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35527", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00253", "scoring_system": "epss", "scoring_elements": "0.48646", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00253", "scoring_system": "epss", "scoring_elements": "0.48632", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00253", "scoring_system": "epss", "scoring_elements": "0.48644", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00253", "scoring_system": "epss", "scoring_elements": "0.48693", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00253", "scoring_system": "epss", "scoring_elements": "0.48689", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.5098", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50978", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.5102", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50887", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50923", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.5094", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50965", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35527" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122329", "reference_id": "2122329", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7108", "reference_id": "RHSA-2022:7108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7108" }, { "reference_url": "https://usn.ubuntu.com/5615-1/", "reference_id": "USN-5615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2020-35527" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-edrj-chna-ekam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31395?format=api", "vulnerability_id": "VCID-eu7t-2h5s-4kc5", "summary": "Multiple vulnerabilities have been found in SQLite, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13871.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13871.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13871", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02437", "scoring_system": "epss", "scoring_elements": "0.85095", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02437", "scoring_system": "epss", "scoring_elements": "0.85107", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02437", "scoring_system": "epss", "scoring_elements": "0.85124", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02437", "scoring_system": "epss", "scoring_elements": "0.85128", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02437", "scoring_system": "epss", "scoring_elements": "0.8515", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02437", "scoring_system": "epss", "scoring_elements": "0.85157", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02437", "scoring_system": "epss", "scoring_elements": "0.85171", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02437", "scoring_system": "epss", "scoring_elements": "0.85169", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02437", "scoring_system": "epss", "scoring_elements": "0.85166", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02437", "scoring_system": "epss", "scoring_elements": "0.85187", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02437", "scoring_system": "epss", "scoring_elements": "0.85188", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13871" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845576", "reference_id": "1845576", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845576" }, { "reference_url": "https://security.archlinux.org/ASA-202006-11", "reference_id": "ASA-202006-11", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-11" }, { "reference_url": "https://security.archlinux.org/AVG-1182", "reference_id": "AVG-1182", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1182" }, { "reference_url": "https://security.gentoo.org/glsa/202007-26", "reference_id": "GLSA-202007-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2020-13871" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eu7t-2h5s-4kc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59802?format=api", "vulnerability_id": "VCID-f9jg-cmg5-6ubq", "summary": "Multiple vulnerabilities have been found in SQLite, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9327.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9327.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9327", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.71984", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.71992", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.72012", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.71987", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.72026", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.72039", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.72063", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76405", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76379", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76374", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76414", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00951", "scoring_system": "epss", "scoring_elements": "0.76421", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9327" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9327", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9327" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1809315", "reference_id": "1809315", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1809315" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951835", "reference_id": "951835", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951835" }, { "reference_url": "https://security.gentoo.org/glsa/202003-16", "reference_id": "GLSA-202003-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4442", "reference_id": "RHSA-2020:4442", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4442" }, { "reference_url": "https://usn.ubuntu.com/4298-1/", "reference_id": "USN-4298-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4298-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2020-9327" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f9jg-cmg5-6ubq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31386?format=api", "vulnerability_id": "VCID-gb4s-4wcm-eyft", "summary": "Multiple vulnerabilities have been found in SQLite, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20218.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20218.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-20218", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60668", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60742", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60771", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60735", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60784", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60799", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.6082", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60807", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60788", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60831", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60836", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60821", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-20218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20218" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791313", "reference_id": "1791313", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791313" }, { "reference_url": "https://security.gentoo.org/glsa/202007-26", "reference_id": "GLSA-202007-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4442", "reference_id": "RHSA-2020:4442", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4442" }, { "reference_url": "https://usn.ubuntu.com/4298-1/", "reference_id": "USN-4298-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4298-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2019-20218" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gb4s-4wcm-eyft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82962?format=api", "vulnerability_id": "VCID-gprj-j4v6-z7ev", "summary": "sqlite: Multiple flaws in sqlite which can be triggered via corrupted internal databases (Magellan)", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20506.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20506.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20506", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08492", "scoring_system": "epss", "scoring_elements": "0.92331", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08492", "scoring_system": "epss", "scoring_elements": "0.92382", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08492", "scoring_system": "epss", "scoring_elements": "0.92369", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08492", "scoring_system": "epss", "scoring_elements": "0.92371", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08492", "scoring_system": "epss", "scoring_elements": "0.9238", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08492", "scoring_system": "epss", "scoring_elements": "0.92338", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08492", "scoring_system": "epss", "scoring_elements": "0.92344", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08492", "scoring_system": "epss", "scoring_elements": "0.92347", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08492", "scoring_system": "epss", "scoring_elements": "0.92359", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08492", "scoring_system": "epss", "scoring_elements": "0.92363", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20506" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jan/62", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jan/62" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jan/64", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jan/64" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jan/66", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jan/66" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jan/67", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jan/67" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jan/68", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jan/68" }, { "reference_url": "http://seclists.org/fulldisclosure/2019/Jan/69", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2019/Jan/69" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jan/28", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jan/28" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jan/29", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jan/29" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jan/31", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jan/31" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jan/32", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jan/32" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jan/33", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jan/33" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jan/39", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jan/39" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190502-0004/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190502-0004/" }, { "reference_url": "https://sqlite.org/src/info/940f2adc8541a838", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sqlite.org/src/info/940f2adc8541a838" }, { "reference_url": "https://support.apple.com/kb/HT209443", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT209443" }, { "reference_url": "https://support.apple.com/kb/HT209446", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT209446" }, { "reference_url": "https://support.apple.com/kb/HT209447", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT209447" }, { "reference_url": "https://support.apple.com/kb/HT209448", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT209448" }, { "reference_url": "https://support.apple.com/kb/HT209450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT209450" }, { "reference_url": "https://support.apple.com/kb/HT209451", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT209451" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "http://www.securityfocus.com/bid/106698", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106698" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1659379", "reference_id": "1659379", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1659379" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20506", "reference_id": "CVE-2018-20506", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20506" }, { "reference_url": "https://usn.ubuntu.com/4019-1/", "reference_id": "USN-4019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-1/" }, { "reference_url": "https://usn.ubuntu.com/4019-2/", "reference_id": "USN-4019-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049482?format=api", "purl": "pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1" } ], "aliases": [ "CVE-2018-20506" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gprj-j4v6-z7ev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84017?format=api", "vulnerability_id": "VCID-hfyf-qs8x-pkba", "summary": "sqlite: Local DoS via dump_callback function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13685.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13685.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-13685", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60434", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60591", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60597", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60603", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60509", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60536", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60506", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60554", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60571", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60592", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60577", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60556", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-13685" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:C" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488881", "reference_id": "1488881", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488881" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873762", "reference_id": "873762", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873762" }, { "reference_url": "https://usn.ubuntu.com/4019-1/", "reference_id": "USN-4019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-1/" }, { "reference_url": "https://usn.ubuntu.com/4019-2/", "reference_id": "USN-4019-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049482?format=api", "purl": "pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1" } ], "aliases": [ "CVE-2017-13685" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hfyf-qs8x-pkba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78528?format=api", "vulnerability_id": "VCID-j7cb-3ptn-9qeb", "summary": "sqlite: Crash due to misuse of window functions.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24736.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24736.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-24736", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06746", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06823", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06853", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06867", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06908", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06938", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06935", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07435", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07361", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07348", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07475", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07446", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-24736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24736" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186385", "reference_id": "2186385", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186385" }, { "reference_url": "https://www.sqlite.org/src/info/4feb3159c6bc3f7e33959", "reference_id": "4feb3159c6bc3f7e33959", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T17:30:13Z/" } ], "url": "https://www.sqlite.org/src/info/4feb3159c6bc3f7e33959" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230526-0005/", "reference_id": "ntap-20230526-0005", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T17:30:13Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230526-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3840", "reference_id": "RHSA-2023:3840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0425", "reference_id": "RHSA-2024:0425", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0425" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049482?format=api", "purl": "pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1" } ], "aliases": [ "CVE-2020-24736" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j7cb-3ptn-9qeb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45193?format=api", "vulnerability_id": "VCID-j97s-6d3q-2yb8", "summary": "Multiple vulnerabilities have been found in SQLite, allowing\n context-dependent attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3416.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3416.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3416", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07527", "scoring_system": "epss", "scoring_elements": "0.91827", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07527", "scoring_system": "epss", "scoring_elements": "0.9177", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07527", "scoring_system": "epss", "scoring_elements": "0.91779", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07527", "scoring_system": "epss", "scoring_elements": "0.91785", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07527", "scoring_system": "epss", "scoring_elements": "0.91793", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07527", "scoring_system": "epss", "scoring_elements": "0.91805", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07527", "scoring_system": "epss", "scoring_elements": "0.91812", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07527", "scoring_system": "epss", "scoring_elements": "0.91815", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07527", "scoring_system": "epss", "scoring_elements": "0.91817", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07527", "scoring_system": "epss", "scoring_elements": "0.91813", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07527", "scoring_system": "epss", "scoring_elements": "0.91833", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3416" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212357", "reference_id": "1212357", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212357" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968", "reference_id": "783968", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968" }, { "reference_url": "https://security.gentoo.org/glsa/201507-05", "reference_id": "GLSA-201507-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1634", "reference_id": "RHSA-2015:1634", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1634" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1635", "reference_id": "RHSA-2015:1635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1635" }, { "reference_url": "https://usn.ubuntu.com/2698-1/", "reference_id": "USN-2698-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2698-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036354?format=api", "purl": "pkg:deb/debian/sqlite3@3.8.7.1-1%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1t89-sr37-s3f6" }, { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2w6e-cvgg-pqax" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4r35-q18a-2kd2" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5kd2-8zpg-6fah" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-6w13-qjnb-xbb4" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-88s4-hq8j-dba4" }, { "vulnerability": "VCID-8d7j-g2rf-tydw" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-gprj-j4v6-z7ev" }, { "vulnerability": "VCID-hfyf-qs8x-pkba" }, { "vulnerability": "VCID-j7cb-3ptn-9qeb" }, { "vulnerability": "VCID-j97s-6d3q-2yb8" }, { "vulnerability": "VCID-jc4t-g7qn-tfc7" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-kvpm-8vj2-8qcj" }, { "vulnerability": "VCID-mqb8-wfvg-xbgz" }, { "vulnerability": "VCID-mvbm-keyp-akf1" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-q8wn-gjw8-fkhu" }, { "vulnerability": "VCID-qhcj-2nua-8kde" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-tpxf-9kf6-dbf8" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-uxd9-2vze-w3ge" }, { "vulnerability": "VCID-vchu-y7qg-pucp" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-ym2v-jfk4-q3f5" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.8.7.1-1%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049267?format=api", "purl": "pkg:deb/debian/sqlite3@3.16.2-3~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1t89-sr37-s3f6" }, { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4r35-q18a-2kd2" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5kd2-8zpg-6fah" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-88s4-hq8j-dba4" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-gprj-j4v6-z7ev" }, { "vulnerability": "VCID-hfyf-qs8x-pkba" }, { "vulnerability": "VCID-j7cb-3ptn-9qeb" }, { "vulnerability": "VCID-jc4t-g7qn-tfc7" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-mqb8-wfvg-xbgz" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-qhcj-2nua-8kde" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-tpxf-9kf6-dbf8" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-vchu-y7qg-pucp" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-ym2v-jfk4-q3f5" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-3~bpo8%252B1" } ], "aliases": [ "CVE-2015-3416" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j97s-6d3q-2yb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39747?format=api", "vulnerability_id": "VCID-jc4t-g7qn-tfc7", "summary": "A vulnerability in SQLite may allow for the remote execution of\n code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html" }, { "reference_url": "https://access.redhat.com/articles/3758321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/articles/3758321" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20346.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20346.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20346", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.13215", "scoring_system": "epss", "scoring_elements": "0.941", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.13215", "scoring_system": "epss", "scoring_elements": "0.94161", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.13215", "scoring_system": "epss", "scoring_elements": "0.94142", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13215", "scoring_system": "epss", "scoring_elements": "0.94141", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.13215", "scoring_system": "epss", "scoring_elements": "0.94157", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.13215", "scoring_system": "epss", "scoring_elements": "0.94162", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.13215", "scoring_system": "epss", "scoring_elements": "0.94109", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13215", "scoring_system": "epss", "scoring_elements": "0.94121", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13215", "scoring_system": "epss", "scoring_elements": "0.94124", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13215", "scoring_system": "epss", "scoring_elements": "0.94133", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13215", "scoring_system": "epss", "scoring_elements": "0.94137", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20346" }, { "reference_url": "https://blade.tencent.com/magellan/index_en.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://blade.tencent.com/magellan/index_en.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1659677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1659677" }, { "reference_url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html" }, { "reference_url": "https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e", "reference_id": "", "reference_type": "", "scores": [], "url": "https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e" }, { "reference_url": "https://crbug.com/900910", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/900910" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18336", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18336" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18337", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18337" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18339", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18339" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18342", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18342" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18343", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18343" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18344", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18344" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18345", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18345" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18346" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18347", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18347" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18348", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18348" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18349", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18349" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18350", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18350" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18351", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18351" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18352", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18352" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18354", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18354" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18355", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18355" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18357", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18357" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18359", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18359" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20065", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20065" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20066", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20066" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20067", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20067" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20068", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20068" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20070", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20070" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/" }, { "reference_url": "https://news.ycombinator.com/item?id=18685296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://news.ycombinator.com/item?id=18685296" }, { "reference_url": "https://sqlite.org/src/info/940f2adc8541a838", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sqlite.org/src/info/940f2adc8541a838" }, { "reference_url": "https://sqlite.org/src/info/d44318f59044162e", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sqlite.org/src/info/d44318f59044162e" }, { "reference_url": "https://support.apple.com/HT209443", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT209443" }, { "reference_url": "https://support.apple.com/HT209446", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT209446" }, { "reference_url": "https://support.apple.com/HT209447", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT209447" }, { "reference_url": "https://support.apple.com/HT209448", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT209448" }, { "reference_url": "https://support.apple.com/HT209450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT209450" }, { "reference_url": "https://support.apple.com/HT209451", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT209451" }, { "reference_url": "https://worthdoingbadly.com/sqlitebug/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://worthdoingbadly.com/sqlitebug/" }, { "reference_url": "https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc" }, { "reference_url": "https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg113218.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg113218.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://www.sqlite.org/releaselog/3_25_3.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.sqlite.org/releaselog/3_25_3.html" }, { "reference_url": "https://www.synology.com/security/advisory/Synology_SA_18_61", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.synology.com/security/advisory/Synology_SA_18_61" }, { "reference_url": "http://www.securityfocus.com/bid/106323", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/106323" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1659379", "reference_id": "1659379", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1659379" }, { "reference_url": "https://security.archlinux.org/AVG-840", "reference_id": "AVG-840", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-840" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20346", "reference_id": "CVE-2018-20346", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20346" }, { "reference_url": "https://security.gentoo.org/glsa/201904-21", "reference_id": "GLSA-201904-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201904-21" }, { "reference_url": "https://usn.ubuntu.com/4019-1/", "reference_id": "USN-4019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-1/" }, { "reference_url": "https://usn.ubuntu.com/4019-2/", "reference_id": "USN-4019-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049482?format=api", "purl": "pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1" } ], "aliases": [ "CVE-2018-20346" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jc4t-g7qn-tfc7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77877?format=api", "vulnerability_id": "VCID-jqy9-zum8-aqfn", "summary": "sqlite: heap-buffer-overflow at sessionfuzz", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7104.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7104.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-7104", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32443", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32329", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32478", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32351", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32379", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.3238", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32343", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32316", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32352", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-7104" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7104", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7104" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sqlite.org/src/info/0e4e7a05c4204b47", "reference_id": "0e4e7a05c4204b47", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/" } ], "url": "https://sqlite.org/src/info/0e4e7a05c4204b47" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256194", "reference_id": "2256194", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256194" }, { "reference_url": "https://sqlite.org/forum/forumpost/5bcbf4571c", "reference_id": "5bcbf4571c", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/" } ], "url": "https://sqlite.org/forum/forumpost/5bcbf4571c" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/", "reference_id": "AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/" }, { "reference_url": "https://vuldb.com/?ctiid.248999", "reference_id": "?ctiid.248999", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/" } ], "url": "https://vuldb.com/?ctiid.248999" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/", "reference_id": "D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/" }, { "reference_url": "https://vuldb.com/?id.248999", "reference_id": "?id.248999", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/" } ], "url": "https://vuldb.com/?id.248999" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240112-0008/", "reference_id": "ntap-20240112-0008", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240112-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0253", "reference_id": "RHSA-2024:0253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0465", "reference_id": "RHSA-2024:0465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0589", "reference_id": "RHSA-2024:0589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1081", "reference_id": "RHSA-2024:1081", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1081" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1107", "reference_id": "RHSA-2024:1107", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1107" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1383", "reference_id": "RHSA-2024:1383", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1383" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1477", "reference_id": "RHSA-2024:1477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1477" }, { "reference_url": "https://usn.ubuntu.com/6566-1/", "reference_id": "USN-6566-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6566-1/" }, { "reference_url": "https://usn.ubuntu.com/6566-2/", "reference_id": "USN-6566-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6566-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049484?format=api", "purl": "pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2k32-4p92-1ygz" }, { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-jree-ndwj-kfcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2" } ], "aliases": [ "CVE-2023-7104" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqy9-zum8-aqfn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31387?format=api", "vulnerability_id": "VCID-jsyj-vz3p-rbae", "summary": "Multiple vulnerabilities have been found in SQLite, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11655.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11655.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11655", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0489", "scoring_system": "epss", "scoring_elements": "0.89543", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0489", "scoring_system": "epss", "scoring_elements": "0.89593", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0489", "scoring_system": "epss", "scoring_elements": "0.89582", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0489", "scoring_system": "epss", "scoring_elements": "0.89596", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0489", "scoring_system": "epss", "scoring_elements": "0.89597", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0489", "scoring_system": "epss", "scoring_elements": "0.89547", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0489", "scoring_system": "epss", "scoring_elements": "0.8956", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0489", "scoring_system": "epss", "scoring_elements": "0.89561", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0489", "scoring_system": "epss", "scoring_elements": "0.89578", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0489", "scoring_system": "epss", "scoring_elements": "0.89583", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0489", "scoring_system": "epss", "scoring_elements": "0.8959", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0489", "scoring_system": "epss", "scoring_elements": "0.89588", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11655" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html" }, { "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20200416-0001/" }, { "reference_url": "https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11" }, { "reference_url": "https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "reference_url": "https://www.tenable.com/security/tns-2021-14", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2021-14" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824174", "reference_id": "1824174", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824174" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11655", "reference_id": "CVE-2020-11655", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11655" }, { "reference_url": "https://security.gentoo.org/glsa/202007-26", "reference_id": "GLSA-202007-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16504", "reference_id": "RHSA-2025:16504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16504" }, { "reference_url": "https://usn.ubuntu.com/4394-1/", "reference_id": "USN-4394-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4394-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2020-11655" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jsyj-vz3p-rbae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93201?format=api", "vulnerability_id": "VCID-kvpm-8vj2-8qcj", "summary": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"SQLite\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted SQL statement.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2519", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09633", "scoring_system": "epss", "scoring_elements": "0.92866", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09633", "scoring_system": "epss", "scoring_elements": "0.92874", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09633", "scoring_system": "epss", "scoring_elements": "0.92877", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09633", "scoring_system": "epss", "scoring_elements": "0.92875", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09633", "scoring_system": "epss", "scoring_elements": "0.92884", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09633", "scoring_system": "epss", "scoring_elements": "0.92887", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09633", "scoring_system": "epss", "scoring_elements": "0.92893", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09633", "scoring_system": "epss", "scoring_elements": "0.92891", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09633", "scoring_system": "epss", "scoring_elements": "0.92892", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09633", "scoring_system": "epss", "scoring_elements": "0.92902", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.09633", "scoring_system": "epss", "scoring_elements": "0.92904", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09633", "scoring_system": "epss", "scoring_elements": "0.9291", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2519" }, { "reference_url": "https://usn.ubuntu.com/4019-1/", "reference_id": "USN-4019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049267?format=api", "purl": "pkg:deb/debian/sqlite3@3.16.2-3~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1t89-sr37-s3f6" }, { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4r35-q18a-2kd2" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5kd2-8zpg-6fah" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-88s4-hq8j-dba4" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-gprj-j4v6-z7ev" }, { "vulnerability": "VCID-hfyf-qs8x-pkba" }, { "vulnerability": "VCID-j7cb-3ptn-9qeb" }, { "vulnerability": "VCID-jc4t-g7qn-tfc7" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-mqb8-wfvg-xbgz" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-qhcj-2nua-8kde" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-tpxf-9kf6-dbf8" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-vchu-y7qg-pucp" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-ym2v-jfk4-q3f5" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-3~bpo8%252B1" } ], "aliases": [ "CVE-2017-2519" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kvpm-8vj2-8qcj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83890?format=api", "vulnerability_id": "VCID-mqb8-wfvg-xbgz", "summary": "sqlite: NULL pointer dereference in tableColumnList", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15286.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15286.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15286", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64347", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64464", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.6446", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64472", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64401", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.6443", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.6439", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64438", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64454", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64466", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64426", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15286" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15286", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15286" }, { "reference_url": "https://github.com/Ha0Team/crash-of-sqlite3/blob/master/poc.md", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/Ha0Team/crash-of-sqlite3/blob/master/poc.md" }, { "reference_url": "http://www.securityfocus.com/bid/101285", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101285" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1510438", "reference_id": "1510438", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1510438" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878680", "reference_id": "878680", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878680" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.20.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sqlite:sqlite:3.20.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.20.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15286", "reference_id": "CVE-2017-15286", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15286" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049482?format=api", "purl": "pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1" } ], "aliases": [ "CVE-2017-15286" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mqb8-wfvg-xbgz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93202?format=api", "vulnerability_id": "VCID-mvbm-keyp-akf1", "summary": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"SQLite\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted SQL statement.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2520", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1061", "scoring_system": "epss", "scoring_elements": "0.9326", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.1061", "scoring_system": "epss", "scoring_elements": "0.93268", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.1061", "scoring_system": "epss", "scoring_elements": "0.93274", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.1061", "scoring_system": "epss", "scoring_elements": "0.93273", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.1061", "scoring_system": "epss", "scoring_elements": "0.93281", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.1061", "scoring_system": "epss", "scoring_elements": "0.93286", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.1061", "scoring_system": "epss", "scoring_elements": "0.9329", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.1061", "scoring_system": "epss", "scoring_elements": "0.93288", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.1061", "scoring_system": "epss", "scoring_elements": "0.93307", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.1061", "scoring_system": "epss", "scoring_elements": "0.93312", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.1061", "scoring_system": "epss", "scoring_elements": "0.9332", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2520" }, { "reference_url": "https://usn.ubuntu.com/4019-1/", "reference_id": "USN-4019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049267?format=api", "purl": "pkg:deb/debian/sqlite3@3.16.2-3~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1t89-sr37-s3f6" }, { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4r35-q18a-2kd2" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5kd2-8zpg-6fah" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-88s4-hq8j-dba4" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-gprj-j4v6-z7ev" }, { "vulnerability": "VCID-hfyf-qs8x-pkba" }, { "vulnerability": "VCID-j7cb-3ptn-9qeb" }, { "vulnerability": "VCID-jc4t-g7qn-tfc7" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-mqb8-wfvg-xbgz" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-qhcj-2nua-8kde" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-tpxf-9kf6-dbf8" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-vchu-y7qg-pucp" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-ym2v-jfk4-q3f5" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-3~bpo8%252B1" } ], "aliases": [ "CVE-2017-2520" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mvbm-keyp-akf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81687?format=api", "vulnerability_id": "VCID-p4b6-m68m-aqeq", "summary": "sqlite: zipfileUpdate in ext/misc/zipfile.c mishandles a NULL pathname during an update of a ZIP archive", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19925.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19925.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19925", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07012", "scoring_system": "epss", "scoring_elements": "0.91426", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07012", "scoring_system": "epss", "scoring_elements": "0.91496", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07012", "scoring_system": "epss", "scoring_elements": "0.91476", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07012", "scoring_system": "epss", "scoring_elements": "0.915", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07012", "scoring_system": "epss", "scoring_elements": "0.91433", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07012", "scoring_system": "epss", "scoring_elements": "0.91443", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07012", "scoring_system": "epss", "scoring_elements": "0.9145", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07012", "scoring_system": "epss", "scoring_elements": "0.91463", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07012", "scoring_system": "epss", "scoring_elements": "0.91469", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07012", "scoring_system": "epss", "scoring_elements": "0.91475", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07012", "scoring_system": "epss", "scoring_elements": "0.91478", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788866", "reference_id": "1788866", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788866" }, { "reference_url": "https://security.archlinux.org/ASA-202002-3", "reference_id": "ASA-202002-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202002-3" }, { "reference_url": "https://security.archlinux.org/AVG-1092", "reference_id": "AVG-1092", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1092" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1810", "reference_id": "RHSA-2020:1810", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1810" }, { "reference_url": "https://usn.ubuntu.com/4298-1/", "reference_id": "USN-4298-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4298-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2019-19925" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p4b6-m68m-aqeq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93200?format=api", "vulnerability_id": "VCID-q8wn-gjw8-fkhu", "summary": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"SQLite\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted SQL statement.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2518", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.23291", "scoring_system": "epss", "scoring_elements": "0.95969", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.23291", "scoring_system": "epss", "scoring_elements": "0.95915", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.23291", "scoring_system": "epss", "scoring_elements": "0.95923", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.23291", "scoring_system": "epss", "scoring_elements": "0.95931", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.23291", "scoring_system": "epss", "scoring_elements": "0.95934", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.23291", "scoring_system": "epss", "scoring_elements": "0.95943", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.23291", "scoring_system": "epss", "scoring_elements": "0.95946", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.23291", "scoring_system": "epss", "scoring_elements": "0.95949", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.23291", "scoring_system": "epss", "scoring_elements": "0.95952", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.23291", "scoring_system": "epss", "scoring_elements": "0.95963", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.23291", "scoring_system": "epss", "scoring_elements": "0.95967", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2518" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://usn.ubuntu.com/4019-1/", "reference_id": "USN-4019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-1/" }, { "reference_url": "https://usn.ubuntu.com/4019-2/", "reference_id": "USN-4019-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049267?format=api", "purl": "pkg:deb/debian/sqlite3@3.16.2-3~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1t89-sr37-s3f6" }, { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4r35-q18a-2kd2" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5kd2-8zpg-6fah" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-88s4-hq8j-dba4" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-gprj-j4v6-z7ev" }, { "vulnerability": "VCID-hfyf-qs8x-pkba" }, { "vulnerability": "VCID-j7cb-3ptn-9qeb" }, { "vulnerability": "VCID-jc4t-g7qn-tfc7" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-mqb8-wfvg-xbgz" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-qhcj-2nua-8kde" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-tpxf-9kf6-dbf8" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-vchu-y7qg-pucp" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-ym2v-jfk4-q3f5" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-3~bpo8%252B1" } ], "aliases": [ "CVE-2017-2518" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q8wn-gjw8-fkhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60261?format=api", "vulnerability_id": "VCID-qhcj-2nua-8kde", "summary": "Multiple vulnerabilities have been found in SQLite, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9937.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9937.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9937", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04004", "scoring_system": "epss", "scoring_elements": "0.88385", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04004", "scoring_system": "epss", "scoring_elements": "0.88444", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04004", "scoring_system": "epss", "scoring_elements": "0.88435", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04004", "scoring_system": "epss", "scoring_elements": "0.8845", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04004", "scoring_system": "epss", "scoring_elements": "0.88446", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04004", "scoring_system": "epss", "scoring_elements": "0.88394", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04004", "scoring_system": "epss", "scoring_elements": "0.88403", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04004", "scoring_system": "epss", "scoring_elements": "0.88407", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04004", "scoring_system": "epss", "scoring_elements": "0.88426", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04004", "scoring_system": "epss", "scoring_elements": "0.88432", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04004", "scoring_system": "epss", "scoring_elements": "0.88443", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9937" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9937", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9937" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190416-0005/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190416-0005/" }, { "reference_url": "https://sqlite.org/src/info/45c73deb440496e8", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sqlite.org/src/info/45c73deb440496e8" }, { "reference_url": "https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114383.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114383.html" }, { "reference_url": "https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114393.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114393.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "reference_url": "http://www.securityfocus.com/bid/107562", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/107562" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692357", "reference_id": "1692357", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692357" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925290", "reference_id": "925290", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925290" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9937", "reference_id": "CVE-2019-9937", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9937" }, { "reference_url": "https://security.gentoo.org/glsa/201908-09", "reference_id": "GLSA-201908-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-09" }, { "reference_url": "https://usn.ubuntu.com/4019-1/", "reference_id": "USN-4019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049482?format=api", "purl": "pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1" } ], "aliases": [ "CVE-2019-9937" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qhcj-2nua-8kde" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31391?format=api", "vulnerability_id": "VCID-r31n-5brf-ykcv", "summary": "Multiple vulnerabilities have been found in SQLite, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13435.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13435.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13435", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04793", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04646", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04654", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05233", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05291", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05325", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05348", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05315", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05303", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05292", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0519", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05265", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13435" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1841231", "reference_id": "1841231", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1841231" }, { "reference_url": "https://security.gentoo.org/glsa/202007-26", "reference_id": "GLSA-202007-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4396", "reference_id": "RHSA-2021:4396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16504", "reference_id": "RHSA-2025:16504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16504" }, { "reference_url": "https://usn.ubuntu.com/4394-1/", "reference_id": "USN-4394-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4394-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2020-13435" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r31n-5brf-ykcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81576?format=api", "vulnerability_id": "VCID-sy72-yhap-vbet", "summary": "sqlite: Null pointer derreference in src/select.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35525.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35525.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35525", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.44512", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.44533", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.44534", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.4459", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00219", "scoring_system": "epss", "scoring_elements": "0.44581", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46812", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46889", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46807", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46866", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46845", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46863", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35525" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122324", "reference_id": "2122324", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7108", "reference_id": "RHSA-2022:7108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7108" }, { "reference_url": "https://usn.ubuntu.com/5615-1/", "reference_id": "USN-5615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5615-1/" }, { "reference_url": "https://usn.ubuntu.com/5615-2/", "reference_id": "USN-5615-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5615-2/" }, { "reference_url": "https://usn.ubuntu.com/5615-3/", "reference_id": "USN-5615-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5615-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2020-35525" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sy72-yhap-vbet" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60259?format=api", "vulnerability_id": "VCID-tpxf-9kf6-dbf8", "summary": "Multiple vulnerabilities have been found in SQLite, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5018.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5018.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5018", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02719", "scoring_system": "epss", "scoring_elements": "0.85944", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02719", "scoring_system": "epss", "scoring_elements": "0.85936", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02719", "scoring_system": "epss", "scoring_elements": "0.85931", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02719", "scoring_system": "epss", "scoring_elements": "0.8595", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02719", "scoring_system": "epss", "scoring_elements": "0.85954", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02932", "scoring_system": "epss", "scoring_elements": "0.86405", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02932", "scoring_system": "epss", "scoring_elements": "0.86415", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02932", "scoring_system": "epss", "scoring_elements": "0.86428", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02932", "scoring_system": "epss", "scoring_elements": "0.86357", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02932", "scoring_system": "epss", "scoring_elements": "0.86386", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02932", "scoring_system": "epss", "scoring_elements": "0.86367", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02932", "scoring_system": "epss", "scoring_elements": "0.86385", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5018" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5018", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5018" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1708301", "reference_id": "1708301", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1708301" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928770", "reference_id": "928770", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928770" }, { "reference_url": "https://security.gentoo.org/glsa/201908-09", "reference_id": "GLSA-201908-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4442", "reference_id": "RHSA-2020:4442", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4442" }, { "reference_url": "https://usn.ubuntu.com/4205-1/", "reference_id": "USN-4205-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4205-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049482?format=api", "purl": "pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1" } ], "aliases": [ "CVE-2019-5018" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tpxf-9kf6-dbf8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31389?format=api", "vulnerability_id": "VCID-u4pu-5b5r-yqg1", "summary": "Multiple vulnerabilities have been found in SQLite, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13434.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13434.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13434", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17132", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17299", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17347", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17128", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.1722", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17277", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17255", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17207", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17147", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17085", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17091", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17127", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13434" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1841223", "reference_id": "1841223", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1841223" }, { "reference_url": "https://security.gentoo.org/glsa/202007-26", "reference_id": "GLSA-202007-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1581", "reference_id": "RHSA-2021:1581", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1581" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1968", "reference_id": "RHSA-2021:1968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16504", "reference_id": "RHSA-2025:16504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16504" }, { "reference_url": "https://usn.ubuntu.com/4394-1/", "reference_id": "USN-4394-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4394-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2020-13434" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u4pu-5b5r-yqg1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81814?format=api", "vulnerability_id": "VCID-um2g-gsw6-wydv", "summary": "sqlite: allows a crash if a sub-select uses both DISTINCT and window functions and also has certain ORDER BY usage", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19244.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19244.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19244", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36855", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36847", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48953", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48907", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48961", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48999", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.4889", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48927", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48949", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48957", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49003", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19244" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777945", "reference_id": "1777945", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777945" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946656", "reference_id": "946656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946656" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.30.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sqlite:sqlite:3.30.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.30.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19244", "reference_id": "CVE-2019-19244", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19244" }, { "reference_url": "https://usn.ubuntu.com/4205-1/", "reference_id": "USN-4205-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4205-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2019-19244" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-um2g-gsw6-wydv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45187?format=api", "vulnerability_id": "VCID-uxd9-2vze-w3ge", "summary": "Multiple vulnerabilities have been found in SQLite, allowing\n context-dependent attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3414.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3414.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3414", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90375", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90321", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90324", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90336", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.9034", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90354", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.9036", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90369", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90368", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90362", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90377", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05653", "scoring_system": "epss", "scoring_elements": "0.90376", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3414" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212353", "reference_id": "1212353", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212353" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968", "reference_id": "783968", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968" }, { "reference_url": "https://security.gentoo.org/glsa/201507-05", "reference_id": "GLSA-201507-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1635", "reference_id": "RHSA-2015:1635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1635" }, { "reference_url": "https://usn.ubuntu.com/2698-1/", "reference_id": "USN-2698-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2698-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036354?format=api", "purl": "pkg:deb/debian/sqlite3@3.8.7.1-1%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1t89-sr37-s3f6" }, { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2w6e-cvgg-pqax" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4r35-q18a-2kd2" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5kd2-8zpg-6fah" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-6w13-qjnb-xbb4" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-88s4-hq8j-dba4" }, { "vulnerability": "VCID-8d7j-g2rf-tydw" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-gprj-j4v6-z7ev" }, { "vulnerability": "VCID-hfyf-qs8x-pkba" }, { "vulnerability": "VCID-j7cb-3ptn-9qeb" }, { "vulnerability": "VCID-j97s-6d3q-2yb8" }, { "vulnerability": "VCID-jc4t-g7qn-tfc7" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-kvpm-8vj2-8qcj" }, { "vulnerability": "VCID-mqb8-wfvg-xbgz" }, { "vulnerability": "VCID-mvbm-keyp-akf1" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-q8wn-gjw8-fkhu" }, { "vulnerability": "VCID-qhcj-2nua-8kde" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-tpxf-9kf6-dbf8" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-uxd9-2vze-w3ge" }, { "vulnerability": "VCID-vchu-y7qg-pucp" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-ym2v-jfk4-q3f5" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.8.7.1-1%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049267?format=api", "purl": "pkg:deb/debian/sqlite3@3.16.2-3~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1t89-sr37-s3f6" }, { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4r35-q18a-2kd2" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5kd2-8zpg-6fah" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-88s4-hq8j-dba4" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-gprj-j4v6-z7ev" }, { "vulnerability": "VCID-hfyf-qs8x-pkba" }, { "vulnerability": "VCID-j7cb-3ptn-9qeb" }, { "vulnerability": "VCID-jc4t-g7qn-tfc7" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-mqb8-wfvg-xbgz" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-qhcj-2nua-8kde" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-tpxf-9kf6-dbf8" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-vchu-y7qg-pucp" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-ym2v-jfk4-q3f5" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-3~bpo8%252B1" } ], "aliases": [ "CVE-2015-3414" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uxd9-2vze-w3ge" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82713?format=api", "vulnerability_id": "VCID-vchu-y7qg-pucp", "summary": "sqlite: heap out-of-bound read in function rtreenode()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8457.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8457.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8457", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.26786", "scoring_system": "epss", "scoring_elements": "0.96311", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.26786", "scoring_system": "epss", "scoring_elements": "0.96319", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.26786", "scoring_system": "epss", "scoring_elements": "0.96326", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.26786", "scoring_system": "epss", "scoring_elements": "0.9633", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.26786", "scoring_system": "epss", "scoring_elements": "0.96338", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.26786", "scoring_system": "epss", "scoring_elements": "0.96342", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.26786", "scoring_system": "epss", "scoring_elements": "0.96346", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.26786", "scoring_system": "epss", "scoring_elements": "0.96345", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.26786", "scoring_system": "epss", "scoring_elements": "0.96348", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.26786", "scoring_system": "epss", "scoring_elements": "0.96356", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.26786", "scoring_system": "epss", "scoring_elements": "0.96361", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.26786", "scoring_system": "epss", "scoring_elements": "0.96363", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8457" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010974", "reference_id": "1010974", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010974" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716881", "reference_id": "1716881", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716881" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929775", "reference_id": "929775", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929775" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1810", "reference_id": "RHSA-2020:1810", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1810" }, { "reference_url": "https://usn.ubuntu.com/4004-1/", "reference_id": "USN-4004-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4004-1/" }, { "reference_url": "https://usn.ubuntu.com/4004-2/", "reference_id": "USN-4004-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4004-2/" }, { "reference_url": "https://usn.ubuntu.com/4019-1/", "reference_id": "USN-4019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-1/" }, { "reference_url": "https://usn.ubuntu.com/4019-2/", "reference_id": "USN-4019-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4019-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049482?format=api", "purl": "pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1" } ], "aliases": [ "CVE-2019-8457" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vchu-y7qg-pucp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31393?format=api", "vulnerability_id": "VCID-ye95-1dsg-afgd", "summary": "Multiple vulnerabilities have been found in SQLite, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13631.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13631.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13631", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14719", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14815", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14756", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14652", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14659", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16514", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16632", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16471", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16599", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16653", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16715", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1841568", "reference_id": "1841568", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1841568" }, { "reference_url": "https://security.gentoo.org/glsa/202007-26", "reference_id": "GLSA-202007-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4442", "reference_id": "RHSA-2020:4442", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4442" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1968", "reference_id": "RHSA-2021:1968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16504", "reference_id": "RHSA-2025:16504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16504" }, { "reference_url": "https://usn.ubuntu.com/4394-1/", "reference_id": "USN-4394-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4394-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2020-13631" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ye95-1dsg-afgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81685?format=api", "vulnerability_id": "VCID-ygnn-3qsr-kqg4", "summary": "sqlite: mishandling of certain uses of SELECT DISTINCT involving a LEFT JOIN in flattenSubquery in select.c leads to a NULL pointer dereference", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19923.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19923.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19923", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.062", "scoring_system": "epss", "scoring_elements": "0.90814", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.062", "scoring_system": "epss", "scoring_elements": "0.90887", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.062", "scoring_system": "epss", "scoring_elements": "0.90865", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.062", "scoring_system": "epss", "scoring_elements": "0.90889", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.062", "scoring_system": "epss", "scoring_elements": "0.9082", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.062", "scoring_system": "epss", "scoring_elements": "0.9083", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.062", "scoring_system": "epss", "scoring_elements": "0.90841", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.062", "scoring_system": "epss", "scoring_elements": "0.90852", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.062", "scoring_system": "epss", "scoring_elements": "0.90859", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.062", "scoring_system": "epss", "scoring_elements": "0.90867", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788846", "reference_id": "1788846", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788846" }, { "reference_url": "https://security.archlinux.org/ASA-202002-3", "reference_id": "ASA-202002-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202002-3" }, { "reference_url": "https://security.archlinux.org/AVG-1092", "reference_id": "AVG-1092", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1092" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1810", "reference_id": "RHSA-2020:1810", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1810" }, { "reference_url": "https://usn.ubuntu.com/4298-1/", "reference_id": "USN-4298-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4298-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2019-19923" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ygnn-3qsr-kqg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83587?format=api", "vulnerability_id": "VCID-ym2v-jfk4-q3f5", "summary": "sqlite: NULL pointer dereference with databases with schema corrupted with CREATE TABLE AS allows for denial of service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8740.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8740.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-8740", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12623", "scoring_system": "epss", "scoring_elements": "0.93929", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12623", "scoring_system": "epss", "scoring_elements": "0.93938", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12623", "scoring_system": "epss", "scoring_elements": "0.93947", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12623", "scoring_system": "epss", "scoring_elements": "0.93951", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12623", "scoring_system": "epss", "scoring_elements": "0.93959", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12623", "scoring_system": "epss", "scoring_elements": "0.93962", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12623", "scoring_system": "epss", "scoring_elements": "0.93966", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13527", "scoring_system": "epss", "scoring_elements": "0.94242", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.13527", "scoring_system": "epss", "scoring_elements": "0.94236", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.13527", "scoring_system": "epss", "scoring_elements": "0.94241", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-8740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558804", "reference_id": "1558804", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558804" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893195", "reference_id": "893195", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893195" }, { "reference_url": "https://usn.ubuntu.com/4205-1/", "reference_id": "USN-4205-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4205-1/" }, { "reference_url": "https://usn.ubuntu.com/4394-1/", "reference_id": "USN-4394-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4394-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049482?format=api", "purl": "pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1" } ], "aliases": [ "CVE-2018-8740" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ym2v-jfk4-q3f5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59799?format=api", "vulnerability_id": "VCID-yy9h-fptd-hkay", "summary": "Multiple vulnerabilities have been found in SQLite, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00032.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00032.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00033.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00033.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16168.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16168.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-16168", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74706", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74784", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74749", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74786", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74794", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74709", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74736", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74742", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74756", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.7478", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74759", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-16168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZARJHJJDBHI7CE5PZEBXS5HKK6HXKW2/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZARJHJJDBHI7CE5PZEBXS5HKK6HXKW2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190926-0003/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190926-0003/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200122-0003/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20200122-0003/" }, { "reference_url": "https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg116312.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg116312.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "reference_url": "https://www.sqlite.org/src/info/e4598ecbdd18bd82945f6029013296690e719a62", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.sqlite.org/src/info/e4598ecbdd18bd82945f6029013296690e719a62" }, { "reference_url": "https://www.sqlite.org/src/timeline?c=98357d8c1263920b", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.sqlite.org/src/timeline?c=98357d8c1263920b" }, { "reference_url": "https://www.tenable.com/security/tns-2021-08", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2021-08" }, { "reference_url": "https://www.tenable.com/security/tns-2021-11", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2021-11" }, { "reference_url": "https://www.tenable.com/security/tns-2021-14", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2021-14" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768986", "reference_id": "1768986", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1768986" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.3.4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_design_studio:7.3.4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.3.4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.3.5.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_design_studio:7.3.5.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.3.5.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.4.0.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_design_studio:7.4.0.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.4.0.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update231:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update231:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update231:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update231:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update231:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update231:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:nessus_agent:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tenable:nessus_agent:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:nessus_agent:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16168", "reference_id": "CVE-2019-16168", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16168" }, { "reference_url": "https://security.gentoo.org/glsa/202003-16", "reference_id": "GLSA-202003-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4442", "reference_id": "RHSA-2020:4442", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4442" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1968", "reference_id": "RHSA-2021:1968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1968" }, { "reference_url": "https://usn.ubuntu.com/4205-1/", "reference_id": "USN-4205-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4205-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049483?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3" } ], "aliases": [ "CVE-2019-16168" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yy9h-fptd-hkay" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86415?format=api", "vulnerability_id": "VCID-rf69-j7zt-xfdw", "summary": "sqlite: array overrun in the skip-scan optimization leading to memory corruption (DoS)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7443.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7443.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7443", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01273", "scoring_system": "epss", "scoring_elements": "0.7948", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01273", "scoring_system": "epss", "scoring_elements": "0.79486", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01273", "scoring_system": "epss", "scoring_elements": "0.79509", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01273", "scoring_system": "epss", "scoring_elements": "0.79496", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01273", "scoring_system": "epss", "scoring_elements": "0.79524", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01273", "scoring_system": "epss", "scoring_elements": "0.79532", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01273", "scoring_system": "epss", "scoring_elements": "0.79554", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01273", "scoring_system": "epss", "scoring_elements": "0.79537", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01273", "scoring_system": "epss", "scoring_elements": "0.79528", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01273", "scoring_system": "epss", "scoring_elements": "0.79558", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01273", "scoring_system": "epss", "scoring_elements": "0.79557", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01273", "scoring_system": "epss", "scoring_elements": "0.79561", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7443" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7443", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7443" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243476", "reference_id": "1243476", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243476" }, { "reference_url": "https://usn.ubuntu.com/2698-1/", "reference_id": "USN-2698-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2698-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036353?format=api", "purl": "pkg:deb/debian/sqlite3@3.8.7.1-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1t89-sr37-s3f6" }, { "vulnerability": "VCID-1ufy-3uwy-afgx" }, { "vulnerability": "VCID-2w6e-cvgg-pqax" }, { "vulnerability": "VCID-2xdd-xysv-sufz" }, { "vulnerability": "VCID-3686-kxzp-gbcf" }, { "vulnerability": "VCID-4r35-q18a-2kd2" }, { "vulnerability": "VCID-4u4w-a4gk-rqfx" }, { "vulnerability": "VCID-5kd2-8zpg-6fah" }, { "vulnerability": "VCID-5wf9-5w85-2ybf" }, { "vulnerability": "VCID-6w13-qjnb-xbb4" }, { "vulnerability": "VCID-7wt9-4myp-w3gu" }, { "vulnerability": "VCID-88s4-hq8j-dba4" }, { "vulnerability": "VCID-8d7j-g2rf-tydw" }, { "vulnerability": "VCID-8m3z-fgqg-4fgn" }, { "vulnerability": "VCID-9ggb-qwny-qqhb" }, { "vulnerability": "VCID-ajrb-8r3r-afe3" }, { "vulnerability": "VCID-bgz9-v5cv-8kea" }, { "vulnerability": "VCID-bxfk-dmdp-53f3" }, { "vulnerability": "VCID-chtp-rtmg-6ud5" }, { "vulnerability": "VCID-edrj-chna-ekam" }, { "vulnerability": "VCID-eu7t-2h5s-4kc5" }, { "vulnerability": "VCID-f9jg-cmg5-6ubq" }, { "vulnerability": "VCID-gb4s-4wcm-eyft" }, { "vulnerability": "VCID-gprj-j4v6-z7ev" }, { "vulnerability": "VCID-hfyf-qs8x-pkba" }, { "vulnerability": "VCID-j7cb-3ptn-9qeb" }, { "vulnerability": "VCID-j97s-6d3q-2yb8" }, { "vulnerability": "VCID-jc4t-g7qn-tfc7" }, { "vulnerability": "VCID-jqy9-zum8-aqfn" }, { "vulnerability": "VCID-jsyj-vz3p-rbae" }, { "vulnerability": "VCID-kvpm-8vj2-8qcj" }, { "vulnerability": "VCID-mqb8-wfvg-xbgz" }, { "vulnerability": "VCID-mvbm-keyp-akf1" }, { "vulnerability": "VCID-p4b6-m68m-aqeq" }, { "vulnerability": "VCID-q8wn-gjw8-fkhu" }, { "vulnerability": "VCID-qhcj-2nua-8kde" }, { "vulnerability": "VCID-r31n-5brf-ykcv" }, { "vulnerability": "VCID-sy72-yhap-vbet" }, { "vulnerability": "VCID-tpxf-9kf6-dbf8" }, { "vulnerability": "VCID-u4pu-5b5r-yqg1" }, { "vulnerability": "VCID-um2g-gsw6-wydv" }, { "vulnerability": "VCID-uxd9-2vze-w3ge" }, { "vulnerability": "VCID-vchu-y7qg-pucp" }, { "vulnerability": "VCID-ye95-1dsg-afgd" }, { "vulnerability": "VCID-ygnn-3qsr-kqg4" }, { "vulnerability": "VCID-ym2v-jfk4-q3f5" }, { "vulnerability": "VCID-yy9h-fptd-hkay" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.8.7.1-1" } ], "aliases": [ "CVE-2013-7443" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rf69-j7zt-xfdw" } ], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.8.7.1-1" }