Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/sqlite3@3.16.2-5%2Bdeb9u1
Typedeb
Namespacedebian
Namesqlite3
Version3.16.2-5+deb9u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.46.1-7+deb13u1
Latest_non_vulnerable_version3.46.1-7+deb13u1
Affected_by_vulnerabilities
0
url VCID-1t89-sr37-s3f6
vulnerability_id VCID-1t89-sr37-s3f6
summary
Multiple vulnerabilities have been found in SQLite, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5827.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5827.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5827
reference_id
reference_type
scores
0
value 0.04961
scoring_system epss
scoring_elements 0.89676
published_at 2026-04-21T12:55:00Z
1
value 0.04961
scoring_system epss
scoring_elements 0.89672
published_at 2026-04-12T12:55:00Z
2
value 0.04961
scoring_system epss
scoring_elements 0.89666
published_at 2026-04-13T12:55:00Z
3
value 0.04961
scoring_system epss
scoring_elements 0.8968
published_at 2026-04-16T12:55:00Z
4
value 0.04961
scoring_system epss
scoring_elements 0.89681
published_at 2026-04-18T12:55:00Z
5
value 0.05052
scoring_system epss
scoring_elements 0.89775
published_at 2026-04-09T12:55:00Z
6
value 0.05052
scoring_system epss
scoring_elements 0.89782
published_at 2026-04-11T12:55:00Z
7
value 0.05052
scoring_system epss
scoring_elements 0.89732
published_at 2026-04-01T12:55:00Z
8
value 0.05052
scoring_system epss
scoring_elements 0.89735
published_at 2026-04-02T12:55:00Z
9
value 0.05052
scoring_system epss
scoring_elements 0.8975
published_at 2026-04-04T12:55:00Z
10
value 0.05052
scoring_system epss
scoring_elements 0.89752
published_at 2026-04-07T12:55:00Z
11
value 0.05052
scoring_system epss
scoring_elements 0.89769
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5827
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13698
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5805
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5806
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5807
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5808
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5809
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5810
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5811
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5813
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5814
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5815
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5818
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5819
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5820
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5821
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5821
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5822
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5823
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5824
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5825
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5826
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5828
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5828
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5829
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5830
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5831
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5832
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5833
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5834
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5836
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5837
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5838
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5839
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5840
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5841
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5842
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5843
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5847
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5847
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5848
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5849
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5850
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5851
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5852
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5853
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5854
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5855
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5856
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5857
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5858
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5859
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5860
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5861
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5862
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5864
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5865
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5867
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5868
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6503
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6504
60
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1706805
reference_id 1706805
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1706805
61
reference_url https://security.gentoo.org/glsa/202003-16
reference_id GLSA-202003-16
reference_type
scores
url https://security.gentoo.org/glsa/202003-16
62
reference_url https://access.redhat.com/errata/RHSA-2019:1243
reference_id RHSA-2019:1243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1243
63
reference_url https://access.redhat.com/errata/RHSA-2021:4396
reference_id RHSA-2021:4396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4396
64
reference_url https://usn.ubuntu.com/4205-1/
reference_id USN-4205-1
reference_type
scores
url https://usn.ubuntu.com/4205-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
purl pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ufy-3uwy-afgx
1
vulnerability VCID-2xdd-xysv-sufz
2
vulnerability VCID-3686-kxzp-gbcf
3
vulnerability VCID-4u4w-a4gk-rqfx
4
vulnerability VCID-5wf9-5w85-2ybf
5
vulnerability VCID-7wt9-4myp-w3gu
6
vulnerability VCID-8m3z-fgqg-4fgn
7
vulnerability VCID-9ggb-qwny-qqhb
8
vulnerability VCID-ajrb-8r3r-afe3
9
vulnerability VCID-bgz9-v5cv-8kea
10
vulnerability VCID-bxfk-dmdp-53f3
11
vulnerability VCID-chtp-rtmg-6ud5
12
vulnerability VCID-edrj-chna-ekam
13
vulnerability VCID-eu7t-2h5s-4kc5
14
vulnerability VCID-f9jg-cmg5-6ubq
15
vulnerability VCID-gb4s-4wcm-eyft
16
vulnerability VCID-jqy9-zum8-aqfn
17
vulnerability VCID-jsyj-vz3p-rbae
18
vulnerability VCID-p4b6-m68m-aqeq
19
vulnerability VCID-r31n-5brf-ykcv
20
vulnerability VCID-sy72-yhap-vbet
21
vulnerability VCID-u4pu-5b5r-yqg1
22
vulnerability VCID-um2g-gsw6-wydv
23
vulnerability VCID-ye95-1dsg-afgd
24
vulnerability VCID-ygnn-3qsr-kqg4
25
vulnerability VCID-yy9h-fptd-hkay
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1
aliases CVE-2019-5827
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1t89-sr37-s3f6
1
url VCID-1ufy-3uwy-afgx
vulnerability_id VCID-1ufy-3uwy-afgx
summary
Multiple vulnerabilities have been found in SQLite, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13630.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13630.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13630
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22675
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.2285
published_at 2026-04-02T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22895
published_at 2026-04-04T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22687
published_at 2026-04-07T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22763
published_at 2026-04-08T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22814
published_at 2026-04-09T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22836
published_at 2026-04-11T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24785
published_at 2026-04-21T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24815
published_at 2026-04-16T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24808
published_at 2026-04-18T12:55:00Z
10
value 0.00122
scoring_system epss
scoring_elements 0.31248
published_at 2026-04-12T12:55:00Z
11
value 0.00122
scoring_system epss
scoring_elements 0.31205
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13630
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13630
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13630
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1841562
reference_id 1841562
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1841562
5
reference_url https://security.gentoo.org/glsa/202007-26
reference_id GLSA-202007-26
reference_type
scores
url https://security.gentoo.org/glsa/202007-26
6
reference_url https://access.redhat.com/errata/RHSA-2020:4442
reference_id RHSA-2020:4442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4442
7
reference_url https://access.redhat.com/errata/RHSA-2021:1968
reference_id RHSA-2021:1968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1968
8
reference_url https://access.redhat.com/errata/RHSA-2025:16504
reference_id RHSA-2025:16504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16504
9
reference_url https://usn.ubuntu.com/4394-1/
reference_id USN-4394-1
reference_type
scores
url https://usn.ubuntu.com/4394-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2020-13630
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ufy-3uwy-afgx
2
url VCID-2xdd-xysv-sufz
vulnerability_id VCID-2xdd-xysv-sufz
summary
Multiple vulnerabilities have been found in SQLite, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11656.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11656.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11656
reference_id
reference_type
scores
0
value 0.04569
scoring_system epss
scoring_elements 0.89158
published_at 2026-04-01T12:55:00Z
1
value 0.04569
scoring_system epss
scoring_elements 0.892
published_at 2026-04-08T12:55:00Z
2
value 0.04569
scoring_system epss
scoring_elements 0.89179
published_at 2026-04-04T12:55:00Z
3
value 0.04569
scoring_system epss
scoring_elements 0.89182
published_at 2026-04-07T12:55:00Z
4
value 0.04569
scoring_system epss
scoring_elements 0.89204
published_at 2026-04-09T12:55:00Z
5
value 0.04569
scoring_system epss
scoring_elements 0.89215
published_at 2026-04-11T12:55:00Z
6
value 0.04569
scoring_system epss
scoring_elements 0.89211
published_at 2026-04-12T12:55:00Z
7
value 0.04569
scoring_system epss
scoring_elements 0.89208
published_at 2026-04-13T12:55:00Z
8
value 0.04569
scoring_system epss
scoring_elements 0.89164
published_at 2026-04-02T12:55:00Z
9
value 0.06078
scoring_system epss
scoring_elements 0.90776
published_at 2026-04-21T12:55:00Z
10
value 0.06078
scoring_system epss
scoring_elements 0.9078
published_at 2026-04-16T12:55:00Z
11
value 0.06078
scoring_system epss
scoring_elements 0.90777
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11656
2
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
reference_id
reference_type
scores
url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
reference_id
reference_type
scores
url https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
6
reference_url https://security.netapp.com/advisory/ntap-20200416-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20200416-0001/
7
reference_url https://www3.sqlite.org/cgi/src/info/b64674919f673602
reference_id
reference_type
scores
url https://www3.sqlite.org/cgi/src/info/b64674919f673602
8
reference_url https://www.oracle.com/security-alerts/cpuApr2021.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuApr2021.html
9
reference_url https://www.oracle.com/security-alerts/cpujan2021.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujan2021.html
10
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2020.html
11
reference_url https://www.oracle.com/security-alerts/cpuoct2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuoct2020.html
12
reference_url https://www.sqlite.org/src/info/d09f8c3621d5f7f8
reference_id
reference_type
scores
url https://www.sqlite.org/src/info/d09f8c3621d5f7f8
13
reference_url https://www.tenable.com/security/tns-2021-14
reference_id
reference_type
scores
url https://www.tenable.com/security/tns-2021-14
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1824185
reference_id 1824185
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1824185
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-11656
reference_id CVE-2020-11656
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-11656
31
reference_url https://security.gentoo.org/glsa/202007-26
reference_id GLSA-202007-26
reference_type
scores
url https://security.gentoo.org/glsa/202007-26
32
reference_url https://access.redhat.com/errata/RHSA-2025:16504
reference_id RHSA-2025:16504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16504
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2020-11656
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2xdd-xysv-sufz
3
url VCID-3686-kxzp-gbcf
vulnerability_id VCID-3686-kxzp-gbcf
summary sqlite: mishandles certain uses of INSERT INTO in situations involving embedded '\0' characters in filenames
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19959.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19959.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19959
reference_id
reference_type
scores
0
value 0.0052
scoring_system epss
scoring_elements 0.66739
published_at 2026-04-01T12:55:00Z
1
value 0.0052
scoring_system epss
scoring_elements 0.66777
published_at 2026-04-02T12:55:00Z
2
value 0.0052
scoring_system epss
scoring_elements 0.66802
published_at 2026-04-04T12:55:00Z
3
value 0.0052
scoring_system epss
scoring_elements 0.66775
published_at 2026-04-07T12:55:00Z
4
value 0.0052
scoring_system epss
scoring_elements 0.66824
published_at 2026-04-08T12:55:00Z
5
value 0.0052
scoring_system epss
scoring_elements 0.66838
published_at 2026-04-09T12:55:00Z
6
value 0.0052
scoring_system epss
scoring_elements 0.66858
published_at 2026-04-11T12:55:00Z
7
value 0.0052
scoring_system epss
scoring_elements 0.66844
published_at 2026-04-12T12:55:00Z
8
value 0.0052
scoring_system epss
scoring_elements 0.66812
published_at 2026-04-13T12:55:00Z
9
value 0.0052
scoring_system epss
scoring_elements 0.66845
published_at 2026-04-16T12:55:00Z
10
value 0.0052
scoring_system epss
scoring_elements 0.66859
published_at 2026-04-18T12:55:00Z
11
value 0.0052
scoring_system epss
scoring_elements 0.66843
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19959
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19959
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1789595
reference_id 1789595
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1789595
5
reference_url https://access.redhat.com/errata/RHSA-2020:1810
reference_id RHSA-2020:1810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1810
6
reference_url https://usn.ubuntu.com/4298-1/
reference_id USN-4298-1
reference_type
scores
url https://usn.ubuntu.com/4298-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2019-19959
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3686-kxzp-gbcf
4
url VCID-4r35-q18a-2kd2
vulnerability_id VCID-4r35-q18a-2kd2
summary sqlite: Heap-buffer overflow in the getNodeSize function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10989.json
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10989.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10989
reference_id
reference_type
scores
0
value 0.12478
scoring_system epss
scoring_elements 0.93876
published_at 2026-04-01T12:55:00Z
1
value 0.12478
scoring_system epss
scoring_elements 0.93885
published_at 2026-04-02T12:55:00Z
2
value 0.12478
scoring_system epss
scoring_elements 0.93894
published_at 2026-04-04T12:55:00Z
3
value 0.12478
scoring_system epss
scoring_elements 0.93898
published_at 2026-04-07T12:55:00Z
4
value 0.12478
scoring_system epss
scoring_elements 0.93906
published_at 2026-04-08T12:55:00Z
5
value 0.12478
scoring_system epss
scoring_elements 0.9391
published_at 2026-04-09T12:55:00Z
6
value 0.12478
scoring_system epss
scoring_elements 0.93913
published_at 2026-04-11T12:55:00Z
7
value 0.12478
scoring_system epss
scoring_elements 0.93914
published_at 2026-04-13T12:55:00Z
8
value 0.12478
scoring_system epss
scoring_elements 0.93935
published_at 2026-04-16T12:55:00Z
9
value 0.12478
scoring_system epss
scoring_elements 0.9394
published_at 2026-04-18T12:55:00Z
10
value 0.12478
scoring_system epss
scoring_elements 0.93941
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10989
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10989
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1469672
reference_id 1469672
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1469672
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867618
reference_id 867618
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867618
6
reference_url https://usn.ubuntu.com/4019-1/
reference_id USN-4019-1
reference_type
scores
url https://usn.ubuntu.com/4019-1/
7
reference_url https://usn.ubuntu.com/4019-2/
reference_id USN-4019-2
reference_type
scores
url https://usn.ubuntu.com/4019-2/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
purl pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ufy-3uwy-afgx
1
vulnerability VCID-2xdd-xysv-sufz
2
vulnerability VCID-3686-kxzp-gbcf
3
vulnerability VCID-4u4w-a4gk-rqfx
4
vulnerability VCID-5wf9-5w85-2ybf
5
vulnerability VCID-7wt9-4myp-w3gu
6
vulnerability VCID-8m3z-fgqg-4fgn
7
vulnerability VCID-9ggb-qwny-qqhb
8
vulnerability VCID-ajrb-8r3r-afe3
9
vulnerability VCID-bgz9-v5cv-8kea
10
vulnerability VCID-bxfk-dmdp-53f3
11
vulnerability VCID-chtp-rtmg-6ud5
12
vulnerability VCID-edrj-chna-ekam
13
vulnerability VCID-eu7t-2h5s-4kc5
14
vulnerability VCID-f9jg-cmg5-6ubq
15
vulnerability VCID-gb4s-4wcm-eyft
16
vulnerability VCID-jqy9-zum8-aqfn
17
vulnerability VCID-jsyj-vz3p-rbae
18
vulnerability VCID-p4b6-m68m-aqeq
19
vulnerability VCID-r31n-5brf-ykcv
20
vulnerability VCID-sy72-yhap-vbet
21
vulnerability VCID-u4pu-5b5r-yqg1
22
vulnerability VCID-um2g-gsw6-wydv
23
vulnerability VCID-ye95-1dsg-afgd
24
vulnerability VCID-ygnn-3qsr-kqg4
25
vulnerability VCID-yy9h-fptd-hkay
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1
aliases CVE-2017-10989
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4r35-q18a-2kd2
5
url VCID-4u4w-a4gk-rqfx
vulnerability_id VCID-4u4w-a4gk-rqfx
summary sqlite: infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19645.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19645.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19645
reference_id
reference_type
scores
0
value 0.00295
scoring_system epss
scoring_elements 0.5277
published_at 2026-04-01T12:55:00Z
1
value 0.00295
scoring_system epss
scoring_elements 0.52793
published_at 2026-04-02T12:55:00Z
2
value 0.00295
scoring_system epss
scoring_elements 0.5282
published_at 2026-04-04T12:55:00Z
3
value 0.00295
scoring_system epss
scoring_elements 0.52788
published_at 2026-04-07T12:55:00Z
4
value 0.00295
scoring_system epss
scoring_elements 0.52839
published_at 2026-04-08T12:55:00Z
5
value 0.00295
scoring_system epss
scoring_elements 0.52833
published_at 2026-04-09T12:55:00Z
6
value 0.00295
scoring_system epss
scoring_elements 0.52883
published_at 2026-04-11T12:55:00Z
7
value 0.00295
scoring_system epss
scoring_elements 0.52867
published_at 2026-04-12T12:55:00Z
8
value 0.00295
scoring_system epss
scoring_elements 0.52851
published_at 2026-04-13T12:55:00Z
9
value 0.00401
scoring_system epss
scoring_elements 0.6081
published_at 2026-04-21T12:55:00Z
10
value 0.00401
scoring_system epss
scoring_elements 0.6082
published_at 2026-04-16T12:55:00Z
11
value 0.00401
scoring_system epss
scoring_elements 0.60826
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19645
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1783305
reference_id 1783305
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1783305
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946612
reference_id 946612
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946612
6
reference_url https://access.redhat.com/errata/RHSA-2025:16504
reference_id RHSA-2025:16504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16504
7
reference_url https://usn.ubuntu.com/4394-1/
reference_id USN-4394-1
reference_type
scores
url https://usn.ubuntu.com/4394-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2019-19645
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4u4w-a4gk-rqfx
6
url VCID-5kd2-8zpg-6fah
vulnerability_id VCID-5kd2-8zpg-6fah
summary sqlite: Multiple flaws in sqlite which can be triggered via corrupted internal databases (Magellan)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20505.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20505.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20505
reference_id
reference_type
scores
0
value 0.07368
scoring_system epss
scoring_elements 0.9168
published_at 2026-04-01T12:55:00Z
1
value 0.07368
scoring_system epss
scoring_elements 0.91702
published_at 2026-04-07T12:55:00Z
2
value 0.07368
scoring_system epss
scoring_elements 0.91715
published_at 2026-04-08T12:55:00Z
3
value 0.07368
scoring_system epss
scoring_elements 0.91722
published_at 2026-04-09T12:55:00Z
4
value 0.07368
scoring_system epss
scoring_elements 0.91725
published_at 2026-04-11T12:55:00Z
5
value 0.07368
scoring_system epss
scoring_elements 0.91727
published_at 2026-04-12T12:55:00Z
6
value 0.07368
scoring_system epss
scoring_elements 0.91723
published_at 2026-04-13T12:55:00Z
7
value 0.07368
scoring_system epss
scoring_elements 0.91688
published_at 2026-04-02T12:55:00Z
8
value 0.07368
scoring_system epss
scoring_elements 0.91694
published_at 2026-04-04T12:55:00Z
9
value 0.08735
scoring_system epss
scoring_elements 0.92516
published_at 2026-04-21T12:55:00Z
10
value 0.08735
scoring_system epss
scoring_elements 0.92512
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20505
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20505
3
reference_url http://seclists.org/fulldisclosure/2019/Jan/62
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Jan/62
4
reference_url http://seclists.org/fulldisclosure/2019/Jan/64
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Jan/64
5
reference_url http://seclists.org/fulldisclosure/2019/Jan/66
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Jan/66
6
reference_url http://seclists.org/fulldisclosure/2019/Jan/67
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Jan/67
7
reference_url http://seclists.org/fulldisclosure/2019/Jan/68
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Jan/68
8
reference_url http://seclists.org/fulldisclosure/2019/Jan/69
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Jan/69
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://seclists.org/bugtraq/2019/Jan/28
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jan/28
11
reference_url https://seclists.org/bugtraq/2019/Jan/29
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jan/29
12
reference_url https://seclists.org/bugtraq/2019/Jan/31
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jan/31
13
reference_url https://seclists.org/bugtraq/2019/Jan/32
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jan/32
14
reference_url https://seclists.org/bugtraq/2019/Jan/33
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jan/33
15
reference_url https://seclists.org/bugtraq/2019/Jan/39
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jan/39
16
reference_url https://security.netapp.com/advisory/ntap-20190502-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190502-0004/
17
reference_url https://sqlite.org/src/info/1a84668dcfdebaf12415d
reference_id
reference_type
scores
url https://sqlite.org/src/info/1a84668dcfdebaf12415d
18
reference_url https://support.apple.com/kb/HT209443
reference_id
reference_type
scores
url https://support.apple.com/kb/HT209443
19
reference_url https://support.apple.com/kb/HT209446
reference_id
reference_type
scores
url https://support.apple.com/kb/HT209446
20
reference_url https://support.apple.com/kb/HT209447
reference_id
reference_type
scores
url https://support.apple.com/kb/HT209447
21
reference_url https://support.apple.com/kb/HT209448
reference_id
reference_type
scores
url https://support.apple.com/kb/HT209448
22
reference_url https://support.apple.com/kb/HT209450
reference_id
reference_type
scores
url https://support.apple.com/kb/HT209450
23
reference_url https://support.apple.com/kb/HT209451
reference_id
reference_type
scores
url https://support.apple.com/kb/HT209451
24
reference_url http://www.securityfocus.com/bid/106698
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106698
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1659379
reference_id 1659379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1659379
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20505
reference_id CVE-2018-20505
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20505
34
reference_url https://usn.ubuntu.com/4019-1/
reference_id USN-4019-1
reference_type
scores
url https://usn.ubuntu.com/4019-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
purl pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ufy-3uwy-afgx
1
vulnerability VCID-2xdd-xysv-sufz
2
vulnerability VCID-3686-kxzp-gbcf
3
vulnerability VCID-4u4w-a4gk-rqfx
4
vulnerability VCID-5wf9-5w85-2ybf
5
vulnerability VCID-7wt9-4myp-w3gu
6
vulnerability VCID-8m3z-fgqg-4fgn
7
vulnerability VCID-9ggb-qwny-qqhb
8
vulnerability VCID-ajrb-8r3r-afe3
9
vulnerability VCID-bgz9-v5cv-8kea
10
vulnerability VCID-bxfk-dmdp-53f3
11
vulnerability VCID-chtp-rtmg-6ud5
12
vulnerability VCID-edrj-chna-ekam
13
vulnerability VCID-eu7t-2h5s-4kc5
14
vulnerability VCID-f9jg-cmg5-6ubq
15
vulnerability VCID-gb4s-4wcm-eyft
16
vulnerability VCID-jqy9-zum8-aqfn
17
vulnerability VCID-jsyj-vz3p-rbae
18
vulnerability VCID-p4b6-m68m-aqeq
19
vulnerability VCID-r31n-5brf-ykcv
20
vulnerability VCID-sy72-yhap-vbet
21
vulnerability VCID-u4pu-5b5r-yqg1
22
vulnerability VCID-um2g-gsw6-wydv
23
vulnerability VCID-ye95-1dsg-afgd
24
vulnerability VCID-ygnn-3qsr-kqg4
25
vulnerability VCID-yy9h-fptd-hkay
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1
aliases CVE-2018-20505
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5kd2-8zpg-6fah
7
url VCID-5wf9-5w85-2ybf
vulnerability_id VCID-5wf9-5w85-2ybf
summary sqlite: incorrect sqlite3WindowRewrite() error handling leads to mishandling certain parser-tree rewriting
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19924.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19924.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19924
reference_id
reference_type
scores
0
value 0.04739
scoring_system epss
scoring_elements 0.89369
published_at 2026-04-01T12:55:00Z
1
value 0.04739
scoring_system epss
scoring_elements 0.89373
published_at 2026-04-02T12:55:00Z
2
value 0.04739
scoring_system epss
scoring_elements 0.89384
published_at 2026-04-04T12:55:00Z
3
value 0.04739
scoring_system epss
scoring_elements 0.89386
published_at 2026-04-07T12:55:00Z
4
value 0.04739
scoring_system epss
scoring_elements 0.89402
published_at 2026-04-08T12:55:00Z
5
value 0.04739
scoring_system epss
scoring_elements 0.89406
published_at 2026-04-09T12:55:00Z
6
value 0.04739
scoring_system epss
scoring_elements 0.89414
published_at 2026-04-11T12:55:00Z
7
value 0.06298
scoring_system epss
scoring_elements 0.90976
published_at 2026-04-18T12:55:00Z
8
value 0.06298
scoring_system epss
scoring_elements 0.90955
published_at 2026-04-12T12:55:00Z
9
value 0.06298
scoring_system epss
scoring_elements 0.90954
published_at 2026-04-13T12:55:00Z
10
value 0.06298
scoring_system epss
scoring_elements 0.90978
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19924
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1788842
reference_id 1788842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1788842
5
reference_url https://access.redhat.com/errata/RHSA-2020:1810
reference_id RHSA-2020:1810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1810
6
reference_url https://usn.ubuntu.com/4298-1/
reference_id USN-4298-1
reference_type
scores
url https://usn.ubuntu.com/4298-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2019-19924
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5wf9-5w85-2ybf
8
url VCID-7wt9-4myp-w3gu
vulnerability_id VCID-7wt9-4myp-w3gu
summary sqlite: mishandling of certain SELECT statements with non-existent VIEW can lead to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19603.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19603
reference_id
reference_type
scores
0
value 0.00645
scoring_system epss
scoring_elements 0.70622
published_at 2026-04-01T12:55:00Z
1
value 0.00645
scoring_system epss
scoring_elements 0.70637
published_at 2026-04-02T12:55:00Z
2
value 0.00645
scoring_system epss
scoring_elements 0.70656
published_at 2026-04-04T12:55:00Z
3
value 0.00645
scoring_system epss
scoring_elements 0.70633
published_at 2026-04-07T12:55:00Z
4
value 0.00645
scoring_system epss
scoring_elements 0.70679
published_at 2026-04-08T12:55:00Z
5
value 0.00645
scoring_system epss
scoring_elements 0.70695
published_at 2026-04-09T12:55:00Z
6
value 0.00645
scoring_system epss
scoring_elements 0.70717
published_at 2026-04-21T12:55:00Z
7
value 0.00645
scoring_system epss
scoring_elements 0.70701
published_at 2026-04-12T12:55:00Z
8
value 0.00645
scoring_system epss
scoring_elements 0.70686
published_at 2026-04-13T12:55:00Z
9
value 0.00645
scoring_system epss
scoring_elements 0.70731
published_at 2026-04-16T12:55:00Z
10
value 0.00645
scoring_system epss
scoring_elements 0.70738
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19603
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1785318
reference_id 1785318
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1785318
5
reference_url https://access.redhat.com/errata/RHSA-2021:4396
reference_id RHSA-2021:4396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4396
6
reference_url https://usn.ubuntu.com/4394-1/
reference_id USN-4394-1
reference_type
scores
url https://usn.ubuntu.com/4394-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2019-19603
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7wt9-4myp-w3gu
9
url VCID-88s4-hq8j-dba4
vulnerability_id VCID-88s4-hq8j-dba4
summary
Multiple vulnerabilities have been found in SQLite, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9936.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9936.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9936
reference_id
reference_type
scores
0
value 0.04543
scoring_system epss
scoring_elements 0.89131
published_at 2026-04-01T12:55:00Z
1
value 0.04543
scoring_system epss
scoring_elements 0.89191
published_at 2026-04-21T12:55:00Z
2
value 0.04543
scoring_system epss
scoring_elements 0.89185
published_at 2026-04-12T12:55:00Z
3
value 0.04543
scoring_system epss
scoring_elements 0.89182
published_at 2026-04-13T12:55:00Z
4
value 0.04543
scoring_system epss
scoring_elements 0.89195
published_at 2026-04-18T12:55:00Z
5
value 0.04543
scoring_system epss
scoring_elements 0.89138
published_at 2026-04-02T12:55:00Z
6
value 0.04543
scoring_system epss
scoring_elements 0.89153
published_at 2026-04-04T12:55:00Z
7
value 0.04543
scoring_system epss
scoring_elements 0.89156
published_at 2026-04-07T12:55:00Z
8
value 0.04543
scoring_system epss
scoring_elements 0.89174
published_at 2026-04-08T12:55:00Z
9
value 0.04543
scoring_system epss
scoring_elements 0.89178
published_at 2026-04-09T12:55:00Z
10
value 0.04543
scoring_system epss
scoring_elements 0.89189
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9936
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9936
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/
8
reference_url https://security.netapp.com/advisory/ntap-20190416-0005/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190416-0005/
9
reference_url https://sqlite.org/src/info/b3fa58dd7403dbd4
reference_id
reference_type
scores
url https://sqlite.org/src/info/b3fa58dd7403dbd4
10
reference_url https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114382.html
reference_id
reference_type
scores
url https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114382.html
11
reference_url https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114394.html
reference_id
reference_type
scores
url https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114394.html
12
reference_url https://www.oracle.com/security-alerts/cpujan2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujan2020.html
13
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
14
reference_url http://www.securityfocus.com/bid/107562
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107562
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1692365
reference_id 1692365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1692365
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925289
reference_id 925289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925289
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9936
reference_id CVE-2019-9936
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-9936
19
reference_url https://security.gentoo.org/glsa/201908-09
reference_id GLSA-201908-09
reference_type
scores
url https://security.gentoo.org/glsa/201908-09
20
reference_url https://usn.ubuntu.com/4019-1/
reference_id USN-4019-1
reference_type
scores
url https://usn.ubuntu.com/4019-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
purl pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ufy-3uwy-afgx
1
vulnerability VCID-2xdd-xysv-sufz
2
vulnerability VCID-3686-kxzp-gbcf
3
vulnerability VCID-4u4w-a4gk-rqfx
4
vulnerability VCID-5wf9-5w85-2ybf
5
vulnerability VCID-7wt9-4myp-w3gu
6
vulnerability VCID-8m3z-fgqg-4fgn
7
vulnerability VCID-9ggb-qwny-qqhb
8
vulnerability VCID-ajrb-8r3r-afe3
9
vulnerability VCID-bgz9-v5cv-8kea
10
vulnerability VCID-bxfk-dmdp-53f3
11
vulnerability VCID-chtp-rtmg-6ud5
12
vulnerability VCID-edrj-chna-ekam
13
vulnerability VCID-eu7t-2h5s-4kc5
14
vulnerability VCID-f9jg-cmg5-6ubq
15
vulnerability VCID-gb4s-4wcm-eyft
16
vulnerability VCID-jqy9-zum8-aqfn
17
vulnerability VCID-jsyj-vz3p-rbae
18
vulnerability VCID-p4b6-m68m-aqeq
19
vulnerability VCID-r31n-5brf-ykcv
20
vulnerability VCID-sy72-yhap-vbet
21
vulnerability VCID-u4pu-5b5r-yqg1
22
vulnerability VCID-um2g-gsw6-wydv
23
vulnerability VCID-ye95-1dsg-afgd
24
vulnerability VCID-ygnn-3qsr-kqg4
25
vulnerability VCID-yy9h-fptd-hkay
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1
aliases CVE-2019-9936
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-88s4-hq8j-dba4
10
url VCID-8m3z-fgqg-4fgn
vulnerability_id VCID-8m3z-fgqg-4fgn
summary sqlite: invalid pointer dereference in exprListAppendList in window.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19880.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19880.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19880
reference_id
reference_type
scores
0
value 0.06395
scoring_system epss
scoring_elements 0.90977
published_at 2026-04-01T12:55:00Z
1
value 0.06395
scoring_system epss
scoring_elements 0.90982
published_at 2026-04-02T12:55:00Z
2
value 0.06395
scoring_system epss
scoring_elements 0.90991
published_at 2026-04-04T12:55:00Z
3
value 0.06395
scoring_system epss
scoring_elements 0.91001
published_at 2026-04-07T12:55:00Z
4
value 0.06395
scoring_system epss
scoring_elements 0.91013
published_at 2026-04-08T12:55:00Z
5
value 0.06395
scoring_system epss
scoring_elements 0.91019
published_at 2026-04-09T12:55:00Z
6
value 0.06395
scoring_system epss
scoring_elements 0.91027
published_at 2026-04-11T12:55:00Z
7
value 0.08438
scoring_system epss
scoring_elements 0.92355
published_at 2026-04-21T12:55:00Z
8
value 0.08438
scoring_system epss
scoring_elements 0.92347
published_at 2026-04-12T12:55:00Z
9
value 0.08438
scoring_system epss
scoring_elements 0.92345
published_at 2026-04-13T12:55:00Z
10
value 0.08438
scoring_system epss
scoring_elements 0.92356
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19880
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1787032
reference_id 1787032
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1787032
49
reference_url https://security.archlinux.org/ASA-202002-3
reference_id ASA-202002-3
reference_type
scores
url https://security.archlinux.org/ASA-202002-3
50
reference_url https://security.archlinux.org/AVG-1092
reference_id AVG-1092
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1092
51
reference_url https://usn.ubuntu.com/4298-1/
reference_id USN-4298-1
reference_type
scores
url https://usn.ubuntu.com/4298-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2019-19880
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8m3z-fgqg-4fgn
11
url VCID-9ggb-qwny-qqhb
vulnerability_id VCID-9ggb-qwny-qqhb
summary
Multiple vulnerabilities have been found in SQLite, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13632.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13632.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13632
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06449
published_at 2026-04-01T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06481
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06509
published_at 2026-04-04T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.065
published_at 2026-04-07T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.0655
published_at 2026-04-08T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06592
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06586
published_at 2026-04-11T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06578
published_at 2026-04-12T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06569
published_at 2026-04-13T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06505
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06513
published_at 2026-04-18T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06663
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13632
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13632
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1841574
reference_id 1841574
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1841574
5
reference_url https://security.gentoo.org/glsa/202007-26
reference_id GLSA-202007-26
reference_type
scores
url https://security.gentoo.org/glsa/202007-26
6
reference_url https://access.redhat.com/errata/RHSA-2020:4442
reference_id RHSA-2020:4442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4442
7
reference_url https://access.redhat.com/errata/RHSA-2021:1968
reference_id RHSA-2021:1968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1968
8
reference_url https://access.redhat.com/errata/RHSA-2025:16504
reference_id RHSA-2025:16504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16504
9
reference_url https://usn.ubuntu.com/4394-1/
reference_id USN-4394-1
reference_type
scores
url https://usn.ubuntu.com/4394-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2020-13632
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ggb-qwny-qqhb
12
url VCID-ajrb-8r3r-afe3
vulnerability_id VCID-ajrb-8r3r-afe3
summary sqlite: SQL injection in sqlite3ExprCodeTarget in expr.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19242.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19242.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19242
reference_id
reference_type
scores
0
value 0.002
scoring_system epss
scoring_elements 0.42084
published_at 2026-04-01T12:55:00Z
1
value 0.002
scoring_system epss
scoring_elements 0.42143
published_at 2026-04-02T12:55:00Z
2
value 0.002
scoring_system epss
scoring_elements 0.4217
published_at 2026-04-04T12:55:00Z
3
value 0.002
scoring_system epss
scoring_elements 0.42109
published_at 2026-04-07T12:55:00Z
4
value 0.002
scoring_system epss
scoring_elements 0.4216
published_at 2026-04-08T12:55:00Z
5
value 0.002
scoring_system epss
scoring_elements 0.42171
published_at 2026-04-09T12:55:00Z
6
value 0.002
scoring_system epss
scoring_elements 0.42194
published_at 2026-04-11T12:55:00Z
7
value 0.002
scoring_system epss
scoring_elements 0.42157
published_at 2026-04-12T12:55:00Z
8
value 0.002
scoring_system epss
scoring_elements 0.4213
published_at 2026-04-13T12:55:00Z
9
value 0.002
scoring_system epss
scoring_elements 0.42181
published_at 2026-04-16T12:55:00Z
10
value 0.002
scoring_system epss
scoring_elements 0.42156
published_at 2026-04-18T12:55:00Z
11
value 0.002
scoring_system epss
scoring_elements 0.42085
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19242
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19242
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19242
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1778867
reference_id 1778867
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1778867
5
reference_url https://usn.ubuntu.com/4205-1/
reference_id USN-4205-1
reference_type
scores
url https://usn.ubuntu.com/4205-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2019-19242
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ajrb-8r3r-afe3
13
url VCID-bgz9-v5cv-8kea
vulnerability_id VCID-bgz9-v5cv-8kea
summary A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-36690
reference_id
reference_type
scores
0
value 0.00974
scoring_system epss
scoring_elements 0.76623
published_at 2026-04-01T12:55:00Z
1
value 0.00974
scoring_system epss
scoring_elements 0.76626
published_at 2026-04-02T12:55:00Z
2
value 0.00974
scoring_system epss
scoring_elements 0.76655
published_at 2026-04-04T12:55:00Z
3
value 0.00974
scoring_system epss
scoring_elements 0.76636
published_at 2026-04-07T12:55:00Z
4
value 0.00974
scoring_system epss
scoring_elements 0.76669
published_at 2026-04-08T12:55:00Z
5
value 0.0172
scoring_system epss
scoring_elements 0.82401
published_at 2026-04-12T12:55:00Z
6
value 0.0172
scoring_system epss
scoring_elements 0.8243
published_at 2026-04-18T12:55:00Z
7
value 0.0172
scoring_system epss
scoring_elements 0.82435
published_at 2026-04-21T12:55:00Z
8
value 0.0172
scoring_system epss
scoring_elements 0.82386
published_at 2026-04-09T12:55:00Z
9
value 0.0172
scoring_system epss
scoring_elements 0.82405
published_at 2026-04-11T12:55:00Z
10
value 0.0172
scoring_system epss
scoring_elements 0.82395
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-36690
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.archlinux.org/AVG-2318
reference_id AVG-2318
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2318
4
reference_url https://security.archlinux.org/AVG-2319
reference_id AVG-2319
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2319
5
reference_url https://usn.ubuntu.com/5403-1/
reference_id USN-5403-1
reference_type
scores
url https://usn.ubuntu.com/5403-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2
purl pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k32-4p92-1ygz
1
vulnerability VCID-6xmb-3zgw-xudu
2
vulnerability VCID-jree-ndwj-kfcy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2
aliases CVE-2021-36690
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bgz9-v5cv-8kea
14
url VCID-bxfk-dmdp-53f3
vulnerability_id VCID-bxfk-dmdp-53f3
summary A vulnerability in SQLite could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20227.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20227.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20227
reference_id
reference_type
scores
0
value 0.0021
scoring_system epss
scoring_elements 0.43493
published_at 2026-04-01T12:55:00Z
1
value 0.0021
scoring_system epss
scoring_elements 0.43554
published_at 2026-04-02T12:55:00Z
2
value 0.0021
scoring_system epss
scoring_elements 0.43581
published_at 2026-04-04T12:55:00Z
3
value 0.0021
scoring_system epss
scoring_elements 0.43519
published_at 2026-04-07T12:55:00Z
4
value 0.0021
scoring_system epss
scoring_elements 0.4357
published_at 2026-04-08T12:55:00Z
5
value 0.0021
scoring_system epss
scoring_elements 0.43584
published_at 2026-04-09T12:55:00Z
6
value 0.0021
scoring_system epss
scoring_elements 0.43602
published_at 2026-04-11T12:55:00Z
7
value 0.0021
scoring_system epss
scoring_elements 0.43572
published_at 2026-04-12T12:55:00Z
8
value 0.0021
scoring_system epss
scoring_elements 0.43556
published_at 2026-04-13T12:55:00Z
9
value 0.0021
scoring_system epss
scoring_elements 0.43616
published_at 2026-04-16T12:55:00Z
10
value 0.0021
scoring_system epss
scoring_elements 0.43605
published_at 2026-04-18T12:55:00Z
11
value 0.0021
scoring_system epss
scoring_elements 0.43541
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20227
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20227
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20227
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1924886
reference_id 1924886
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1924886
4
reference_url https://security.archlinux.org/AVG-1536
reference_id AVG-1536
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1536
5
reference_url https://security.gentoo.org/glsa/202103-04
reference_id GLSA-202103-04
reference_type
scores
url https://security.gentoo.org/glsa/202103-04
6
reference_url https://usn.ubuntu.com/4732-1/
reference_id USN-4732-1
reference_type
scores
url https://usn.ubuntu.com/4732-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2021-20227
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bxfk-dmdp-53f3
15
url VCID-chtp-rtmg-6ud5
vulnerability_id VCID-chtp-rtmg-6ud5
summary
Multiple vulnerabilities have been found in SQLite, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15358.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15358.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15358
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11073
published_at 2026-04-01T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.11216
published_at 2026-04-02T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.11279
published_at 2026-04-04T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.11092
published_at 2026-04-07T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.11171
published_at 2026-04-08T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11228
published_at 2026-04-09T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11237
published_at 2026-04-11T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11205
published_at 2026-04-12T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.11179
published_at 2026-04-13T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.11044
published_at 2026-04-16T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.11053
published_at 2026-04-18T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.11185
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15358
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1851957
reference_id 1851957
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1851957
5
reference_url https://security.gentoo.org/glsa/202007-26
reference_id GLSA-202007-26
reference_type
scores
url https://security.gentoo.org/glsa/202007-26
6
reference_url https://access.redhat.com/errata/RHSA-2021:1581
reference_id RHSA-2021:1581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1581
7
reference_url https://usn.ubuntu.com/4438-1/
reference_id USN-4438-1
reference_type
scores
url https://usn.ubuntu.com/4438-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2020-15358
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-chtp-rtmg-6ud5
16
url VCID-edrj-chna-ekam
vulnerability_id VCID-edrj-chna-ekam
summary sqlite: Out of bounds access during table rename
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35527.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35527.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35527
reference_id
reference_type
scores
0
value 0.00253
scoring_system epss
scoring_elements 0.48646
published_at 2026-04-21T12:55:00Z
1
value 0.00253
scoring_system epss
scoring_elements 0.48632
published_at 2026-04-12T12:55:00Z
2
value 0.00253
scoring_system epss
scoring_elements 0.48644
published_at 2026-04-13T12:55:00Z
3
value 0.00253
scoring_system epss
scoring_elements 0.48693
published_at 2026-04-16T12:55:00Z
4
value 0.00253
scoring_system epss
scoring_elements 0.48689
published_at 2026-04-18T12:55:00Z
5
value 0.00275
scoring_system epss
scoring_elements 0.5098
published_at 2026-04-08T12:55:00Z
6
value 0.00275
scoring_system epss
scoring_elements 0.50978
published_at 2026-04-09T12:55:00Z
7
value 0.00275
scoring_system epss
scoring_elements 0.5102
published_at 2026-04-11T12:55:00Z
8
value 0.00275
scoring_system epss
scoring_elements 0.50887
published_at 2026-04-01T12:55:00Z
9
value 0.00275
scoring_system epss
scoring_elements 0.50923
published_at 2026-04-07T12:55:00Z
10
value 0.00275
scoring_system epss
scoring_elements 0.5094
published_at 2026-04-02T12:55:00Z
11
value 0.00275
scoring_system epss
scoring_elements 0.50965
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35527
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35527
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2122329
reference_id 2122329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2122329
5
reference_url https://access.redhat.com/errata/RHSA-2022:7108
reference_id RHSA-2022:7108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7108
6
reference_url https://usn.ubuntu.com/5615-1/
reference_id USN-5615-1
reference_type
scores
url https://usn.ubuntu.com/5615-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2020-35527
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-edrj-chna-ekam
17
url VCID-eu7t-2h5s-4kc5
vulnerability_id VCID-eu7t-2h5s-4kc5
summary
Multiple vulnerabilities have been found in SQLite, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13871.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13871.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13871
reference_id
reference_type
scores
0
value 0.02437
scoring_system epss
scoring_elements 0.85095
published_at 2026-04-01T12:55:00Z
1
value 0.02437
scoring_system epss
scoring_elements 0.85107
published_at 2026-04-02T12:55:00Z
2
value 0.02437
scoring_system epss
scoring_elements 0.85124
published_at 2026-04-04T12:55:00Z
3
value 0.02437
scoring_system epss
scoring_elements 0.85128
published_at 2026-04-07T12:55:00Z
4
value 0.02437
scoring_system epss
scoring_elements 0.8515
published_at 2026-04-08T12:55:00Z
5
value 0.02437
scoring_system epss
scoring_elements 0.85157
published_at 2026-04-09T12:55:00Z
6
value 0.02437
scoring_system epss
scoring_elements 0.85171
published_at 2026-04-11T12:55:00Z
7
value 0.02437
scoring_system epss
scoring_elements 0.85169
published_at 2026-04-12T12:55:00Z
8
value 0.02437
scoring_system epss
scoring_elements 0.85166
published_at 2026-04-13T12:55:00Z
9
value 0.02437
scoring_system epss
scoring_elements 0.85187
published_at 2026-04-21T12:55:00Z
10
value 0.02437
scoring_system epss
scoring_elements 0.85188
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13871
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13871
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1845576
reference_id 1845576
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1845576
4
reference_url https://security.archlinux.org/ASA-202006-11
reference_id ASA-202006-11
reference_type
scores
url https://security.archlinux.org/ASA-202006-11
5
reference_url https://security.archlinux.org/AVG-1182
reference_id AVG-1182
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1182
6
reference_url https://security.gentoo.org/glsa/202007-26
reference_id GLSA-202007-26
reference_type
scores
url https://security.gentoo.org/glsa/202007-26
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2020-13871
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eu7t-2h5s-4kc5
18
url VCID-f9jg-cmg5-6ubq
vulnerability_id VCID-f9jg-cmg5-6ubq
summary
Multiple vulnerabilities have been found in SQLite, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9327.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9327.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9327
reference_id
reference_type
scores
0
value 0.00701
scoring_system epss
scoring_elements 0.71984
published_at 2026-04-01T12:55:00Z
1
value 0.00701
scoring_system epss
scoring_elements 0.71992
published_at 2026-04-02T12:55:00Z
2
value 0.00701
scoring_system epss
scoring_elements 0.72012
published_at 2026-04-04T12:55:00Z
3
value 0.00701
scoring_system epss
scoring_elements 0.71987
published_at 2026-04-07T12:55:00Z
4
value 0.00701
scoring_system epss
scoring_elements 0.72026
published_at 2026-04-08T12:55:00Z
5
value 0.00701
scoring_system epss
scoring_elements 0.72039
published_at 2026-04-09T12:55:00Z
6
value 0.00701
scoring_system epss
scoring_elements 0.72063
published_at 2026-04-11T12:55:00Z
7
value 0.00951
scoring_system epss
scoring_elements 0.76405
published_at 2026-04-21T12:55:00Z
8
value 0.00951
scoring_system epss
scoring_elements 0.76379
published_at 2026-04-12T12:55:00Z
9
value 0.00951
scoring_system epss
scoring_elements 0.76374
published_at 2026-04-13T12:55:00Z
10
value 0.00951
scoring_system epss
scoring_elements 0.76414
published_at 2026-04-16T12:55:00Z
11
value 0.00951
scoring_system epss
scoring_elements 0.76421
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9327
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9327
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9327
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1809315
reference_id 1809315
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1809315
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951835
reference_id 951835
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951835
6
reference_url https://security.gentoo.org/glsa/202003-16
reference_id GLSA-202003-16
reference_type
scores
url https://security.gentoo.org/glsa/202003-16
7
reference_url https://access.redhat.com/errata/RHSA-2020:4442
reference_id RHSA-2020:4442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4442
8
reference_url https://usn.ubuntu.com/4298-1/
reference_id USN-4298-1
reference_type
scores
url https://usn.ubuntu.com/4298-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2020-9327
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f9jg-cmg5-6ubq
19
url VCID-gb4s-4wcm-eyft
vulnerability_id VCID-gb4s-4wcm-eyft
summary
Multiple vulnerabilities have been found in SQLite, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20218.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20218.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-20218
reference_id
reference_type
scores
0
value 0.00402
scoring_system epss
scoring_elements 0.60668
published_at 2026-04-01T12:55:00Z
1
value 0.00402
scoring_system epss
scoring_elements 0.60742
published_at 2026-04-02T12:55:00Z
2
value 0.00402
scoring_system epss
scoring_elements 0.60771
published_at 2026-04-04T12:55:00Z
3
value 0.00402
scoring_system epss
scoring_elements 0.60735
published_at 2026-04-07T12:55:00Z
4
value 0.00402
scoring_system epss
scoring_elements 0.60784
published_at 2026-04-08T12:55:00Z
5
value 0.00402
scoring_system epss
scoring_elements 0.60799
published_at 2026-04-09T12:55:00Z
6
value 0.00402
scoring_system epss
scoring_elements 0.6082
published_at 2026-04-11T12:55:00Z
7
value 0.00402
scoring_system epss
scoring_elements 0.60807
published_at 2026-04-12T12:55:00Z
8
value 0.00402
scoring_system epss
scoring_elements 0.60788
published_at 2026-04-13T12:55:00Z
9
value 0.00402
scoring_system epss
scoring_elements 0.60831
published_at 2026-04-16T12:55:00Z
10
value 0.00402
scoring_system epss
scoring_elements 0.60836
published_at 2026-04-18T12:55:00Z
11
value 0.00402
scoring_system epss
scoring_elements 0.60821
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-20218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20218
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1791313
reference_id 1791313
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1791313
5
reference_url https://security.gentoo.org/glsa/202007-26
reference_id GLSA-202007-26
reference_type
scores
url https://security.gentoo.org/glsa/202007-26
6
reference_url https://access.redhat.com/errata/RHSA-2020:4442
reference_id RHSA-2020:4442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4442
7
reference_url https://usn.ubuntu.com/4298-1/
reference_id USN-4298-1
reference_type
scores
url https://usn.ubuntu.com/4298-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2019-20218
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gb4s-4wcm-eyft
20
url VCID-gprj-j4v6-z7ev
vulnerability_id VCID-gprj-j4v6-z7ev
summary sqlite: Multiple flaws in sqlite which can be triggered via corrupted internal databases (Magellan)
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20506.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20506.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20506
reference_id
reference_type
scores
0
value 0.08492
scoring_system epss
scoring_elements 0.92331
published_at 2026-04-01T12:55:00Z
1
value 0.08492
scoring_system epss
scoring_elements 0.92382
published_at 2026-04-21T12:55:00Z
2
value 0.08492
scoring_system epss
scoring_elements 0.92369
published_at 2026-04-13T12:55:00Z
3
value 0.08492
scoring_system epss
scoring_elements 0.92371
published_at 2026-04-12T12:55:00Z
4
value 0.08492
scoring_system epss
scoring_elements 0.9238
published_at 2026-04-18T12:55:00Z
5
value 0.08492
scoring_system epss
scoring_elements 0.92338
published_at 2026-04-02T12:55:00Z
6
value 0.08492
scoring_system epss
scoring_elements 0.92344
published_at 2026-04-04T12:55:00Z
7
value 0.08492
scoring_system epss
scoring_elements 0.92347
published_at 2026-04-07T12:55:00Z
8
value 0.08492
scoring_system epss
scoring_elements 0.92359
published_at 2026-04-08T12:55:00Z
9
value 0.08492
scoring_system epss
scoring_elements 0.92363
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20506
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20506
4
reference_url http://seclists.org/fulldisclosure/2019/Jan/62
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Jan/62
5
reference_url http://seclists.org/fulldisclosure/2019/Jan/64
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Jan/64
6
reference_url http://seclists.org/fulldisclosure/2019/Jan/66
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Jan/66
7
reference_url http://seclists.org/fulldisclosure/2019/Jan/67
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Jan/67
8
reference_url http://seclists.org/fulldisclosure/2019/Jan/68
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Jan/68
9
reference_url http://seclists.org/fulldisclosure/2019/Jan/69
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2019/Jan/69
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10365
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10365
12
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
13
reference_url https://seclists.org/bugtraq/2019/Jan/28
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jan/28
14
reference_url https://seclists.org/bugtraq/2019/Jan/29
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jan/29
15
reference_url https://seclists.org/bugtraq/2019/Jan/31
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jan/31
16
reference_url https://seclists.org/bugtraq/2019/Jan/32
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jan/32
17
reference_url https://seclists.org/bugtraq/2019/Jan/33
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jan/33
18
reference_url https://seclists.org/bugtraq/2019/Jan/39
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Jan/39
19
reference_url https://security.netapp.com/advisory/ntap-20190502-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190502-0004/
20
reference_url https://sqlite.org/src/info/940f2adc8541a838
reference_id
reference_type
scores
url https://sqlite.org/src/info/940f2adc8541a838
21
reference_url https://support.apple.com/kb/HT209443
reference_id
reference_type
scores
url https://support.apple.com/kb/HT209443
22
reference_url https://support.apple.com/kb/HT209446
reference_id
reference_type
scores
url https://support.apple.com/kb/HT209446
23
reference_url https://support.apple.com/kb/HT209447
reference_id
reference_type
scores
url https://support.apple.com/kb/HT209447
24
reference_url https://support.apple.com/kb/HT209448
reference_id
reference_type
scores
url https://support.apple.com/kb/HT209448
25
reference_url https://support.apple.com/kb/HT209450
reference_id
reference_type
scores
url https://support.apple.com/kb/HT209450
26
reference_url https://support.apple.com/kb/HT209451
reference_id
reference_type
scores
url https://support.apple.com/kb/HT209451
27
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
28
reference_url http://www.securityfocus.com/bid/106698
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106698
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1659379
reference_id 1659379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1659379
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20506
reference_id CVE-2018-20506
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20506
40
reference_url https://usn.ubuntu.com/4019-1/
reference_id USN-4019-1
reference_type
scores
url https://usn.ubuntu.com/4019-1/
41
reference_url https://usn.ubuntu.com/4019-2/
reference_id USN-4019-2
reference_type
scores
url https://usn.ubuntu.com/4019-2/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
purl pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ufy-3uwy-afgx
1
vulnerability VCID-2xdd-xysv-sufz
2
vulnerability VCID-3686-kxzp-gbcf
3
vulnerability VCID-4u4w-a4gk-rqfx
4
vulnerability VCID-5wf9-5w85-2ybf
5
vulnerability VCID-7wt9-4myp-w3gu
6
vulnerability VCID-8m3z-fgqg-4fgn
7
vulnerability VCID-9ggb-qwny-qqhb
8
vulnerability VCID-ajrb-8r3r-afe3
9
vulnerability VCID-bgz9-v5cv-8kea
10
vulnerability VCID-bxfk-dmdp-53f3
11
vulnerability VCID-chtp-rtmg-6ud5
12
vulnerability VCID-edrj-chna-ekam
13
vulnerability VCID-eu7t-2h5s-4kc5
14
vulnerability VCID-f9jg-cmg5-6ubq
15
vulnerability VCID-gb4s-4wcm-eyft
16
vulnerability VCID-jqy9-zum8-aqfn
17
vulnerability VCID-jsyj-vz3p-rbae
18
vulnerability VCID-p4b6-m68m-aqeq
19
vulnerability VCID-r31n-5brf-ykcv
20
vulnerability VCID-sy72-yhap-vbet
21
vulnerability VCID-u4pu-5b5r-yqg1
22
vulnerability VCID-um2g-gsw6-wydv
23
vulnerability VCID-ye95-1dsg-afgd
24
vulnerability VCID-ygnn-3qsr-kqg4
25
vulnerability VCID-yy9h-fptd-hkay
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1
aliases CVE-2018-20506
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gprj-j4v6-z7ev
21
url VCID-hfyf-qs8x-pkba
vulnerability_id VCID-hfyf-qs8x-pkba
summary sqlite: Local DoS via dump_callback function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13685.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13685.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13685
reference_id
reference_type
scores
0
value 0.00397
scoring_system epss
scoring_elements 0.60434
published_at 2026-04-01T12:55:00Z
1
value 0.00397
scoring_system epss
scoring_elements 0.60591
published_at 2026-04-21T12:55:00Z
2
value 0.00397
scoring_system epss
scoring_elements 0.60597
published_at 2026-04-16T12:55:00Z
3
value 0.00397
scoring_system epss
scoring_elements 0.60603
published_at 2026-04-18T12:55:00Z
4
value 0.00397
scoring_system epss
scoring_elements 0.60509
published_at 2026-04-02T12:55:00Z
5
value 0.00397
scoring_system epss
scoring_elements 0.60536
published_at 2026-04-04T12:55:00Z
6
value 0.00397
scoring_system epss
scoring_elements 0.60506
published_at 2026-04-07T12:55:00Z
7
value 0.00397
scoring_system epss
scoring_elements 0.60554
published_at 2026-04-08T12:55:00Z
8
value 0.00397
scoring_system epss
scoring_elements 0.60571
published_at 2026-04-09T12:55:00Z
9
value 0.00397
scoring_system epss
scoring_elements 0.60592
published_at 2026-04-11T12:55:00Z
10
value 0.00397
scoring_system epss
scoring_elements 0.60577
published_at 2026-04-12T12:55:00Z
11
value 0.00397
scoring_system epss
scoring_elements 0.60556
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13685
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1488881
reference_id 1488881
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1488881
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873762
reference_id 873762
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873762
6
reference_url https://usn.ubuntu.com/4019-1/
reference_id USN-4019-1
reference_type
scores
url https://usn.ubuntu.com/4019-1/
7
reference_url https://usn.ubuntu.com/4019-2/
reference_id USN-4019-2
reference_type
scores
url https://usn.ubuntu.com/4019-2/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
purl pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ufy-3uwy-afgx
1
vulnerability VCID-2xdd-xysv-sufz
2
vulnerability VCID-3686-kxzp-gbcf
3
vulnerability VCID-4u4w-a4gk-rqfx
4
vulnerability VCID-5wf9-5w85-2ybf
5
vulnerability VCID-7wt9-4myp-w3gu
6
vulnerability VCID-8m3z-fgqg-4fgn
7
vulnerability VCID-9ggb-qwny-qqhb
8
vulnerability VCID-ajrb-8r3r-afe3
9
vulnerability VCID-bgz9-v5cv-8kea
10
vulnerability VCID-bxfk-dmdp-53f3
11
vulnerability VCID-chtp-rtmg-6ud5
12
vulnerability VCID-edrj-chna-ekam
13
vulnerability VCID-eu7t-2h5s-4kc5
14
vulnerability VCID-f9jg-cmg5-6ubq
15
vulnerability VCID-gb4s-4wcm-eyft
16
vulnerability VCID-jqy9-zum8-aqfn
17
vulnerability VCID-jsyj-vz3p-rbae
18
vulnerability VCID-p4b6-m68m-aqeq
19
vulnerability VCID-r31n-5brf-ykcv
20
vulnerability VCID-sy72-yhap-vbet
21
vulnerability VCID-u4pu-5b5r-yqg1
22
vulnerability VCID-um2g-gsw6-wydv
23
vulnerability VCID-ye95-1dsg-afgd
24
vulnerability VCID-ygnn-3qsr-kqg4
25
vulnerability VCID-yy9h-fptd-hkay
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1
aliases CVE-2017-13685
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hfyf-qs8x-pkba
22
url VCID-j7cb-3ptn-9qeb
vulnerability_id VCID-j7cb-3ptn-9qeb
summary sqlite: Crash due to misuse of window functions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24736.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24736.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24736
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06746
published_at 2026-04-01T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06823
published_at 2026-04-02T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06853
published_at 2026-04-07T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06867
published_at 2026-04-04T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06908
published_at 2026-04-08T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06938
published_at 2026-04-09T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06935
published_at 2026-04-11T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07435
published_at 2026-04-13T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07361
published_at 2026-04-16T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07348
published_at 2026-04-18T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07475
published_at 2026-04-21T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07446
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24736
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24736
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2186385
reference_id 2186385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2186385
4
reference_url https://www.sqlite.org/src/info/4feb3159c6bc3f7e33959
reference_id 4feb3159c6bc3f7e33959
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T17:30:13Z/
url https://www.sqlite.org/src/info/4feb3159c6bc3f7e33959
5
reference_url https://security.netapp.com/advisory/ntap-20230526-0005/
reference_id ntap-20230526-0005
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T17:30:13Z/
url https://security.netapp.com/advisory/ntap-20230526-0005/
6
reference_url https://access.redhat.com/errata/RHSA-2023:3840
reference_id RHSA-2023:3840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3840
7
reference_url https://access.redhat.com/errata/RHSA-2024:0425
reference_id RHSA-2024:0425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0425
fixed_packages
0
url pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
purl pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ufy-3uwy-afgx
1
vulnerability VCID-2xdd-xysv-sufz
2
vulnerability VCID-3686-kxzp-gbcf
3
vulnerability VCID-4u4w-a4gk-rqfx
4
vulnerability VCID-5wf9-5w85-2ybf
5
vulnerability VCID-7wt9-4myp-w3gu
6
vulnerability VCID-8m3z-fgqg-4fgn
7
vulnerability VCID-9ggb-qwny-qqhb
8
vulnerability VCID-ajrb-8r3r-afe3
9
vulnerability VCID-bgz9-v5cv-8kea
10
vulnerability VCID-bxfk-dmdp-53f3
11
vulnerability VCID-chtp-rtmg-6ud5
12
vulnerability VCID-edrj-chna-ekam
13
vulnerability VCID-eu7t-2h5s-4kc5
14
vulnerability VCID-f9jg-cmg5-6ubq
15
vulnerability VCID-gb4s-4wcm-eyft
16
vulnerability VCID-jqy9-zum8-aqfn
17
vulnerability VCID-jsyj-vz3p-rbae
18
vulnerability VCID-p4b6-m68m-aqeq
19
vulnerability VCID-r31n-5brf-ykcv
20
vulnerability VCID-sy72-yhap-vbet
21
vulnerability VCID-u4pu-5b5r-yqg1
22
vulnerability VCID-um2g-gsw6-wydv
23
vulnerability VCID-ye95-1dsg-afgd
24
vulnerability VCID-ygnn-3qsr-kqg4
25
vulnerability VCID-yy9h-fptd-hkay
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1
aliases CVE-2020-24736
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7cb-3ptn-9qeb
23
url VCID-jc4t-g7qn-tfc7
vulnerability_id VCID-jc4t-g7qn-tfc7
summary
A vulnerability in SQLite may allow for the remote execution of
    code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html
2
reference_url https://access.redhat.com/articles/3758321
reference_id
reference_type
scores
url https://access.redhat.com/articles/3758321
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20346.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20346.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20346
reference_id
reference_type
scores
0
value 0.13215
scoring_system epss
scoring_elements 0.941
published_at 2026-04-01T12:55:00Z
1
value 0.13215
scoring_system epss
scoring_elements 0.94161
published_at 2026-04-21T12:55:00Z
2
value 0.13215
scoring_system epss
scoring_elements 0.94142
published_at 2026-04-13T12:55:00Z
3
value 0.13215
scoring_system epss
scoring_elements 0.94141
published_at 2026-04-12T12:55:00Z
4
value 0.13215
scoring_system epss
scoring_elements 0.94157
published_at 2026-04-16T12:55:00Z
5
value 0.13215
scoring_system epss
scoring_elements 0.94162
published_at 2026-04-18T12:55:00Z
6
value 0.13215
scoring_system epss
scoring_elements 0.94109
published_at 2026-04-02T12:55:00Z
7
value 0.13215
scoring_system epss
scoring_elements 0.94121
published_at 2026-04-04T12:55:00Z
8
value 0.13215
scoring_system epss
scoring_elements 0.94124
published_at 2026-04-07T12:55:00Z
9
value 0.13215
scoring_system epss
scoring_elements 0.94133
published_at 2026-04-08T12:55:00Z
10
value 0.13215
scoring_system epss
scoring_elements 0.94137
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20346
5
reference_url https://blade.tencent.com/magellan/index_en.html
reference_id
reference_type
scores
url https://blade.tencent.com/magellan/index_en.html
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1659677
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1659677
7
reference_url https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
reference_id
reference_type
scores
url https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
8
reference_url https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e
reference_id
reference_type
scores
url https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e
9
reference_url https://crbug.com/900910
reference_id
reference_type
scores
url https://crbug.com/900910
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17480
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17481
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18336
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18336
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18337
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18337
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18338
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18339
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18339
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18340
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18341
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18342
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18343
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18344
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18345
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18346
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18347
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18348
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18349
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18350
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18351
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18352
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18353
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18354
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18355
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18357
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18358
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18359
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20065
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20066
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20067
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20068
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20070
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346
43
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
44
reference_url https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html
reference_id
reference_type
scores
url https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html
45
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10365
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10365
46
reference_url https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html
47
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
48
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/
49
reference_url https://news.ycombinator.com/item?id=18685296
reference_id
reference_type
scores
url https://news.ycombinator.com/item?id=18685296
50
reference_url https://sqlite.org/src/info/940f2adc8541a838
reference_id
reference_type
scores
url https://sqlite.org/src/info/940f2adc8541a838
51
reference_url https://sqlite.org/src/info/d44318f59044162e
reference_id
reference_type
scores
url https://sqlite.org/src/info/d44318f59044162e
52
reference_url https://support.apple.com/HT209443
reference_id
reference_type
scores
url https://support.apple.com/HT209443
53
reference_url https://support.apple.com/HT209446
reference_id
reference_type
scores
url https://support.apple.com/HT209446
54
reference_url https://support.apple.com/HT209447
reference_id
reference_type
scores
url https://support.apple.com/HT209447
55
reference_url https://support.apple.com/HT209448
reference_id
reference_type
scores
url https://support.apple.com/HT209448
56
reference_url https://support.apple.com/HT209450
reference_id
reference_type
scores
url https://support.apple.com/HT209450
57
reference_url https://support.apple.com/HT209451
reference_id
reference_type
scores
url https://support.apple.com/HT209451
58
reference_url https://worthdoingbadly.com/sqlitebug/
reference_id
reference_type
scores
url https://worthdoingbadly.com/sqlitebug/
59
reference_url https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc
reference_id
reference_type
scores
url https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc
60
reference_url https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg113218.html
reference_id
reference_type
scores
url https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg113218.html
61
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
62
reference_url https://www.sqlite.org/releaselog/3_25_3.html
reference_id
reference_type
scores
url https://www.sqlite.org/releaselog/3_25_3.html
63
reference_url https://www.synology.com/security/advisory/Synology_SA_18_61
reference_id
reference_type
scores
url https://www.synology.com/security/advisory/Synology_SA_18_61
64
reference_url http://www.securityfocus.com/bid/106323
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106323
65
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1659379
reference_id 1659379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1659379
66
reference_url https://security.archlinux.org/AVG-840
reference_id AVG-840
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-840
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20346
reference_id CVE-2018-20346
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-20346
74
reference_url https://security.gentoo.org/glsa/201904-21
reference_id GLSA-201904-21
reference_type
scores
url https://security.gentoo.org/glsa/201904-21
75
reference_url https://usn.ubuntu.com/4019-1/
reference_id USN-4019-1
reference_type
scores
url https://usn.ubuntu.com/4019-1/
76
reference_url https://usn.ubuntu.com/4019-2/
reference_id USN-4019-2
reference_type
scores
url https://usn.ubuntu.com/4019-2/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
purl pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ufy-3uwy-afgx
1
vulnerability VCID-2xdd-xysv-sufz
2
vulnerability VCID-3686-kxzp-gbcf
3
vulnerability VCID-4u4w-a4gk-rqfx
4
vulnerability VCID-5wf9-5w85-2ybf
5
vulnerability VCID-7wt9-4myp-w3gu
6
vulnerability VCID-8m3z-fgqg-4fgn
7
vulnerability VCID-9ggb-qwny-qqhb
8
vulnerability VCID-ajrb-8r3r-afe3
9
vulnerability VCID-bgz9-v5cv-8kea
10
vulnerability VCID-bxfk-dmdp-53f3
11
vulnerability VCID-chtp-rtmg-6ud5
12
vulnerability VCID-edrj-chna-ekam
13
vulnerability VCID-eu7t-2h5s-4kc5
14
vulnerability VCID-f9jg-cmg5-6ubq
15
vulnerability VCID-gb4s-4wcm-eyft
16
vulnerability VCID-jqy9-zum8-aqfn
17
vulnerability VCID-jsyj-vz3p-rbae
18
vulnerability VCID-p4b6-m68m-aqeq
19
vulnerability VCID-r31n-5brf-ykcv
20
vulnerability VCID-sy72-yhap-vbet
21
vulnerability VCID-u4pu-5b5r-yqg1
22
vulnerability VCID-um2g-gsw6-wydv
23
vulnerability VCID-ye95-1dsg-afgd
24
vulnerability VCID-ygnn-3qsr-kqg4
25
vulnerability VCID-yy9h-fptd-hkay
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1
aliases CVE-2018-20346
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jc4t-g7qn-tfc7
24
url VCID-jqy9-zum8-aqfn
vulnerability_id VCID-jqy9-zum8-aqfn
summary sqlite: heap-buffer-overflow at sessionfuzz
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7104.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7104.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-7104
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.32443
published_at 2026-04-02T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32329
published_at 2026-04-18T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.32478
published_at 2026-04-04T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32302
published_at 2026-04-21T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32351
published_at 2026-04-08T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.32379
published_at 2026-04-09T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.3238
published_at 2026-04-11T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32343
published_at 2026-04-12T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32316
published_at 2026-04-13T12:55:00Z
9
value 0.00129
scoring_system epss
scoring_elements 0.32352
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-7104
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7104
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://sqlite.org/src/info/0e4e7a05c4204b47
reference_id 0e4e7a05c4204b47
reference_type
scores
0
value 5.2
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:S/C:P/I:P/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/
url https://sqlite.org/src/info/0e4e7a05c4204b47
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256194
reference_id 2256194
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2256194
6
reference_url https://sqlite.org/forum/forumpost/5bcbf4571c
reference_id 5bcbf4571c
reference_type
scores
0
value 5.2
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:S/C:P/I:P/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/
url https://sqlite.org/forum/forumpost/5bcbf4571c
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
reference_id AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K
reference_type
scores
0
value 5.2
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:S/C:P/I:P/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
8
reference_url https://vuldb.com/?ctiid.248999
reference_id ?ctiid.248999
reference_type
scores
0
value 5.2
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:S/C:P/I:P/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/
url https://vuldb.com/?ctiid.248999
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
reference_id D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP
reference_type
scores
0
value 5.2
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:S/C:P/I:P/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
10
reference_url https://vuldb.com/?id.248999
reference_id ?id.248999
reference_type
scores
0
value 5.2
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:S/C:P/I:P/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/
url https://vuldb.com/?id.248999
11
reference_url https://security.netapp.com/advisory/ntap-20240112-0008/
reference_id ntap-20240112-0008
reference_type
scores
0
value 5.2
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:S/C:P/I:P/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/
url https://security.netapp.com/advisory/ntap-20240112-0008/
12
reference_url https://access.redhat.com/errata/RHSA-2024:0253
reference_id RHSA-2024:0253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0253
13
reference_url https://access.redhat.com/errata/RHSA-2024:0465
reference_id RHSA-2024:0465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0465
14
reference_url https://access.redhat.com/errata/RHSA-2024:0589
reference_id RHSA-2024:0589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0589
15
reference_url https://access.redhat.com/errata/RHSA-2024:1081
reference_id RHSA-2024:1081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1081
16
reference_url https://access.redhat.com/errata/RHSA-2024:1107
reference_id RHSA-2024:1107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1107
17
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
18
reference_url https://access.redhat.com/errata/RHSA-2024:1477
reference_id RHSA-2024:1477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1477
19
reference_url https://usn.ubuntu.com/6566-1/
reference_id USN-6566-1
reference_type
scores
url https://usn.ubuntu.com/6566-1/
20
reference_url https://usn.ubuntu.com/6566-2/
reference_id USN-6566-2
reference_type
scores
url https://usn.ubuntu.com/6566-2/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2
purl pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2k32-4p92-1ygz
1
vulnerability VCID-6xmb-3zgw-xudu
2
vulnerability VCID-jree-ndwj-kfcy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2
aliases CVE-2023-7104
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jqy9-zum8-aqfn
25
url VCID-jsyj-vz3p-rbae
vulnerability_id VCID-jsyj-vz3p-rbae
summary
Multiple vulnerabilities have been found in SQLite, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11655.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11655.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11655
reference_id
reference_type
scores
0
value 0.0489
scoring_system epss
scoring_elements 0.89543
published_at 2026-04-01T12:55:00Z
1
value 0.0489
scoring_system epss
scoring_elements 0.89593
published_at 2026-04-21T12:55:00Z
2
value 0.0489
scoring_system epss
scoring_elements 0.89582
published_at 2026-04-13T12:55:00Z
3
value 0.0489
scoring_system epss
scoring_elements 0.89596
published_at 2026-04-16T12:55:00Z
4
value 0.0489
scoring_system epss
scoring_elements 0.89597
published_at 2026-04-18T12:55:00Z
5
value 0.0489
scoring_system epss
scoring_elements 0.89547
published_at 2026-04-02T12:55:00Z
6
value 0.0489
scoring_system epss
scoring_elements 0.8956
published_at 2026-04-04T12:55:00Z
7
value 0.0489
scoring_system epss
scoring_elements 0.89561
published_at 2026-04-07T12:55:00Z
8
value 0.0489
scoring_system epss
scoring_elements 0.89578
published_at 2026-04-08T12:55:00Z
9
value 0.0489
scoring_system epss
scoring_elements 0.89583
published_at 2026-04-09T12:55:00Z
10
value 0.0489
scoring_system epss
scoring_elements 0.8959
published_at 2026-04-11T12:55:00Z
11
value 0.0489
scoring_system epss
scoring_elements 0.89588
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11655
2
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
reference_id
reference_type
scores
url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html
6
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
7
reference_url https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
reference_id
reference_type
scores
url https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
8
reference_url https://security.netapp.com/advisory/ntap-20200416-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20200416-0001/
9
reference_url https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11
reference_id
reference_type
scores
url https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11
10
reference_url https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c
reference_id
reference_type
scores
url https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c
11
reference_url https://www.oracle.com/security-alerts/cpuApr2021.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuApr2021.html
12
reference_url https://www.oracle.com/security-alerts/cpujan2021.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujan2021.html
13
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2020.html
14
reference_url https://www.oracle.com/security-alerts/cpuoct2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuoct2020.html
15
reference_url https://www.tenable.com/security/tns-2021-14
reference_id
reference_type
scores
url https://www.tenable.com/security/tns-2021-14
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1824174
reference_id 1824174
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1824174
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-11655
reference_id CVE-2020-11655
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-11655
45
reference_url https://security.gentoo.org/glsa/202007-26
reference_id GLSA-202007-26
reference_type
scores
url https://security.gentoo.org/glsa/202007-26
46
reference_url https://access.redhat.com/errata/RHSA-2025:16504
reference_id RHSA-2025:16504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16504
47
reference_url https://usn.ubuntu.com/4394-1/
reference_id USN-4394-1
reference_type
scores
url https://usn.ubuntu.com/4394-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2020-11655
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jsyj-vz3p-rbae
26
url VCID-mqb8-wfvg-xbgz
vulnerability_id VCID-mqb8-wfvg-xbgz
summary sqlite: NULL pointer dereference in tableColumnList
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15286.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15286.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15286
reference_id
reference_type
scores
0
value 0.00467
scoring_system epss
scoring_elements 0.64347
published_at 2026-04-01T12:55:00Z
1
value 0.00467
scoring_system epss
scoring_elements 0.64464
published_at 2026-04-21T12:55:00Z
2
value 0.00467
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-16T12:55:00Z
3
value 0.00467
scoring_system epss
scoring_elements 0.64472
published_at 2026-04-18T12:55:00Z
4
value 0.00467
scoring_system epss
scoring_elements 0.64401
published_at 2026-04-02T12:55:00Z
5
value 0.00467
scoring_system epss
scoring_elements 0.6443
published_at 2026-04-04T12:55:00Z
6
value 0.00467
scoring_system epss
scoring_elements 0.6439
published_at 2026-04-07T12:55:00Z
7
value 0.00467
scoring_system epss
scoring_elements 0.64438
published_at 2026-04-08T12:55:00Z
8
value 0.00467
scoring_system epss
scoring_elements 0.64454
published_at 2026-04-12T12:55:00Z
9
value 0.00467
scoring_system epss
scoring_elements 0.64466
published_at 2026-04-11T12:55:00Z
10
value 0.00467
scoring_system epss
scoring_elements 0.64426
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15286
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15286
3
reference_url https://github.com/Ha0Team/crash-of-sqlite3/blob/master/poc.md
reference_id
reference_type
scores
url https://github.com/Ha0Team/crash-of-sqlite3/blob/master/poc.md
4
reference_url http://www.securityfocus.com/bid/101285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101285
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1510438
reference_id 1510438
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1510438
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878680
reference_id 878680
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878680
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sqlite:sqlite:3.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.20.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15286
reference_id CVE-2017-15286
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15286
fixed_packages
0
url pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
purl pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ufy-3uwy-afgx
1
vulnerability VCID-2xdd-xysv-sufz
2
vulnerability VCID-3686-kxzp-gbcf
3
vulnerability VCID-4u4w-a4gk-rqfx
4
vulnerability VCID-5wf9-5w85-2ybf
5
vulnerability VCID-7wt9-4myp-w3gu
6
vulnerability VCID-8m3z-fgqg-4fgn
7
vulnerability VCID-9ggb-qwny-qqhb
8
vulnerability VCID-ajrb-8r3r-afe3
9
vulnerability VCID-bgz9-v5cv-8kea
10
vulnerability VCID-bxfk-dmdp-53f3
11
vulnerability VCID-chtp-rtmg-6ud5
12
vulnerability VCID-edrj-chna-ekam
13
vulnerability VCID-eu7t-2h5s-4kc5
14
vulnerability VCID-f9jg-cmg5-6ubq
15
vulnerability VCID-gb4s-4wcm-eyft
16
vulnerability VCID-jqy9-zum8-aqfn
17
vulnerability VCID-jsyj-vz3p-rbae
18
vulnerability VCID-p4b6-m68m-aqeq
19
vulnerability VCID-r31n-5brf-ykcv
20
vulnerability VCID-sy72-yhap-vbet
21
vulnerability VCID-u4pu-5b5r-yqg1
22
vulnerability VCID-um2g-gsw6-wydv
23
vulnerability VCID-ye95-1dsg-afgd
24
vulnerability VCID-ygnn-3qsr-kqg4
25
vulnerability VCID-yy9h-fptd-hkay
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1
aliases CVE-2017-15286
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mqb8-wfvg-xbgz
27
url VCID-p4b6-m68m-aqeq
vulnerability_id VCID-p4b6-m68m-aqeq
summary sqlite: zipfileUpdate in ext/misc/zipfile.c mishandles a NULL pathname during an update of a ZIP archive
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19925.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19925
reference_id
reference_type
scores
0
value 0.07012
scoring_system epss
scoring_elements 0.91426
published_at 2026-04-01T12:55:00Z
1
value 0.07012
scoring_system epss
scoring_elements 0.91496
published_at 2026-04-21T12:55:00Z
2
value 0.07012
scoring_system epss
scoring_elements 0.91476
published_at 2026-04-13T12:55:00Z
3
value 0.07012
scoring_system epss
scoring_elements 0.915
published_at 2026-04-16T12:55:00Z
4
value 0.07012
scoring_system epss
scoring_elements 0.91433
published_at 2026-04-02T12:55:00Z
5
value 0.07012
scoring_system epss
scoring_elements 0.91443
published_at 2026-04-04T12:55:00Z
6
value 0.07012
scoring_system epss
scoring_elements 0.9145
published_at 2026-04-07T12:55:00Z
7
value 0.07012
scoring_system epss
scoring_elements 0.91463
published_at 2026-04-08T12:55:00Z
8
value 0.07012
scoring_system epss
scoring_elements 0.91469
published_at 2026-04-09T12:55:00Z
9
value 0.07012
scoring_system epss
scoring_elements 0.91475
published_at 2026-04-11T12:55:00Z
10
value 0.07012
scoring_system epss
scoring_elements 0.91478
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19925
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502
48
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
49
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1788866
reference_id 1788866
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1788866
50
reference_url https://security.archlinux.org/ASA-202002-3
reference_id ASA-202002-3
reference_type
scores
url https://security.archlinux.org/ASA-202002-3
51
reference_url https://security.archlinux.org/AVG-1092
reference_id AVG-1092
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1092
52
reference_url https://access.redhat.com/errata/RHSA-2020:1810
reference_id RHSA-2020:1810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1810
53
reference_url https://usn.ubuntu.com/4298-1/
reference_id USN-4298-1
reference_type
scores
url https://usn.ubuntu.com/4298-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2019-19925
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p4b6-m68m-aqeq
28
url VCID-qhcj-2nua-8kde
vulnerability_id VCID-qhcj-2nua-8kde
summary
Multiple vulnerabilities have been found in SQLite, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9937.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9937.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9937
reference_id
reference_type
scores
0
value 0.04004
scoring_system epss
scoring_elements 0.88385
published_at 2026-04-01T12:55:00Z
1
value 0.04004
scoring_system epss
scoring_elements 0.88444
published_at 2026-04-21T12:55:00Z
2
value 0.04004
scoring_system epss
scoring_elements 0.88435
published_at 2026-04-13T12:55:00Z
3
value 0.04004
scoring_system epss
scoring_elements 0.8845
published_at 2026-04-16T12:55:00Z
4
value 0.04004
scoring_system epss
scoring_elements 0.88446
published_at 2026-04-18T12:55:00Z
5
value 0.04004
scoring_system epss
scoring_elements 0.88394
published_at 2026-04-02T12:55:00Z
6
value 0.04004
scoring_system epss
scoring_elements 0.88403
published_at 2026-04-04T12:55:00Z
7
value 0.04004
scoring_system epss
scoring_elements 0.88407
published_at 2026-04-07T12:55:00Z
8
value 0.04004
scoring_system epss
scoring_elements 0.88426
published_at 2026-04-08T12:55:00Z
9
value 0.04004
scoring_system epss
scoring_elements 0.88432
published_at 2026-04-09T12:55:00Z
10
value 0.04004
scoring_system epss
scoring_elements 0.88443
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9937
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9937
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/
8
reference_url https://security.netapp.com/advisory/ntap-20190416-0005/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190416-0005/
9
reference_url https://sqlite.org/src/info/45c73deb440496e8
reference_id
reference_type
scores
url https://sqlite.org/src/info/45c73deb440496e8
10
reference_url https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114383.html
reference_id
reference_type
scores
url https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114383.html
11
reference_url https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114393.html
reference_id
reference_type
scores
url https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114393.html
12
reference_url https://www.oracle.com/security-alerts/cpujan2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujan2020.html
13
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
14
reference_url http://www.securityfocus.com/bid/107562
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107562
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1692357
reference_id 1692357
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1692357
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925290
reference_id 925290
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925290
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9937
reference_id CVE-2019-9937
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9937
19
reference_url https://security.gentoo.org/glsa/201908-09
reference_id GLSA-201908-09
reference_type
scores
url https://security.gentoo.org/glsa/201908-09
20
reference_url https://usn.ubuntu.com/4019-1/
reference_id USN-4019-1
reference_type
scores
url https://usn.ubuntu.com/4019-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
purl pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ufy-3uwy-afgx
1
vulnerability VCID-2xdd-xysv-sufz
2
vulnerability VCID-3686-kxzp-gbcf
3
vulnerability VCID-4u4w-a4gk-rqfx
4
vulnerability VCID-5wf9-5w85-2ybf
5
vulnerability VCID-7wt9-4myp-w3gu
6
vulnerability VCID-8m3z-fgqg-4fgn
7
vulnerability VCID-9ggb-qwny-qqhb
8
vulnerability VCID-ajrb-8r3r-afe3
9
vulnerability VCID-bgz9-v5cv-8kea
10
vulnerability VCID-bxfk-dmdp-53f3
11
vulnerability VCID-chtp-rtmg-6ud5
12
vulnerability VCID-edrj-chna-ekam
13
vulnerability VCID-eu7t-2h5s-4kc5
14
vulnerability VCID-f9jg-cmg5-6ubq
15
vulnerability VCID-gb4s-4wcm-eyft
16
vulnerability VCID-jqy9-zum8-aqfn
17
vulnerability VCID-jsyj-vz3p-rbae
18
vulnerability VCID-p4b6-m68m-aqeq
19
vulnerability VCID-r31n-5brf-ykcv
20
vulnerability VCID-sy72-yhap-vbet
21
vulnerability VCID-u4pu-5b5r-yqg1
22
vulnerability VCID-um2g-gsw6-wydv
23
vulnerability VCID-ye95-1dsg-afgd
24
vulnerability VCID-ygnn-3qsr-kqg4
25
vulnerability VCID-yy9h-fptd-hkay
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1
aliases CVE-2019-9937
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qhcj-2nua-8kde
29
url VCID-r31n-5brf-ykcv
vulnerability_id VCID-r31n-5brf-ykcv
summary
Multiple vulnerabilities have been found in SQLite, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13435.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13435.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13435
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04793
published_at 2026-04-21T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04646
published_at 2026-04-16T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04654
published_at 2026-04-18T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05233
published_at 2026-04-02T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05291
published_at 2026-04-07T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05325
published_at 2026-04-08T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05348
published_at 2026-04-09T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05315
published_at 2026-04-11T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05303
published_at 2026-04-12T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05292
published_at 2026-04-13T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.0519
published_at 2026-04-01T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05265
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13435
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1841231
reference_id 1841231
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1841231
5
reference_url https://security.gentoo.org/glsa/202007-26
reference_id GLSA-202007-26
reference_type
scores
url https://security.gentoo.org/glsa/202007-26
6
reference_url https://access.redhat.com/errata/RHSA-2021:4396
reference_id RHSA-2021:4396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4396
7
reference_url https://access.redhat.com/errata/RHSA-2025:16504
reference_id RHSA-2025:16504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16504
8
reference_url https://usn.ubuntu.com/4394-1/
reference_id USN-4394-1
reference_type
scores
url https://usn.ubuntu.com/4394-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2020-13435
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r31n-5brf-ykcv
30
url VCID-sy72-yhap-vbet
vulnerability_id VCID-sy72-yhap-vbet
summary sqlite: Null pointer derreference in src/select.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35525.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35525.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35525
reference_id
reference_type
scores
0
value 0.00219
scoring_system epss
scoring_elements 0.44512
published_at 2026-04-21T12:55:00Z
1
value 0.00219
scoring_system epss
scoring_elements 0.44533
published_at 2026-04-12T12:55:00Z
2
value 0.00219
scoring_system epss
scoring_elements 0.44534
published_at 2026-04-13T12:55:00Z
3
value 0.00219
scoring_system epss
scoring_elements 0.4459
published_at 2026-04-16T12:55:00Z
4
value 0.00219
scoring_system epss
scoring_elements 0.44581
published_at 2026-04-18T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46812
published_at 2026-04-07T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.46889
published_at 2026-04-11T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46807
published_at 2026-04-01T12:55:00Z
8
value 0.00238
scoring_system epss
scoring_elements 0.46866
published_at 2026-04-09T12:55:00Z
9
value 0.00238
scoring_system epss
scoring_elements 0.46845
published_at 2026-04-02T12:55:00Z
10
value 0.00238
scoring_system epss
scoring_elements 0.46863
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35525
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35525
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2122324
reference_id 2122324
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2122324
5
reference_url https://access.redhat.com/errata/RHSA-2022:7108
reference_id RHSA-2022:7108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7108
6
reference_url https://usn.ubuntu.com/5615-1/
reference_id USN-5615-1
reference_type
scores
url https://usn.ubuntu.com/5615-1/
7
reference_url https://usn.ubuntu.com/5615-2/
reference_id USN-5615-2
reference_type
scores
url https://usn.ubuntu.com/5615-2/
8
reference_url https://usn.ubuntu.com/5615-3/
reference_id USN-5615-3
reference_type
scores
url https://usn.ubuntu.com/5615-3/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2020-35525
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sy72-yhap-vbet
31
url VCID-tpxf-9kf6-dbf8
vulnerability_id VCID-tpxf-9kf6-dbf8
summary
Multiple vulnerabilities have been found in SQLite, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5018.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5018.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5018
reference_id
reference_type
scores
0
value 0.02719
scoring_system epss
scoring_elements 0.85944
published_at 2026-04-21T12:55:00Z
1
value 0.02719
scoring_system epss
scoring_elements 0.85936
published_at 2026-04-12T12:55:00Z
2
value 0.02719
scoring_system epss
scoring_elements 0.85931
published_at 2026-04-13T12:55:00Z
3
value 0.02719
scoring_system epss
scoring_elements 0.8595
published_at 2026-04-16T12:55:00Z
4
value 0.02719
scoring_system epss
scoring_elements 0.85954
published_at 2026-04-18T12:55:00Z
5
value 0.02932
scoring_system epss
scoring_elements 0.86405
published_at 2026-04-08T12:55:00Z
6
value 0.02932
scoring_system epss
scoring_elements 0.86415
published_at 2026-04-09T12:55:00Z
7
value 0.02932
scoring_system epss
scoring_elements 0.86428
published_at 2026-04-11T12:55:00Z
8
value 0.02932
scoring_system epss
scoring_elements 0.86357
published_at 2026-04-01T12:55:00Z
9
value 0.02932
scoring_system epss
scoring_elements 0.86386
published_at 2026-04-07T12:55:00Z
10
value 0.02932
scoring_system epss
scoring_elements 0.86367
published_at 2026-04-02T12:55:00Z
11
value 0.02932
scoring_system epss
scoring_elements 0.86385
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5018
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5018
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1708301
reference_id 1708301
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1708301
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928770
reference_id 928770
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928770
6
reference_url https://security.gentoo.org/glsa/201908-09
reference_id GLSA-201908-09
reference_type
scores
url https://security.gentoo.org/glsa/201908-09
7
reference_url https://access.redhat.com/errata/RHSA-2020:4442
reference_id RHSA-2020:4442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4442
8
reference_url https://usn.ubuntu.com/4205-1/
reference_id USN-4205-1
reference_type
scores
url https://usn.ubuntu.com/4205-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
purl pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ufy-3uwy-afgx
1
vulnerability VCID-2xdd-xysv-sufz
2
vulnerability VCID-3686-kxzp-gbcf
3
vulnerability VCID-4u4w-a4gk-rqfx
4
vulnerability VCID-5wf9-5w85-2ybf
5
vulnerability VCID-7wt9-4myp-w3gu
6
vulnerability VCID-8m3z-fgqg-4fgn
7
vulnerability VCID-9ggb-qwny-qqhb
8
vulnerability VCID-ajrb-8r3r-afe3
9
vulnerability VCID-bgz9-v5cv-8kea
10
vulnerability VCID-bxfk-dmdp-53f3
11
vulnerability VCID-chtp-rtmg-6ud5
12
vulnerability VCID-edrj-chna-ekam
13
vulnerability VCID-eu7t-2h5s-4kc5
14
vulnerability VCID-f9jg-cmg5-6ubq
15
vulnerability VCID-gb4s-4wcm-eyft
16
vulnerability VCID-jqy9-zum8-aqfn
17
vulnerability VCID-jsyj-vz3p-rbae
18
vulnerability VCID-p4b6-m68m-aqeq
19
vulnerability VCID-r31n-5brf-ykcv
20
vulnerability VCID-sy72-yhap-vbet
21
vulnerability VCID-u4pu-5b5r-yqg1
22
vulnerability VCID-um2g-gsw6-wydv
23
vulnerability VCID-ye95-1dsg-afgd
24
vulnerability VCID-ygnn-3qsr-kqg4
25
vulnerability VCID-yy9h-fptd-hkay
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1
aliases CVE-2019-5018
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tpxf-9kf6-dbf8
32
url VCID-u4pu-5b5r-yqg1
vulnerability_id VCID-u4pu-5b5r-yqg1
summary
Multiple vulnerabilities have been found in SQLite, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13434.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13434
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17132
published_at 2026-04-01T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17299
published_at 2026-04-02T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17347
published_at 2026-04-04T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17128
published_at 2026-04-07T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.1722
published_at 2026-04-08T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17277
published_at 2026-04-09T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17255
published_at 2026-04-11T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17207
published_at 2026-04-12T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17147
published_at 2026-04-13T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17085
published_at 2026-04-16T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17091
published_at 2026-04-18T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17127
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1841223
reference_id 1841223
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1841223
5
reference_url https://security.gentoo.org/glsa/202007-26
reference_id GLSA-202007-26
reference_type
scores
url https://security.gentoo.org/glsa/202007-26
6
reference_url https://access.redhat.com/errata/RHSA-2021:1581
reference_id RHSA-2021:1581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1581
7
reference_url https://access.redhat.com/errata/RHSA-2021:1968
reference_id RHSA-2021:1968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1968
8
reference_url https://access.redhat.com/errata/RHSA-2025:16504
reference_id RHSA-2025:16504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16504
9
reference_url https://usn.ubuntu.com/4394-1/
reference_id USN-4394-1
reference_type
scores
url https://usn.ubuntu.com/4394-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2020-13434
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u4pu-5b5r-yqg1
33
url VCID-um2g-gsw6-wydv
vulnerability_id VCID-um2g-gsw6-wydv
summary sqlite: allows a crash if a sub-select uses both DISTINCT and window functions and also has certain ORDER BY usage
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19244.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19244
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.36855
published_at 2026-04-11T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36847
published_at 2026-04-09T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.48953
published_at 2026-04-04T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.48907
published_at 2026-04-07T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.48961
published_at 2026-04-21T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.48999
published_at 2026-04-18T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.4889
published_at 2026-04-01T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.48927
published_at 2026-04-02T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.48949
published_at 2026-04-12T12:55:00Z
9
value 0.00256
scoring_system epss
scoring_elements 0.48957
published_at 2026-04-13T12:55:00Z
10
value 0.00256
scoring_system epss
scoring_elements 0.49003
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19244
2
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
reference_id
reference_type
scores
url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
reference_id
reference_type
scores
url https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1777945
reference_id 1777945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1777945
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946656
reference_id 946656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946656
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.30.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sqlite:sqlite:3.30.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.30.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19244
reference_id CVE-2019-19244
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-19244
15
reference_url https://usn.ubuntu.com/4205-1/
reference_id USN-4205-1
reference_type
scores
url https://usn.ubuntu.com/4205-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2019-19244
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-um2g-gsw6-wydv
34
url VCID-vchu-y7qg-pucp
vulnerability_id VCID-vchu-y7qg-pucp
summary sqlite: heap out-of-bound read in function rtreenode()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8457.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8457.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-8457
reference_id
reference_type
scores
0
value 0.26786
scoring_system epss
scoring_elements 0.96311
published_at 2026-04-01T12:55:00Z
1
value 0.26786
scoring_system epss
scoring_elements 0.96319
published_at 2026-04-02T12:55:00Z
2
value 0.26786
scoring_system epss
scoring_elements 0.96326
published_at 2026-04-04T12:55:00Z
3
value 0.26786
scoring_system epss
scoring_elements 0.9633
published_at 2026-04-07T12:55:00Z
4
value 0.26786
scoring_system epss
scoring_elements 0.96338
published_at 2026-04-08T12:55:00Z
5
value 0.26786
scoring_system epss
scoring_elements 0.96342
published_at 2026-04-09T12:55:00Z
6
value 0.26786
scoring_system epss
scoring_elements 0.96346
published_at 2026-04-11T12:55:00Z
7
value 0.26786
scoring_system epss
scoring_elements 0.96345
published_at 2026-04-12T12:55:00Z
8
value 0.26786
scoring_system epss
scoring_elements 0.96348
published_at 2026-04-13T12:55:00Z
9
value 0.26786
scoring_system epss
scoring_elements 0.96356
published_at 2026-04-16T12:55:00Z
10
value 0.26786
scoring_system epss
scoring_elements 0.96361
published_at 2026-04-18T12:55:00Z
11
value 0.26786
scoring_system epss
scoring_elements 0.96363
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-8457
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010974
reference_id 1010974
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010974
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1716881
reference_id 1716881
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1716881
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929775
reference_id 929775
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929775
7
reference_url https://access.redhat.com/errata/RHSA-2020:1810
reference_id RHSA-2020:1810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1810
8
reference_url https://usn.ubuntu.com/4004-1/
reference_id USN-4004-1
reference_type
scores
url https://usn.ubuntu.com/4004-1/
9
reference_url https://usn.ubuntu.com/4004-2/
reference_id USN-4004-2
reference_type
scores
url https://usn.ubuntu.com/4004-2/
10
reference_url https://usn.ubuntu.com/4019-1/
reference_id USN-4019-1
reference_type
scores
url https://usn.ubuntu.com/4019-1/
11
reference_url https://usn.ubuntu.com/4019-2/
reference_id USN-4019-2
reference_type
scores
url https://usn.ubuntu.com/4019-2/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
purl pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ufy-3uwy-afgx
1
vulnerability VCID-2xdd-xysv-sufz
2
vulnerability VCID-3686-kxzp-gbcf
3
vulnerability VCID-4u4w-a4gk-rqfx
4
vulnerability VCID-5wf9-5w85-2ybf
5
vulnerability VCID-7wt9-4myp-w3gu
6
vulnerability VCID-8m3z-fgqg-4fgn
7
vulnerability VCID-9ggb-qwny-qqhb
8
vulnerability VCID-ajrb-8r3r-afe3
9
vulnerability VCID-bgz9-v5cv-8kea
10
vulnerability VCID-bxfk-dmdp-53f3
11
vulnerability VCID-chtp-rtmg-6ud5
12
vulnerability VCID-edrj-chna-ekam
13
vulnerability VCID-eu7t-2h5s-4kc5
14
vulnerability VCID-f9jg-cmg5-6ubq
15
vulnerability VCID-gb4s-4wcm-eyft
16
vulnerability VCID-jqy9-zum8-aqfn
17
vulnerability VCID-jsyj-vz3p-rbae
18
vulnerability VCID-p4b6-m68m-aqeq
19
vulnerability VCID-r31n-5brf-ykcv
20
vulnerability VCID-sy72-yhap-vbet
21
vulnerability VCID-u4pu-5b5r-yqg1
22
vulnerability VCID-um2g-gsw6-wydv
23
vulnerability VCID-ye95-1dsg-afgd
24
vulnerability VCID-ygnn-3qsr-kqg4
25
vulnerability VCID-yy9h-fptd-hkay
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1
aliases CVE-2019-8457
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vchu-y7qg-pucp
35
url VCID-ye95-1dsg-afgd
vulnerability_id VCID-ye95-1dsg-afgd
summary
Multiple vulnerabilities have been found in SQLite, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13631.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13631.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13631
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14719
published_at 2026-04-21T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14815
published_at 2026-04-12T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.14756
published_at 2026-04-13T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14652
published_at 2026-04-16T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14659
published_at 2026-04-18T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16514
published_at 2026-04-07T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16632
published_at 2026-04-11T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16471
published_at 2026-04-01T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16599
published_at 2026-04-08T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16653
published_at 2026-04-09T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16715
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13631
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1841568
reference_id 1841568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1841568
5
reference_url https://security.gentoo.org/glsa/202007-26
reference_id GLSA-202007-26
reference_type
scores
url https://security.gentoo.org/glsa/202007-26
6
reference_url https://access.redhat.com/errata/RHSA-2020:4442
reference_id RHSA-2020:4442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4442
7
reference_url https://access.redhat.com/errata/RHSA-2021:1968
reference_id RHSA-2021:1968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1968
8
reference_url https://access.redhat.com/errata/RHSA-2025:16504
reference_id RHSA-2025:16504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16504
9
reference_url https://usn.ubuntu.com/4394-1/
reference_id USN-4394-1
reference_type
scores
url https://usn.ubuntu.com/4394-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2020-13631
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ye95-1dsg-afgd
36
url VCID-ygnn-3qsr-kqg4
vulnerability_id VCID-ygnn-3qsr-kqg4
summary sqlite: mishandling of certain uses of SELECT DISTINCT involving a LEFT JOIN in flattenSubquery in select.c leads to a NULL pointer dereference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19923.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19923.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19923
reference_id
reference_type
scores
0
value 0.062
scoring_system epss
scoring_elements 0.90814
published_at 2026-04-01T12:55:00Z
1
value 0.062
scoring_system epss
scoring_elements 0.90887
published_at 2026-04-21T12:55:00Z
2
value 0.062
scoring_system epss
scoring_elements 0.90865
published_at 2026-04-13T12:55:00Z
3
value 0.062
scoring_system epss
scoring_elements 0.90889
published_at 2026-04-16T12:55:00Z
4
value 0.062
scoring_system epss
scoring_elements 0.9082
published_at 2026-04-02T12:55:00Z
5
value 0.062
scoring_system epss
scoring_elements 0.9083
published_at 2026-04-04T12:55:00Z
6
value 0.062
scoring_system epss
scoring_elements 0.90841
published_at 2026-04-07T12:55:00Z
7
value 0.062
scoring_system epss
scoring_elements 0.90852
published_at 2026-04-08T12:55:00Z
8
value 0.062
scoring_system epss
scoring_elements 0.90859
published_at 2026-04-09T12:55:00Z
9
value 0.062
scoring_system epss
scoring_elements 0.90867
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19923
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502
48
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
49
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1788846
reference_id 1788846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1788846
50
reference_url https://security.archlinux.org/ASA-202002-3
reference_id ASA-202002-3
reference_type
scores
url https://security.archlinux.org/ASA-202002-3
51
reference_url https://security.archlinux.org/AVG-1092
reference_id AVG-1092
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1092
52
reference_url https://access.redhat.com/errata/RHSA-2020:1810
reference_id RHSA-2020:1810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1810
53
reference_url https://usn.ubuntu.com/4298-1/
reference_id USN-4298-1
reference_type
scores
url https://usn.ubuntu.com/4298-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2019-19923
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ygnn-3qsr-kqg4
37
url VCID-ym2v-jfk4-q3f5
vulnerability_id VCID-ym2v-jfk4-q3f5
summary sqlite: NULL pointer dereference with databases with schema corrupted with CREATE TABLE AS allows for denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8740.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8740.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8740
reference_id
reference_type
scores
0
value 0.12623
scoring_system epss
scoring_elements 0.93929
published_at 2026-04-01T12:55:00Z
1
value 0.12623
scoring_system epss
scoring_elements 0.93938
published_at 2026-04-02T12:55:00Z
2
value 0.12623
scoring_system epss
scoring_elements 0.93947
published_at 2026-04-04T12:55:00Z
3
value 0.12623
scoring_system epss
scoring_elements 0.93951
published_at 2026-04-07T12:55:00Z
4
value 0.12623
scoring_system epss
scoring_elements 0.93959
published_at 2026-04-08T12:55:00Z
5
value 0.12623
scoring_system epss
scoring_elements 0.93962
published_at 2026-04-09T12:55:00Z
6
value 0.12623
scoring_system epss
scoring_elements 0.93966
published_at 2026-04-13T12:55:00Z
7
value 0.13527
scoring_system epss
scoring_elements 0.94242
published_at 2026-04-21T12:55:00Z
8
value 0.13527
scoring_system epss
scoring_elements 0.94236
published_at 2026-04-16T12:55:00Z
9
value 0.13527
scoring_system epss
scoring_elements 0.94241
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8740
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1558804
reference_id 1558804
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1558804
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893195
reference_id 893195
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893195
6
reference_url https://usn.ubuntu.com/4205-1/
reference_id USN-4205-1
reference_type
scores
url https://usn.ubuntu.com/4205-1/
7
reference_url https://usn.ubuntu.com/4394-1/
reference_id USN-4394-1
reference_type
scores
url https://usn.ubuntu.com/4394-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
purl pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ufy-3uwy-afgx
1
vulnerability VCID-2xdd-xysv-sufz
2
vulnerability VCID-3686-kxzp-gbcf
3
vulnerability VCID-4u4w-a4gk-rqfx
4
vulnerability VCID-5wf9-5w85-2ybf
5
vulnerability VCID-7wt9-4myp-w3gu
6
vulnerability VCID-8m3z-fgqg-4fgn
7
vulnerability VCID-9ggb-qwny-qqhb
8
vulnerability VCID-ajrb-8r3r-afe3
9
vulnerability VCID-bgz9-v5cv-8kea
10
vulnerability VCID-bxfk-dmdp-53f3
11
vulnerability VCID-chtp-rtmg-6ud5
12
vulnerability VCID-edrj-chna-ekam
13
vulnerability VCID-eu7t-2h5s-4kc5
14
vulnerability VCID-f9jg-cmg5-6ubq
15
vulnerability VCID-gb4s-4wcm-eyft
16
vulnerability VCID-jqy9-zum8-aqfn
17
vulnerability VCID-jsyj-vz3p-rbae
18
vulnerability VCID-p4b6-m68m-aqeq
19
vulnerability VCID-r31n-5brf-ykcv
20
vulnerability VCID-sy72-yhap-vbet
21
vulnerability VCID-u4pu-5b5r-yqg1
22
vulnerability VCID-um2g-gsw6-wydv
23
vulnerability VCID-ye95-1dsg-afgd
24
vulnerability VCID-ygnn-3qsr-kqg4
25
vulnerability VCID-yy9h-fptd-hkay
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1
aliases CVE-2018-8740
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ym2v-jfk4-q3f5
38
url VCID-yy9h-fptd-hkay
vulnerability_id VCID-yy9h-fptd-hkay
summary
Multiple vulnerabilities have been found in SQLite, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00032.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00033.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16168.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16168.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16168
reference_id
reference_type
scores
0
value 0.00843
scoring_system epss
scoring_elements 0.74706
published_at 2026-04-01T12:55:00Z
1
value 0.00843
scoring_system epss
scoring_elements 0.74784
published_at 2026-04-21T12:55:00Z
2
value 0.00843
scoring_system epss
scoring_elements 0.74749
published_at 2026-04-13T12:55:00Z
3
value 0.00843
scoring_system epss
scoring_elements 0.74786
published_at 2026-04-16T12:55:00Z
4
value 0.00843
scoring_system epss
scoring_elements 0.74794
published_at 2026-04-18T12:55:00Z
5
value 0.00843
scoring_system epss
scoring_elements 0.74709
published_at 2026-04-07T12:55:00Z
6
value 0.00843
scoring_system epss
scoring_elements 0.74736
published_at 2026-04-04T12:55:00Z
7
value 0.00843
scoring_system epss
scoring_elements 0.74742
published_at 2026-04-08T12:55:00Z
8
value 0.00843
scoring_system epss
scoring_elements 0.74756
published_at 2026-04-09T12:55:00Z
9
value 0.00843
scoring_system epss
scoring_elements 0.7478
published_at 2026-04-11T12:55:00Z
10
value 0.00843
scoring_system epss
scoring_elements 0.74759
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16168
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10365
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10365
7
reference_url https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZARJHJJDBHI7CE5PZEBXS5HKK6HXKW2/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZARJHJJDBHI7CE5PZEBXS5HKK6HXKW2/
9
reference_url https://security.netapp.com/advisory/ntap-20190926-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190926-0003/
10
reference_url https://security.netapp.com/advisory/ntap-20200122-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20200122-0003/
11
reference_url https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg116312.html
reference_id
reference_type
scores
url https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg116312.html
12
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
13
reference_url https://www.oracle.com/security-alerts/cpujan2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujan2020.html
14
reference_url https://www.sqlite.org/src/info/e4598ecbdd18bd82945f6029013296690e719a62
reference_id
reference_type
scores
url https://www.sqlite.org/src/info/e4598ecbdd18bd82945f6029013296690e719a62
15
reference_url https://www.sqlite.org/src/timeline?c=98357d8c1263920b
reference_id
reference_type
scores
url https://www.sqlite.org/src/timeline?c=98357d8c1263920b
16
reference_url https://www.tenable.com/security/tns-2021-08
reference_id
reference_type
scores
url https://www.tenable.com/security/tns-2021-08
17
reference_url https://www.tenable.com/security/tns-2021-11
reference_id
reference_type
scores
url https://www.tenable.com/security/tns-2021-11
18
reference_url https://www.tenable.com/security/tns-2021-14
reference_id
reference_type
scores
url https://www.tenable.com/security/tns-2021-14
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1768986
reference_id 1768986
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1768986
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.3.4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_design_studio:7.3.4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.3.4.3.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.3.5.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_design_studio:7.3.5.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.3.5.5.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.4.0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_design_studio:7.4.0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.4.0.4.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update231:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update231:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update231:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update231:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:nessus_agent:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tenable:nessus_agent:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:nessus_agent:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16168
reference_id CVE-2019-16168
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-16168
48
reference_url https://security.gentoo.org/glsa/202003-16
reference_id GLSA-202003-16
reference_type
scores
url https://security.gentoo.org/glsa/202003-16
49
reference_url https://access.redhat.com/errata/RHSA-2020:4442
reference_id RHSA-2020:4442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4442
50
reference_url https://access.redhat.com/errata/RHSA-2021:1968
reference_id RHSA-2021:1968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1968
51
reference_url https://usn.ubuntu.com/4205-1/
reference_id USN-4205-1
reference_type
scores
url https://usn.ubuntu.com/4205-1/
fixed_packages
0
url pkg:deb/debian/sqlite3@3.34.1-3
purl pkg:deb/debian/sqlite3@3.34.1-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xmb-3zgw-xudu
1
vulnerability VCID-7es8-7d9x-xfgm
2
vulnerability VCID-bgz9-v5cv-8kea
3
vulnerability VCID-fyxk-hw7d-ruc4
4
vulnerability VCID-jqy9-zum8-aqfn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3
aliases CVE-2019-16168
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yy9h-fptd-hkay
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-5%252Bdeb9u1