Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/939883?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/939883?format=api", "purl": "pkg:deb/debian/sqlite3@0?distro=trixie", "type": "deb", "namespace": "debian", "name": "sqlite3", "version": "0", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "3.8.3-1", "latest_non_vulnerable_version": "3.46.1-9", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/97796?format=api", "vulnerability_id": "VCID-2k32-4p92-1ygz", "summary": "An integer overflow exists in the FTS5 https://sqlite.org/fts5.html extension. It occurs when the size of an array of tombstone pointers is calculated and truncated into a 32-bit integer. A pointer to partially controlled data can then be written out of bounds.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7709", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16749", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16961", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17002", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16965", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17896", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17852", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17803", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1788", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1803", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17731", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17819", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7709" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1114609", "reference_id": "1114609", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1114609" }, { "reference_url": "https://github.com/google/security-research/security/advisories/GHSA-v2c8-vqqp-hv3g", "reference_id": "GHSA-v2c8-vqqp-hv3g", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:N/VI:H/VA:L/SC:N/SI:H/SA:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T15:10:09Z/" } ], "url": "https://github.com/google/security-research/security/advisories/GHSA-v2c8-vqqp-hv3g" }, { "reference_url": "https://usn.ubuntu.com/7751-1/", "reference_id": "USN-7751-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7751-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939883?format=api", "purl": "pkg:deb/debian/sqlite3@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939868?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939870?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939905?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-8?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939869?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-7709" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2k32-4p92-1ygz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81775?format=api", "vulnerability_id": "VCID-8c5h-9byn-4yh1", "summary": "sqlite: omits bits from the colUsed bitmask in the case of a generated column", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19317.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19317.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19317", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76761", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76765", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76793", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76774", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76805", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76816", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76844", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76824", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76817", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76861", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76866", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76857", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19317" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784111", "reference_id": "1784111", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784111" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939883?format=api", "purl": "pkg:deb/debian/sqlite3@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939868?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939866?format=api", "purl": "pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2k32-4p92-1ygz" }, { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-jree-ndwj-kfcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939870?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939869?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-19317" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8c5h-9byn-4yh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61420?format=api", "vulnerability_id": "VCID-bapy-tw9e-4fgu", "summary": "Multiple vulnerabilities have been discovered in SQLite, the worst of which may lead to code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46908.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46908.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46908", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33439", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33305", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.3347", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33308", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33354", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33387", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.3339", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33349", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33326", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33364", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33339", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46908" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sqlite.org/forum/forumpost/07beac8056151b2f", "reference_id": "07beac8056151b2f", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:30Z/" } ], "url": "https://sqlite.org/forum/forumpost/07beac8056151b2f" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026293", "reference_id": "1026293", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026293" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152844", "reference_id": "2152844", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152844" }, { "reference_url": "https://sqlite.org/src/info/cefc032473ac5ad2", "reference_id": "cefc032473ac5ad2", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:30Z/" } ], "url": "https://sqlite.org/src/info/cefc032473ac5ad2" }, { "reference_url": "https://security.gentoo.org/glsa/202311-03", "reference_id": "GLSA-202311-03", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:30Z/" } ], "url": "https://security.gentoo.org/glsa/202311-03" }, { "reference_url": "https://news.ycombinator.com/item?id=33948588", "reference_id": "item?id=33948588", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:30Z/" } ], "url": "https://news.ycombinator.com/item?id=33948588" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230203-0005/", "reference_id": "ntap-20230203-0005", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:30Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230203-0005/" }, { "reference_url": "https://usn.ubuntu.com/6566-1/", "reference_id": "USN-6566-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6566-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939883?format=api", "purl": "pkg:deb/debian/sqlite3@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939868?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939897?format=api", "purl": "pkg:deb/debian/sqlite3@3.40.0-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.0-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939866?format=api", "purl": "pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2k32-4p92-1ygz" }, { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-jree-ndwj-kfcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939870?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939869?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-46908" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bapy-tw9e-4fgu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68451?format=api", "vulnerability_id": "VCID-jree-ndwj-kfcy", "summary": "sqlite: SQLite integer overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7458.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7458.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7458", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23395", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23597", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23745", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23525", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23642", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23658", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23616", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23559", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24566", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24598", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24589", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7458" }, { "reference_url": "https://sqlite.org/src/info/12ad822d9b827777", "reference_id": "12ad822d9b827777", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-29T13:30:48Z/" } ], "url": "https://sqlite.org/src/info/12ad822d9b827777" }, { "reference_url": "https://sqlite.org/forum/forumpost/16ce2bb7a639e29b", "reference_id": "16ce2bb7a639e29b", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-29T13:30:48Z/" } ], "url": "https://sqlite.org/forum/forumpost/16ce2bb7a639e29b" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384237", "reference_id": "2384237", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384237" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939883?format=api", "purl": "pkg:deb/debian/sqlite3@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939868?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939904?format=api", "purl": "pkg:deb/debian/sqlite3@3.42.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.42.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939870?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939869?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-7458" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jree-ndwj-kfcy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70397?format=api", "vulnerability_id": "VCID-k73q-j1pc-4kcn", "summary": "SQLite: integer overflow in SQLite", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3277.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3277.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-3277", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.72975", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.73064", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.73019", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.73062", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.73071", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.72995", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.72971", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.73008", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.73022", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.73046", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00744", "scoring_system": "epss", "scoring_elements": "0.73025", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-3277" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359553", "reference_id": "2359553", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359553" }, { "reference_url": "https://sqlite.org/src/info/498e3f1cf57f164f", "reference_id": "498e3f1cf57f164f", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:15:26Z/" } ], "url": "https://sqlite.org/src/info/498e3f1cf57f164f" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4459", "reference_id": "RHSA-2025:4459", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4459" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7433", "reference_id": "RHSA-2025:7433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7517", "reference_id": "RHSA-2025:7517", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7517" }, { "reference_url": "https://usn.ubuntu.com/7528-1/", "reference_id": "USN-7528-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7528-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939883?format=api", "purl": "pkg:deb/debian/sqlite3@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939868?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939866?format=api", "purl": "pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2k32-4p92-1ygz" }, { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-jree-ndwj-kfcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939901?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939870?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939869?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-3277" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k73q-j1pc-4kcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78029?format=api", "vulnerability_id": "VCID-ph3q-9hjf-hbgh", "summary": "sqlite: use-after-free bug in jsonParseAddNodeArray", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0232.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0232.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0232", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04638", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04518", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04492", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04501", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04471", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04496", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04509", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04545", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.0456", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04548", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04533", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0232" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243754", "reference_id": "2243754", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:18:59Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243754" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2024-0232", "reference_id": "CVE-2024-0232", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:18:59Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2024-0232" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939883?format=api", "purl": "pkg:deb/debian/sqlite3@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939868?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939866?format=api", "purl": "pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2k32-4p92-1ygz" }, { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-jree-ndwj-kfcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939900?format=api", "purl": "pkg:deb/debian/sqlite3@3.43.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.43.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939870?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939869?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-0232" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ph3q-9hjf-hbgh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61419?format=api", "vulnerability_id": "VCID-v5e8-wxcu-nka7", "summary": "Multiple vulnerabilities have been discovered in SQLite, the worst of which may lead to code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31239.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31239.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31239", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05163", "scoring_system": "epss", "scoring_elements": "0.89854", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05163", "scoring_system": "epss", "scoring_elements": "0.89857", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05163", "scoring_system": "epss", "scoring_elements": "0.89871", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05163", "scoring_system": "epss", "scoring_elements": "0.89876", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05163", "scoring_system": "epss", "scoring_elements": "0.89893", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05163", "scoring_system": "epss", "scoring_elements": "0.89897", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05163", "scoring_system": "epss", "scoring_elements": "0.89904", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05163", "scoring_system": "epss", "scoring_elements": "0.89902", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05163", "scoring_system": "epss", "scoring_elements": "0.89895", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05163", "scoring_system": "epss", "scoring_elements": "0.89909", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05163", "scoring_system": "epss", "scoring_elements": "0.8991", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31239" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207557", "reference_id": "2207557", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207557" }, { "reference_url": "https://security.gentoo.org/glsa/202311-03", "reference_id": "GLSA-202311-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202311-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939883?format=api", "purl": "pkg:deb/debian/sqlite3@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939868?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939894?format=api", "purl": "pkg:deb/debian/sqlite3@3.36.0-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.36.0-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939866?format=api", "purl": "pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2k32-4p92-1ygz" }, { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-jree-ndwj-kfcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939870?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939869?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-31239" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v5e8-wxcu-nka7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70455?format=api", "vulnerability_id": "VCID-yc3b-t64n-zyc5", "summary": "sqlite: Integer Overflow in SQLite concat_ws Function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-29087.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-29087.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-29087", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44369", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44344", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44327", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44379", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44384", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44401", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44368", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44424", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44415", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44391", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-29087" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102411", "reference_id": "1102411", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102411" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358028", "reference_id": "2358028", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358028" }, { "reference_url": "https://sqlite.org/releaselog/3_49_1.html", "reference_id": "3_49_1.html", "reference_type": "", "scores": [ { "value": "3.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-08T13:27:16Z/" } ], "url": "https://sqlite.org/releaselog/3_49_1.html" }, { "reference_url": "https://gist.github.com/ylwango613/a44a29f1ef074fa783e29f04a0afd62a", "reference_id": "a44a29f1ef074fa783e29f04a0afd62a", "reference_type": "", "scores": [ { "value": "3.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-08T13:27:16Z/" } ], "url": "https://gist.github.com/ylwango613/a44a29f1ef074fa783e29f04a0afd62a" }, { "reference_url": "https://usn.ubuntu.com/7528-1/", "reference_id": "USN-7528-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7528-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939883?format=api", "purl": "pkg:deb/debian/sqlite3@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939868?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939866?format=api", "purl": "pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2k32-4p92-1ygz" }, { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-jree-ndwj-kfcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939901?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939870?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939869?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-29087" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yc3b-t64n-zyc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81768?format=api", "vulnerability_id": "VCID-z25w-w1h7-kkbv", "summary": "sqlite: pragma.c mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19646.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19646.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19646", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07192", "scoring_system": "epss", "scoring_elements": "0.91548", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07192", "scoring_system": "epss", "scoring_elements": "0.91555", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07192", "scoring_system": "epss", "scoring_elements": "0.91561", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07192", "scoring_system": "epss", "scoring_elements": "0.9157", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07192", "scoring_system": "epss", "scoring_elements": "0.91583", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07192", "scoring_system": "epss", "scoring_elements": "0.91589", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07192", "scoring_system": "epss", "scoring_elements": "0.91593", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07192", "scoring_system": "epss", "scoring_elements": "0.91595", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09456", "scoring_system": "epss", "scoring_elements": "0.92826", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09456", "scoring_system": "epss", "scoring_elements": "0.92821", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.09456", "scoring_system": "epss", "scoring_elements": "0.92822", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19646" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786743", "reference_id": "1786743", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16504", "reference_id": "RHSA-2025:16504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16504" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939883?format=api", "purl": "pkg:deb/debian/sqlite3@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939868?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939866?format=api", "purl": "pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2k32-4p92-1ygz" }, { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-jree-ndwj-kfcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939870?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939869?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-19646" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z25w-w1h7-kkbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81714?format=api", "vulnerability_id": "VCID-zr1v-9sde-b3fn", "summary": "sqlite: error mishandling because of incomplete fix of CVE-2019-19880", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19926.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19926.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19926", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06317", "scoring_system": "epss", "scoring_elements": "0.90921", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06317", "scoring_system": "epss", "scoring_elements": "0.90957", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06317", "scoring_system": "epss", "scoring_elements": "0.90926", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06317", "scoring_system": "epss", "scoring_elements": "0.90935", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06317", "scoring_system": "epss", "scoring_elements": "0.90946", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06317", "scoring_system": "epss", "scoring_elements": "0.90963", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06317", "scoring_system": "epss", "scoring_elements": "0.90972", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.08338", "scoring_system": "epss", "scoring_elements": "0.923", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08338", "scoring_system": "epss", "scoring_elements": "0.92299", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08338", "scoring_system": "epss", "scoring_elements": "0.9229", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08338", "scoring_system": "epss", "scoring_elements": "0.92288", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789364", "reference_id": "1789364", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789364" }, { "reference_url": "https://security.archlinux.org/ASA-202002-3", "reference_id": "ASA-202002-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202002-3" }, { "reference_url": "https://security.archlinux.org/AVG-1092", "reference_id": "AVG-1092", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1092" }, { "reference_url": "https://usn.ubuntu.com/4298-1/", "reference_id": "USN-4298-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4298-1/" }, { "reference_url": "https://usn.ubuntu.com/4298-2/", "reference_id": "USN-4298-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4298-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/939883?format=api", "purl": "pkg:deb/debian/sqlite3@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939868?format=api", "purl": "pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-7es8-7d9x-xfgm" }, { "vulnerability": "VCID-fyxk-hw7d-ruc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939866?format=api", "purl": "pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2k32-4p92-1ygz" }, { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-jree-ndwj-kfcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939870?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/939869?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-19926" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zr1v-9sde-b3fn" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie" }