Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1049484?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1049484?format=api", "purl": "pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2", "type": "deb", "namespace": "debian", "name": "sqlite3", "version": "3.40.1-2+deb12u2", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "3.46.1-7+deb13u1", "latest_non_vulnerable_version": "3.46.1-7+deb13u1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/97796?format=api", "vulnerability_id": "VCID-2k32-4p92-1ygz", "summary": "An integer overflow exists in the FTS5 https://sqlite.org/fts5.html extension. It occurs when the size of an array of tombstone pointers is calculated and truncated into a 32-bit integer. A pointer to partially controlled data can then be written out of bounds.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7709", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16749", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16938", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16903", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16932", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16965", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17002", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16905", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.1689", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.1684", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16708", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16825", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16961", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1803", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17731", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17819", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1788", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17896", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17852", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17803", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18431", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7709" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1114609", "reference_id": "1114609", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1114609" }, { "reference_url": "https://github.com/google/security-research/security/advisories/GHSA-v2c8-vqqp-hv3g", "reference_id": "GHSA-v2c8-vqqp-hv3g", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:N/VI:H/VA:L/SC:N/SI:H/SA:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T15:10:09Z/" } ], "url": "https://github.com/google/security-research/security/advisories/GHSA-v2c8-vqqp-hv3g" }, { "reference_url": "https://usn.ubuntu.com/7751-1/", "reference_id": "USN-7751-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7751-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1055425?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1" } ], "aliases": [ "CVE-2025-7709" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2k32-4p92-1ygz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70417?format=api", "vulnerability_id": "VCID-6xmb-3zgw-xudu", "summary": "sqlite: Denial of Service in SQLite", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-29088.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-29088.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-29088", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19557", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19345", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.1941", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19353", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19314", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19321", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19335", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19233", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19222", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19075", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19156", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19249", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.1921", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19245", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19603", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19324", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19402", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19453", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19458", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19578", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-29088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29088", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29088" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102670", "reference_id": "1102670", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102670" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358876", "reference_id": "2358876", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358876" }, { "reference_url": "https://sqlite.org/releaselog/3_49_1.html", "reference_id": "3_49_1.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T19:43:38Z/" } ], "url": "https://sqlite.org/releaselog/3_49_1.html" }, { "reference_url": "https://sqlite.org/forum/forumpost/48f365daec", "reference_id": "48f365daec", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T19:43:38Z/" } ], "url": "https://sqlite.org/forum/forumpost/48f365daec" }, { "reference_url": "https://github.com/sqlite/sqlite/commit/56d2fd008b108109f489339f5fd55212bb50afd4", "reference_id": "56d2fd008b108109f489339f5fd55212bb50afd4", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T19:43:38Z/" } ], "url": "https://github.com/sqlite/sqlite/commit/56d2fd008b108109f489339f5fd55212bb50afd4" }, { "reference_url": "https://gist.github.com/ylwango613/d3883fb9f6ba8a78086356779ce88248", "reference_id": "d3883fb9f6ba8a78086356779ce88248", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T19:43:38Z/" } ], "url": "https://gist.github.com/ylwango613/d3883fb9f6ba8a78086356779ce88248" }, { "reference_url": "https://usn.ubuntu.com/7528-1/", "reference_id": "USN-7528-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7528-1/" }, { "reference_url": "https://usn.ubuntu.com/7679-1/", "reference_id": "USN-7679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7679-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1055425?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1" } ], "aliases": [ "CVE-2025-29088" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6xmb-3zgw-xudu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68451?format=api", "vulnerability_id": "VCID-jree-ndwj-kfcy", "summary": "sqlite: SQLite integer overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7458.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7458.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7458", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21712", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.216", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21594", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21585", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21488", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21553", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21639", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21615", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23395", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23658", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23616", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23559", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23597", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23745", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23525", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23642", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24598", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24589", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24566", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7458" }, { "reference_url": "https://sqlite.org/src/info/12ad822d9b827777", "reference_id": "12ad822d9b827777", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-29T13:30:48Z/" } ], "url": "https://sqlite.org/src/info/12ad822d9b827777" }, { "reference_url": "https://sqlite.org/forum/forumpost/16ce2bb7a639e29b", "reference_id": "16ce2bb7a639e29b", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-29T13:30:48Z/" } ], "url": "https://sqlite.org/forum/forumpost/16ce2bb7a639e29b" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384237", "reference_id": "2384237", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384237" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1055425?format=api", "purl": "pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1" } ], "aliases": [ "CVE-2025-7458" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jree-ndwj-kfcy" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13197?format=api", "vulnerability_id": "VCID-7es8-7d9x-xfgm", "summary": "Improper Validation of Array Index\nSQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35737.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35737.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35737", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.97937", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.97933", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.97929", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.97895", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.97904", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.97899", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.97896", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.97926", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.97928", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.97924", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.97917", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.97918", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.9792", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.97919", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.97912", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.97911", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.9791", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.51941", "scoring_system": "epss", "scoring_elements": "0.97907", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35737" }, { "reference_url": "https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35737" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/rusqlite/rusqlite", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/rusqlite/rusqlite" }, { "reference_url": "https://kb.cert.org/vuls/id/720344", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/" } ], "url": "https://kb.cert.org/vuls/id/720344" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2022-0090.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2022-0090.html" }, { "reference_url": "https://security.gentoo.org/glsa/202210-40", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/" } ], "url": "https://security.gentoo.org/glsa/202210-40" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220915-0009", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20220915-0009" }, { "reference_url": "https://sqlite.org/releaselog/3_39_2.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/" } ], "url": "https://sqlite.org/releaselog/3_39_2.html" }, { "reference_url": "https://www.sqlite.org/cves.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/" } ], "url": "https://www.sqlite.org/cves.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110291", "reference_id": "2110291", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110291" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35737", "reference_id": "CVE-2022-35737", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35737" }, { "reference_url": "https://github.com/advisories/GHSA-jw36-hf63-69r9", "reference_id": "GHSA-jw36-hf63-69r9", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-jw36-hf63-69r9" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220915-0009/", "reference_id": "ntap-20220915-0009", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220915-0009/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0110", "reference_id": "RHSA-2023:0110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0339", "reference_id": "RHSA-2023:0339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0425", "reference_id": "RHSA-2024:0425", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0425" }, { "reference_url": "https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/", "reference_id": "sqlite-vulnerability-july-2022-library-api", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/" } ], "url": "https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/" }, { "reference_url": "https://usn.ubuntu.com/5712-1/", "reference_id": "USN-5712-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5712-1/" }, { "reference_url": "https://usn.ubuntu.com/5716-1/", "reference_id": "USN-5716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5716-1/" }, { "reference_url": "https://usn.ubuntu.com/5716-2/", "reference_id": "USN-5716-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5716-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049484?format=api", "purl": "pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2k32-4p92-1ygz" }, { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-jree-ndwj-kfcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2" } ], "aliases": [ "CVE-2022-35737", "GHSA-jw36-hf63-69r9" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7es8-7d9x-xfgm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94830?format=api", "vulnerability_id": "VCID-bgz9-v5cv-8kea", "summary": "A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-36690", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76655", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76623", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76636", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76626", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82589", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82533", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82532", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82549", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82386", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82405", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82401", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82395", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.8243", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82435", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82457", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82467", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82471", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82491", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0172", "scoring_system": "epss", "scoring_elements": "0.82513", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-36690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/AVG-2318", "reference_id": "AVG-2318", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2318" }, { "reference_url": "https://security.archlinux.org/AVG-2319", "reference_id": "AVG-2319", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2319" }, { "reference_url": "https://usn.ubuntu.com/5403-1/", "reference_id": "USN-5403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049484?format=api", "purl": "pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2k32-4p92-1ygz" }, { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-jree-ndwj-kfcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2" } ], "aliases": [ "CVE-2021-36690" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bgz9-v5cv-8kea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68660?format=api", "vulnerability_id": "VCID-fyxk-hw7d-ruc4", "summary": "sqlite: Integer Truncation in SQLite", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6965.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6965.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-6965", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35599", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35719", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35645", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77282", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77338", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77316", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77287", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01018", "scoring_system": "epss", "scoring_elements": "0.77261", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01026", "scoring_system": "epss", "scoring_elements": "0.77313", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01026", "scoring_system": "epss", "scoring_elements": "0.77353", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01182", "scoring_system": "epss", "scoring_elements": "0.78796", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01182", "scoring_system": "epss", "scoring_elements": "0.78793", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81282", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81296", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81275", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01524", "scoring_system": "epss", "scoring_elements": "0.81274", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01617", "scoring_system": "epss", "scoring_elements": "0.81941", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01617", "scoring_system": "epss", "scoring_elements": "0.81959", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82413", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-6965" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6965", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6965" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109379", "reference_id": "1109379", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109379" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149", "reference_id": "2380149", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149" }, { "reference_url": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8", "reference_id": "5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/S:N/AU:N/R:U/V:D/RE:L/U:Green" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-15T13:55:28Z/" } ], "url": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/52499.py", "reference_id": "CVE-2025-6965", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/52499.py" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11802", "reference_id": "RHSA-2025:11802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11803", "reference_id": "RHSA-2025:11803", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11803" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11933", "reference_id": "RHSA-2025:11933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11992", "reference_id": "RHSA-2025:11992", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11992" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12010", "reference_id": "RHSA-2025:12010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12036", "reference_id": "RHSA-2025:12036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12349", "reference_id": "RHSA-2025:12349", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12349" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12521", "reference_id": "RHSA-2025:12521", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12521" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12522", "reference_id": "RHSA-2025:12522", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12522" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12749", "reference_id": "RHSA-2025:12749", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12749" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12901", "reference_id": "RHSA-2025:12901", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12901" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12904", "reference_id": "RHSA-2025:12904", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12904" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12905", "reference_id": "RHSA-2025:12905", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12905" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13267", "reference_id": "RHSA-2025:13267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13335", "reference_id": "RHSA-2025:13335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14101", "reference_id": "RHSA-2025:14101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15827", "reference_id": "RHSA-2025:15827", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15827" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15828", "reference_id": "RHSA-2025:15828", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15828" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18219", "reference_id": "RHSA-2025:18219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18219" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20936", "reference_id": "RHSA-2025:20936", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20936" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21913", "reference_id": "RHSA-2025:21913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21994", "reference_id": "RHSA-2025:21994", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21994" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22529", "reference_id": "RHSA-2025:22529", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22529" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22548", "reference_id": "RHSA-2025:22548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22868", "reference_id": "RHSA-2025:22868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23078", "reference_id": "RHSA-2025:23078", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23078" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23079", "reference_id": "RHSA-2025:23079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23080", "reference_id": "RHSA-2025:23080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23248", "reference_id": "RHSA-2025:23248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0001", "reference_id": "RHSA-2026:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0076", "reference_id": "RHSA-2026:0076", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0076" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0077", "reference_id": "RHSA-2026:0077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0078", "reference_id": "RHSA-2026:0078", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0078" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0934", "reference_id": "RHSA-2026:0934", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0934" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1652", "reference_id": "RHSA-2026:1652", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1652" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3461", "reference_id": "RHSA-2026:3461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3462", "reference_id": "RHSA-2026:3462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6481", "reference_id": "RHSA-2026:6481", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6481" }, { "reference_url": "https://usn.ubuntu.com/7676-1/", "reference_id": "USN-7676-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7676-1/" }, { "reference_url": "https://usn.ubuntu.com/7679-1/", "reference_id": "USN-7679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7679-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049484?format=api", "purl": "pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2k32-4p92-1ygz" }, { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-jree-ndwj-kfcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2" } ], "aliases": [ "CVE-2025-6965" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fyxk-hw7d-ruc4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77877?format=api", "vulnerability_id": "VCID-jqy9-zum8-aqfn", "summary": "sqlite: heap-buffer-overflow at sessionfuzz", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7104.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7104.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-7104", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32443", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.31782", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.31759", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.31852", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.31845", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.31772", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.31921", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32004", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32126", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32329", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32352", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32316", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32343", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32478", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32379", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32351", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.3238", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-7104" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7104", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7104" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://sqlite.org/src/info/0e4e7a05c4204b47", "reference_id": "0e4e7a05c4204b47", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/" } ], "url": "https://sqlite.org/src/info/0e4e7a05c4204b47" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256194", "reference_id": "2256194", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256194" }, { "reference_url": "https://sqlite.org/forum/forumpost/5bcbf4571c", "reference_id": "5bcbf4571c", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/" } ], "url": "https://sqlite.org/forum/forumpost/5bcbf4571c" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/", "reference_id": "AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/" }, { "reference_url": "https://vuldb.com/?ctiid.248999", "reference_id": "?ctiid.248999", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/" } ], "url": "https://vuldb.com/?ctiid.248999" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/", "reference_id": "D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/" }, { "reference_url": "https://vuldb.com/?id.248999", "reference_id": "?id.248999", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/" } ], "url": "https://vuldb.com/?id.248999" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240112-0008/", "reference_id": "ntap-20240112-0008", "reference_type": "", "scores": [ { "value": "5.2", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240112-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0253", "reference_id": "RHSA-2024:0253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0465", "reference_id": "RHSA-2024:0465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0589", "reference_id": "RHSA-2024:0589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1081", "reference_id": "RHSA-2024:1081", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1081" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1107", "reference_id": "RHSA-2024:1107", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1107" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1383", "reference_id": "RHSA-2024:1383", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1383" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1477", "reference_id": "RHSA-2024:1477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1477" }, { "reference_url": "https://usn.ubuntu.com/6566-1/", "reference_id": "USN-6566-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6566-1/" }, { "reference_url": "https://usn.ubuntu.com/6566-2/", "reference_id": "USN-6566-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6566-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049484?format=api", "purl": "pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2k32-4p92-1ygz" }, { "vulnerability": "VCID-6xmb-3zgw-xudu" }, { "vulnerability": "VCID-jree-ndwj-kfcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2" } ], "aliases": [ "CVE-2023-7104" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqy9-zum8-aqfn" } ], "risk_score": "3.1", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2" }