{"url":"http://public2.vulnerablecode.io/api/packages/572263?format=json","purl":"pkg:deb/debian/sqlite3@3.7.13-1%2Bdeb7u2","type":"deb","namespace":"debian","name":"sqlite3","version":"3.7.13-1+deb7u2","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"3.46.1-7+deb13u1","latest_non_vulnerable_version":"3.46.1-7+deb13u1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59800?format=json","vulnerability_id":"VCID-1t89-sr37-s3f6","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5827.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5827.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5827","reference_id":"","reference_type":"","scores":[{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.89703","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.89666","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.8968","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.89681","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.89676","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.89691","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.89693","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.89692","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.89672","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05052","scoring_system":"epss","scoring_elements":"0.89735","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05052","scoring_system":"epss","scoring_elements":"0.8975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05052","scoring_system":"epss","scoring_elements":"0.89752","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05052","scoring_system":"epss","scoring_elements":"0.89769","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05052","scoring_system":"epss","scoring_elements":"0.89775","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05052","scoring_system":"epss","scoring_elements":"0.89782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05052","scoring_system":"epss","scoring_elements":"0.89732","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5810","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5810"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5821","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5821"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5828","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5828"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5829","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5829"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5832","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5832"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5838","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5838"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5839","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5839"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5847","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5847"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5848","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5853","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5853"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5868","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6504"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1706805","reference_id":"1706805","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1706805"},{"reference_url":"https://security.gentoo.org/glsa/202003-16","reference_id":"GLSA-202003-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1243","reference_id":"RHSA-2019:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4396","reference_id":"RHSA-2021:4396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4396"},{"reference_url":"https://usn.ubuntu.com/4205-1/","reference_id":"USN-4205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4205-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049482?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1"}],"aliases":["CVE-2019-5827"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1t89-sr37-s3f6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31392?format=json","vulnerability_id":"VCID-1ufy-3uwy-afgx","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13630.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13630.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13630","reference_id":"","reference_type":"","scores":[{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22675","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2285","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22895","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22687","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22763","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22836","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22814","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24547","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24724","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24713","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24669","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24815","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24808","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24785","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31248","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31205","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13630"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13630","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13630"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841562","reference_id":"1841562","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841562"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4442","reference_id":"RHSA-2020:4442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1968","reference_id":"RHSA-2021:1968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16504","reference_id":"RHSA-2025:16504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16504"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2020-13630"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1ufy-3uwy-afgx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45190?format=json","vulnerability_id":"VCID-2w6e-cvgg-pqax","summary":"Multiple vulnerabilities have been found in SQLite, allowing\n    context-dependent attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3415.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3415.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3415","reference_id":"","reference_type":"","scores":[{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90398","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90321","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90324","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90336","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.9034","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90354","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.9036","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90369","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90368","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90362","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90377","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90376","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90375","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.9039","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90385","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212356","reference_id":"1212356","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212356"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968","reference_id":"783968","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968"},{"reference_url":"https://security.gentoo.org/glsa/201507-05","reference_id":"GLSA-201507-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1635","reference_id":"RHSA-2015:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1635"},{"reference_url":"https://usn.ubuntu.com/2698-1/","reference_id":"USN-2698-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2698-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036354?format=json","purl":"pkg:deb/debian/sqlite3@3.8.7.1-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t89-sr37-s3f6"},{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2w6e-cvgg-pqax"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4r35-q18a-2kd2"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5kd2-8zpg-6fah"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-6w13-qjnb-xbb4"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-88s4-hq8j-dba4"},{"vulnerability":"VCID-8d7j-g2rf-tydw"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-gprj-j4v6-z7ev"},{"vulnerability":"VCID-hfyf-qs8x-pkba"},{"vulnerability":"VCID-j7cb-3ptn-9qeb"},{"vulnerability":"VCID-j97s-6d3q-2yb8"},{"vulnerability":"VCID-jc4t-g7qn-tfc7"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-kvpm-8vj2-8qcj"},{"vulnerability":"VCID-mqb8-wfvg-xbgz"},{"vulnerability":"VCID-mvbm-keyp-akf1"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-q8wn-gjw8-fkhu"},{"vulnerability":"VCID-qhcj-2nua-8kde"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-tpxf-9kf6-dbf8"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-uxd9-2vze-w3ge"},{"vulnerability":"VCID-vchu-y7qg-pucp"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-ym2v-jfk4-q3f5"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.8.7.1-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049267?format=json","purl":"pkg:deb/debian/sqlite3@3.16.2-3~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t89-sr37-s3f6"},{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4r35-q18a-2kd2"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5kd2-8zpg-6fah"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-88s4-hq8j-dba4"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-gprj-j4v6-z7ev"},{"vulnerability":"VCID-hfyf-qs8x-pkba"},{"vulnerability":"VCID-j7cb-3ptn-9qeb"},{"vulnerability":"VCID-jc4t-g7qn-tfc7"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-mqb8-wfvg-xbgz"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-qhcj-2nua-8kde"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-tpxf-9kf6-dbf8"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-vchu-y7qg-pucp"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-ym2v-jfk4-q3f5"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-3~bpo8%252B1"}],"aliases":["CVE-2015-3415"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2w6e-cvgg-pqax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31388?format=json","vulnerability_id":"VCID-2xdd-xysv-sufz","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11656.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11656.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-11656","reference_id":"","reference_type":"","scores":[{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89158","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89215","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89164","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89179","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.892","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89204","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89211","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89208","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06078","scoring_system":"epss","scoring_elements":"0.90788","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06078","scoring_system":"epss","scoring_elements":"0.90782","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06078","scoring_system":"epss","scoring_elements":"0.90801","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06078","scoring_system":"epss","scoring_elements":"0.90777","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06078","scoring_system":"epss","scoring_elements":"0.90776","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06078","scoring_system":"epss","scoring_elements":"0.90787","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06078","scoring_system":"epss","scoring_elements":"0.9078","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-11656"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","reference_id":"","reference_type":"","scores":[],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","reference_id":"","reference_type":"","scores":[],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20200416-0001/"},{"reference_url":"https://www3.sqlite.org/cgi/src/info/b64674919f673602","reference_id":"","reference_type":"","scores":[],"url":"https://www3.sqlite.org/cgi/src/info/b64674919f673602"},{"reference_url":"https://www.oracle.com/security-alerts/cpuApr2021.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2021.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"reference_url":"https://www.sqlite.org/src/info/d09f8c3621d5f7f8","reference_id":"","reference_type":"","scores":[],"url":"https://www.sqlite.org/src/info/d09f8c3621d5f7f8"},{"reference_url":"https://www.tenable.com/security/tns-2021-14","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2021-14"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1824185","reference_id":"1824185","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1824185"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11656","reference_id":"CVE-2020-11656","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11656"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16504","reference_id":"RHSA-2025:16504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16504"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2020-11656"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2xdd-xysv-sufz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81708?format=json","vulnerability_id":"VCID-3686-kxzp-gbcf","summary":"sqlite: mishandles certain uses of INSERT INTO in situations involving embedded '\\0' characters in filenames","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19959.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19959.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19959","reference_id":"","reference_type":"","scores":[{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66739","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66775","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66824","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66838","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66858","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66844","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66812","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66845","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66859","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66843","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66868","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66881","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66878","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66849","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19959"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1789595","reference_id":"1789595","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1789595"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1810","reference_id":"RHSA-2020:1810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1810"},{"reference_url":"https://usn.ubuntu.com/4298-1/","reference_id":"USN-4298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4298-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2019-19959"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3686-kxzp-gbcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84207?format=json","vulnerability_id":"VCID-4r35-q18a-2kd2","summary":"sqlite: Heap-buffer overflow in the getNodeSize function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10989.json","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10989.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10989","reference_id":"","reference_type":"","scores":[{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93876","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93885","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93894","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93906","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.9391","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93913","published_at":"2026-04-11T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93914","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93935","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.9394","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93941","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93943","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93942","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93951","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10989"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469672","reference_id":"1469672","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469672"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867618","reference_id":"867618","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867618"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"},{"reference_url":"https://usn.ubuntu.com/4019-2/","reference_id":"USN-4019-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049482?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1"}],"aliases":["CVE-2017-10989"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4r35-q18a-2kd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81766?format=json","vulnerability_id":"VCID-4u4w-a4gk-rqfx","summary":"sqlite: infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19645.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19645.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19645","reference_id":"","reference_type":"","scores":[{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.5277","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.5282","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52788","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52839","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52833","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52883","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52867","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52851","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60755","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.6082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60826","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.6081","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60799","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60812","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60804","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1783305","reference_id":"1783305","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1783305"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946612","reference_id":"946612","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946612"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16504","reference_id":"RHSA-2025:16504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16504"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2019-19645"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4u4w-a4gk-rqfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82961?format=json","vulnerability_id":"VCID-5kd2-8zpg-6fah","summary":"sqlite: Multiple flaws in sqlite which can be triggered via corrupted internal databases (Magellan)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20505.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20505.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20505","reference_id":"","reference_type":"","scores":[{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.9168","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.91722","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.91688","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.91694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.91702","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.91715","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.91725","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.91727","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.91723","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08735","scoring_system":"epss","scoring_elements":"0.92518","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08735","scoring_system":"epss","scoring_elements":"0.92515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08735","scoring_system":"epss","scoring_elements":"0.92512","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08735","scoring_system":"epss","scoring_elements":"0.92516","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08735","scoring_system":"epss","scoring_elements":"0.92517","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08735","scoring_system":"epss","scoring_elements":"0.92524","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20505"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/62","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/62"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/64","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/64"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/66","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/66"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/67","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/67"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/68","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/68"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/69","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/69"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/28","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/28"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/29","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/29"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/31","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/31"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/32","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/32"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/33","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/33"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/39","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/39"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190502-0004/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190502-0004/"},{"reference_url":"https://sqlite.org/src/info/1a84668dcfdebaf12415d","reference_id":"","reference_type":"","scores":[],"url":"https://sqlite.org/src/info/1a84668dcfdebaf12415d"},{"reference_url":"https://support.apple.com/kb/HT209443","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209443"},{"reference_url":"https://support.apple.com/kb/HT209446","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209446"},{"reference_url":"https://support.apple.com/kb/HT209447","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209447"},{"reference_url":"https://support.apple.com/kb/HT209448","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209448"},{"reference_url":"https://support.apple.com/kb/HT209450","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209450"},{"reference_url":"https://support.apple.com/kb/HT209451","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209451"},{"reference_url":"http://www.securityfocus.com/bid/106698","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106698"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379","reference_id":"1659379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20505","reference_id":"CVE-2018-20505","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20505"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049482?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1"}],"aliases":["CVE-2018-20505"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5kd2-8zpg-6fah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81684?format=json","vulnerability_id":"VCID-5wf9-5w85-2ybf","summary":"sqlite: incorrect sqlite3WindowRewrite() error handling leads to mishandling certain parser-tree rewriting","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19924.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19924.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19924","reference_id":"","reference_type":"","scores":[{"value":"0.04739","scoring_system":"epss","scoring_elements":"0.89369","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04739","scoring_system":"epss","scoring_elements":"0.89373","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04739","scoring_system":"epss","scoring_elements":"0.89384","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04739","scoring_system":"epss","scoring_elements":"0.89386","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04739","scoring_system":"epss","scoring_elements":"0.89402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04739","scoring_system":"epss","scoring_elements":"0.89406","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04739","scoring_system":"epss","scoring_elements":"0.89414","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.91001","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.90955","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.90954","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.90978","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.90976","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.9099","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.90988","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.90984","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788842","reference_id":"1788842","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1810","reference_id":"RHSA-2020:1810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1810"},{"reference_url":"https://usn.ubuntu.com/4298-1/","reference_id":"USN-4298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4298-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2019-19924"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5wf9-5w85-2ybf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85041?format=json","vulnerability_id":"VCID-6w13-qjnb-xbb4","summary":"sqlite: Tempdir selection vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6153.json","reference_id":"","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6153.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6153","reference_id":"","reference_type":"","scores":[{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09212","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09259","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09264","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09307","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09313","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09283","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09164","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09158","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09311","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0936","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09315","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09285","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09199","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6153"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1352437","reference_id":"1352437","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1352437"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"},{"reference_url":"https://usn.ubuntu.com/4019-2/","reference_id":"USN-4019-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049267?format=json","purl":"pkg:deb/debian/sqlite3@3.16.2-3~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t89-sr37-s3f6"},{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4r35-q18a-2kd2"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5kd2-8zpg-6fah"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-88s4-hq8j-dba4"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-gprj-j4v6-z7ev"},{"vulnerability":"VCID-hfyf-qs8x-pkba"},{"vulnerability":"VCID-j7cb-3ptn-9qeb"},{"vulnerability":"VCID-jc4t-g7qn-tfc7"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-mqb8-wfvg-xbgz"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-qhcj-2nua-8kde"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-tpxf-9kf6-dbf8"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-vchu-y7qg-pucp"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-ym2v-jfk4-q3f5"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-3~bpo8%252B1"}],"aliases":["CVE-2016-6153"],"risk_score":1.0,"exploitability":"0.5","weighted_severity":"2.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6w13-qjnb-xbb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81767?format=json","vulnerability_id":"VCID-7wt9-4myp-w3gu","summary":"sqlite: mishandling of certain SELECT statements with non-existent VIEW can lead to DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19603.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19603.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19603","reference_id":"","reference_type":"","scores":[{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70622","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70637","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70656","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70679","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70695","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70717","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70701","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70686","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70731","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70738","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.7077","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70779","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.7078","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70761","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1785318","reference_id":"1785318","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1785318"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4396","reference_id":"RHSA-2021:4396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4396"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2019-19603"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7wt9-4myp-w3gu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60260?format=json","vulnerability_id":"VCID-88s4-hq8j-dba4","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9936.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9936.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9936","reference_id":"","reference_type":"","scores":[{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89131","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89178","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89182","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89195","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89191","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89208","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89214","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89153","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89156","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89174","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89185","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05055","scoring_system":"epss","scoring_elements":"0.89803","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05055","scoring_system":"epss","scoring_elements":"0.89817","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9936"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190416-0005/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190416-0005/"},{"reference_url":"https://sqlite.org/src/info/b3fa58dd7403dbd4","reference_id":"","reference_type":"","scores":[],"url":"https://sqlite.org/src/info/b3fa58dd7403dbd4"},{"reference_url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114382.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114382.html"},{"reference_url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114394.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114394.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"http://www.securityfocus.com/bid/107562","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107562"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1692365","reference_id":"1692365","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1692365"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925289","reference_id":"925289","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9936","reference_id":"CVE-2019-9936","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9936"},{"reference_url":"https://security.gentoo.org/glsa/201908-09","reference_id":"GLSA-201908-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201908-09"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049482?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1"}],"aliases":["CVE-2019-9936"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-88s4-hq8j-dba4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93199?format=json","vulnerability_id":"VCID-8d7j-g2rf-tydw","summary":"An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"SQLite\" component. A use-after-free vulnerability allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SQL statement.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2513","reference_id":"","reference_type":"","scores":[{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85252","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85264","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85282","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85285","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85307","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85329","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85327","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85324","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85344","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85346","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85343","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85366","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85375","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85374","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85388","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2513"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049267?format=json","purl":"pkg:deb/debian/sqlite3@3.16.2-3~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t89-sr37-s3f6"},{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4r35-q18a-2kd2"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5kd2-8zpg-6fah"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-88s4-hq8j-dba4"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-gprj-j4v6-z7ev"},{"vulnerability":"VCID-hfyf-qs8x-pkba"},{"vulnerability":"VCID-j7cb-3ptn-9qeb"},{"vulnerability":"VCID-jc4t-g7qn-tfc7"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-mqb8-wfvg-xbgz"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-qhcj-2nua-8kde"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-tpxf-9kf6-dbf8"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-vchu-y7qg-pucp"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-ym2v-jfk4-q3f5"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-3~bpo8%252B1"}],"aliases":["CVE-2017-2513"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8d7j-g2rf-tydw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81726?format=json","vulnerability_id":"VCID-8m3z-fgqg-4fgn","summary":"sqlite: invalid pointer dereference in exprListAppendList in window.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19880.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19880.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19880","reference_id":"","reference_type":"","scores":[{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.90977","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.90982","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.90991","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91001","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91013","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91027","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.92364","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.92347","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.92345","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.92356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.92355","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.9236","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.92361","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.92354","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19880"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1787032","reference_id":"1787032","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1787032"},{"reference_url":"https://security.archlinux.org/ASA-202002-3","reference_id":"ASA-202002-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-3"},{"reference_url":"https://security.archlinux.org/AVG-1092","reference_id":"AVG-1092","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1092"},{"reference_url":"https://usn.ubuntu.com/4298-1/","reference_id":"USN-4298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4298-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2019-19880"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8m3z-fgqg-4fgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31394?format=json","vulnerability_id":"VCID-9ggb-qwny-qqhb","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13632.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13632.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13632","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06449","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06481","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06509","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.065","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0655","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06592","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06586","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06578","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06569","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06505","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06513","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06663","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06674","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06684","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06702","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13632"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841574","reference_id":"1841574","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841574"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4442","reference_id":"RHSA-2020:4442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1968","reference_id":"RHSA-2021:1968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16504","reference_id":"RHSA-2025:16504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16504"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2020-13632"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ggb-qwny-qqhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81795?format=json","vulnerability_id":"VCID-ajrb-8r3r-afe3","summary":"sqlite: SQL injection in sqlite3ExprCodeTarget in expr.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19242.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19242.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19242","reference_id":"","reference_type":"","scores":[{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42084","published_at":"2026-04-01T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.4217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42109","published_at":"2026-04-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.4216","published_at":"2026-04-08T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42171","published_at":"2026-04-09T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42194","published_at":"2026-04-11T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42157","published_at":"2026-04-12T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.4213","published_at":"2026-04-13T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42181","published_at":"2026-04-16T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42156","published_at":"2026-04-18T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42085","published_at":"2026-04-21T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.4203","published_at":"2026-04-24T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42025","published_at":"2026-04-26T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41941","published_at":"2026-04-29T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41799","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19242"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19242"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1778867","reference_id":"1778867","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1778867"},{"reference_url":"https://usn.ubuntu.com/4205-1/","reference_id":"USN-4205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4205-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2019-19242"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ajrb-8r3r-afe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94830?format=json","vulnerability_id":"VCID-bgz9-v5cv-8kea","summary":"A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-36690","reference_id":"","reference_type":"","scores":[{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76655","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76623","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76626","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82491","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82457","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82467","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82471","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82386","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82405","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82401","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82395","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.8243","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82435","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-36690"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.archlinux.org/AVG-2318","reference_id":"AVG-2318","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2318"},{"reference_url":"https://security.archlinux.org/AVG-2319","reference_id":"AVG-2319","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2319"},{"reference_url":"https://usn.ubuntu.com/5403-1/","reference_id":"USN-5403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049484?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2"}],"aliases":["CVE-2021-36690"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bgz9-v5cv-8kea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59150?format=json","vulnerability_id":"VCID-bxfk-dmdp-53f3","summary":"A vulnerability in SQLite could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20227.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20227.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20227","reference_id":"","reference_type":"","scores":[{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43493","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43554","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43581","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43519","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.4357","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43584","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43602","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43572","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43616","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43605","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43541","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43472","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43476","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43393","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43263","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20227"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20227","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20227"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1924886","reference_id":"1924886","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1924886"},{"reference_url":"https://security.archlinux.org/AVG-1536","reference_id":"AVG-1536","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1536"},{"reference_url":"https://security.gentoo.org/glsa/202103-04","reference_id":"GLSA-202103-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202103-04"},{"reference_url":"https://usn.ubuntu.com/4732-1/","reference_id":"USN-4732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4732-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2021-20227"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bxfk-dmdp-53f3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31396?format=json","vulnerability_id":"VCID-chtp-rtmg-6ud5","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15358.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15358.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15358","reference_id":"","reference_type":"","scores":[{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11073","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11216","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11279","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11092","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11171","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11228","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11237","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11205","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11044","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11053","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11185","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11119","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11074","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1101","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10946","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1851957","reference_id":"1851957","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1851957"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1581","reference_id":"RHSA-2021:1581","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1581"},{"reference_url":"https://usn.ubuntu.com/4438-1/","reference_id":"USN-4438-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4438-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2020-15358"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-chtp-rtmg-6ud5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81573?format=json","vulnerability_id":"VCID-edrj-chna-ekam","summary":"sqlite: Out of bounds access during table rename","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35527.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35527.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35527","reference_id":"","reference_type":"","scores":[{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48508","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48632","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48644","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48693","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48689","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48646","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.4863","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48641","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48591","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50887","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.5094","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50923","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.5098","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50978","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.5102","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35527"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122329","reference_id":"2122329","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7108","reference_id":"RHSA-2022:7108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7108"},{"reference_url":"https://usn.ubuntu.com/5615-1/","reference_id":"USN-5615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2020-35527"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-edrj-chna-ekam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31395?format=json","vulnerability_id":"VCID-eu7t-2h5s-4kc5","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13871.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13871","reference_id":"","reference_type":"","scores":[{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85095","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85124","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85128","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.8515","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85157","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85171","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85169","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85166","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85187","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85188","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.8521","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85219","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85216","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85231","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1845576","reference_id":"1845576","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1845576"},{"reference_url":"https://security.archlinux.org/ASA-202006-11","reference_id":"ASA-202006-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202006-11"},{"reference_url":"https://security.archlinux.org/AVG-1182","reference_id":"AVG-1182","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1182"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2020-13871"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eu7t-2h5s-4kc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59802?format=json","vulnerability_id":"VCID-f9jg-cmg5-6ubq","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9327.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9327.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9327","reference_id":"","reference_type":"","scores":[{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.71992","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72012","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.71987","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72026","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72039","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.71984","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72063","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76459","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76448","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76379","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76374","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76414","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76421","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76405","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76439","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76446","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9327"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9327","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9327"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1809315","reference_id":"1809315","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1809315"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951835","reference_id":"951835","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951835"},{"reference_url":"https://security.gentoo.org/glsa/202003-16","reference_id":"GLSA-202003-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4442","reference_id":"RHSA-2020:4442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4442"},{"reference_url":"https://usn.ubuntu.com/4298-1/","reference_id":"USN-4298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4298-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2020-9327"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f9jg-cmg5-6ubq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31386?format=json","vulnerability_id":"VCID-gb4s-4wcm-eyft","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20218.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20218.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20218","reference_id":"","reference_type":"","scores":[{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60668","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60742","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60771","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60735","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60799","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.6082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60807","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60788","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60831","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60836","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60821","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.6081","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60823","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60816","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60766","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20218"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791313","reference_id":"1791313","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791313"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4442","reference_id":"RHSA-2020:4442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4442"},{"reference_url":"https://usn.ubuntu.com/4298-1/","reference_id":"USN-4298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4298-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2019-20218"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gb4s-4wcm-eyft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82962?format=json","vulnerability_id":"VCID-gprj-j4v6-z7ev","summary":"sqlite: Multiple flaws in sqlite which can be triggered via corrupted internal databases (Magellan)","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20506.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20506.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20506","reference_id":"","reference_type":"","scores":[{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92331","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92389","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.9238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92382","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92386","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92347","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92359","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92363","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92369","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92371","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20506"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/62","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/62"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/64","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/64"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/66","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/66"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/67","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/67"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/68","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/68"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/69","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/69"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/28","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/28"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/29","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/29"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/31","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/31"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/32","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/32"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/33","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/33"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/39","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/39"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190502-0004/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190502-0004/"},{"reference_url":"https://sqlite.org/src/info/940f2adc8541a838","reference_id":"","reference_type":"","scores":[],"url":"https://sqlite.org/src/info/940f2adc8541a838"},{"reference_url":"https://support.apple.com/kb/HT209443","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209443"},{"reference_url":"https://support.apple.com/kb/HT209446","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209446"},{"reference_url":"https://support.apple.com/kb/HT209447","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209447"},{"reference_url":"https://support.apple.com/kb/HT209448","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209448"},{"reference_url":"https://support.apple.com/kb/HT209450","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209450"},{"reference_url":"https://support.apple.com/kb/HT209451","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209451"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"http://www.securityfocus.com/bid/106698","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106698"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379","reference_id":"1659379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20506","reference_id":"CVE-2018-20506","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20506"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"},{"reference_url":"https://usn.ubuntu.com/4019-2/","reference_id":"USN-4019-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049482?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1"}],"aliases":["CVE-2018-20506"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gprj-j4v6-z7ev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84017?format=json","vulnerability_id":"VCID-hfyf-qs8x-pkba","summary":"sqlite: Local DoS via dump_callback function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13685.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13685.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13685","reference_id":"","reference_type":"","scores":[{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60434","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60588","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60591","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60576","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60509","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60536","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60506","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60554","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60571","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60592","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60597","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60603","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488881","reference_id":"1488881","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488881"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873762","reference_id":"873762","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873762"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"},{"reference_url":"https://usn.ubuntu.com/4019-2/","reference_id":"USN-4019-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049482?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1"}],"aliases":["CVE-2017-13685"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hfyf-qs8x-pkba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78528?format=json","vulnerability_id":"VCID-j7cb-3ptn-9qeb","summary":"sqlite: Crash due to misuse of window functions.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24736.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24736.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24736","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06746","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06823","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06867","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06853","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06908","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06935","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07434","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07446","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07435","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07361","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07348","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07475","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07425","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08793","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08716","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24736"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2186385","reference_id":"2186385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2186385"},{"reference_url":"https://www.sqlite.org/src/info/4feb3159c6bc3f7e33959","reference_id":"4feb3159c6bc3f7e33959","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T17:30:13Z/"}],"url":"https://www.sqlite.org/src/info/4feb3159c6bc3f7e33959"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230526-0005/","reference_id":"ntap-20230526-0005","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T17:30:13Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230526-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3840","reference_id":"RHSA-2023:3840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0425","reference_id":"RHSA-2024:0425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0425"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049482?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1"}],"aliases":["CVE-2020-24736"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j7cb-3ptn-9qeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45193?format=json","vulnerability_id":"VCID-j97s-6d3q-2yb8","summary":"Multiple vulnerabilities have been found in SQLite, allowing\n    context-dependent attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3416.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3416.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3416","reference_id":"","reference_type":"","scores":[{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91841","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.9177","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91779","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91785","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91793","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91805","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91812","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91815","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91817","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91813","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91833","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91832","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212357","reference_id":"1212357","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212357"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968","reference_id":"783968","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968"},{"reference_url":"https://security.gentoo.org/glsa/201507-05","reference_id":"GLSA-201507-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1634","reference_id":"RHSA-2015:1634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1635","reference_id":"RHSA-2015:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1635"},{"reference_url":"https://usn.ubuntu.com/2698-1/","reference_id":"USN-2698-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2698-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036354?format=json","purl":"pkg:deb/debian/sqlite3@3.8.7.1-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t89-sr37-s3f6"},{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2w6e-cvgg-pqax"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4r35-q18a-2kd2"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5kd2-8zpg-6fah"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-6w13-qjnb-xbb4"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-88s4-hq8j-dba4"},{"vulnerability":"VCID-8d7j-g2rf-tydw"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-gprj-j4v6-z7ev"},{"vulnerability":"VCID-hfyf-qs8x-pkba"},{"vulnerability":"VCID-j7cb-3ptn-9qeb"},{"vulnerability":"VCID-j97s-6d3q-2yb8"},{"vulnerability":"VCID-jc4t-g7qn-tfc7"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-kvpm-8vj2-8qcj"},{"vulnerability":"VCID-mqb8-wfvg-xbgz"},{"vulnerability":"VCID-mvbm-keyp-akf1"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-q8wn-gjw8-fkhu"},{"vulnerability":"VCID-qhcj-2nua-8kde"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-tpxf-9kf6-dbf8"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-uxd9-2vze-w3ge"},{"vulnerability":"VCID-vchu-y7qg-pucp"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-ym2v-jfk4-q3f5"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.8.7.1-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049267?format=json","purl":"pkg:deb/debian/sqlite3@3.16.2-3~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t89-sr37-s3f6"},{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4r35-q18a-2kd2"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5kd2-8zpg-6fah"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-88s4-hq8j-dba4"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-gprj-j4v6-z7ev"},{"vulnerability":"VCID-hfyf-qs8x-pkba"},{"vulnerability":"VCID-j7cb-3ptn-9qeb"},{"vulnerability":"VCID-jc4t-g7qn-tfc7"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-mqb8-wfvg-xbgz"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-qhcj-2nua-8kde"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-tpxf-9kf6-dbf8"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-vchu-y7qg-pucp"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-ym2v-jfk4-q3f5"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-3~bpo8%252B1"}],"aliases":["CVE-2015-3416"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j97s-6d3q-2yb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39747?format=json","vulnerability_id":"VCID-jc4t-g7qn-tfc7","summary":"A vulnerability in SQLite may allow for the remote execution of\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html"},{"reference_url":"https://access.redhat.com/articles/3758321","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/articles/3758321"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20346.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20346.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20346","reference_id":"","reference_type":"","scores":[{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.941","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.9417","published_at":"2026-05-05T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94157","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94162","published_at":"2026-04-18T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94161","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94164","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94109","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94121","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94124","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94133","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94137","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94142","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94141","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20346"},{"reference_url":"https://blade.tencent.com/magellan/index_en.html","reference_id":"","reference_type":"","scores":[],"url":"https://blade.tencent.com/magellan/index_en.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659677","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659677"},{"reference_url":"https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"},{"reference_url":"https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e","reference_id":"","reference_type":"","scores":[],"url":"https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e"},{"reference_url":"https://crbug.com/900910","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/900910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18336","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18336"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18337","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18339","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18348","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18348"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18349","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18349"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18350","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18350"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18351","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18351"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18353","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18354","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18354"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18355","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18355"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18357","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18357"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20067","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20067"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20070","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20070"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/"},{"reference_url":"https://news.ycombinator.com/item?id=18685296","reference_id":"","reference_type":"","scores":[],"url":"https://news.ycombinator.com/item?id=18685296"},{"reference_url":"https://sqlite.org/src/info/940f2adc8541a838","reference_id":"","reference_type":"","scores":[],"url":"https://sqlite.org/src/info/940f2adc8541a838"},{"reference_url":"https://sqlite.org/src/info/d44318f59044162e","reference_id":"","reference_type":"","scores":[],"url":"https://sqlite.org/src/info/d44318f59044162e"},{"reference_url":"https://support.apple.com/HT209443","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT209443"},{"reference_url":"https://support.apple.com/HT209446","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT209446"},{"reference_url":"https://support.apple.com/HT209447","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT209447"},{"reference_url":"https://support.apple.com/HT209448","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT209448"},{"reference_url":"https://support.apple.com/HT209450","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT209450"},{"reference_url":"https://support.apple.com/HT209451","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT209451"},{"reference_url":"https://worthdoingbadly.com/sqlitebug/","reference_id":"","reference_type":"","scores":[],"url":"https://worthdoingbadly.com/sqlitebug/"},{"reference_url":"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc","reference_id":"","reference_type":"","scores":[],"url":"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc"},{"reference_url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg113218.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg113218.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://www.sqlite.org/releaselog/3_25_3.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.sqlite.org/releaselog/3_25_3.html"},{"reference_url":"https://www.synology.com/security/advisory/Synology_SA_18_61","reference_id":"","reference_type":"","scores":[],"url":"https://www.synology.com/security/advisory/Synology_SA_18_61"},{"reference_url":"http://www.securityfocus.com/bid/106323","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106323"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379","reference_id":"1659379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379"},{"reference_url":"https://security.archlinux.org/AVG-840","reference_id":"AVG-840","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-840"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20346","reference_id":"CVE-2018-20346","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20346"},{"reference_url":"https://security.gentoo.org/glsa/201904-21","reference_id":"GLSA-201904-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-21"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"},{"reference_url":"https://usn.ubuntu.com/4019-2/","reference_id":"USN-4019-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049482?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1"}],"aliases":["CVE-2018-20346"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jc4t-g7qn-tfc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77877?format=json","vulnerability_id":"VCID-jqy9-zum8-aqfn","summary":"sqlite: heap-buffer-overflow at sessionfuzz","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7104.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7104.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-7104","reference_id":"","reference_type":"","scores":[{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32443","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31772","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31921","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32004","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32126","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32352","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32316","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32343","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32379","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32351","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32478","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-7104"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7104","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7104"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sqlite.org/src/info/0e4e7a05c4204b47","reference_id":"0e4e7a05c4204b47","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/"}],"url":"https://sqlite.org/src/info/0e4e7a05c4204b47"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256194","reference_id":"2256194","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256194"},{"reference_url":"https://sqlite.org/forum/forumpost/5bcbf4571c","reference_id":"5bcbf4571c","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/"}],"url":"https://sqlite.org/forum/forumpost/5bcbf4571c"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/","reference_id":"AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/"},{"reference_url":"https://vuldb.com/?ctiid.248999","reference_id":"?ctiid.248999","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/"}],"url":"https://vuldb.com/?ctiid.248999"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/","reference_id":"D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/"},{"reference_url":"https://vuldb.com/?id.248999","reference_id":"?id.248999","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/"}],"url":"https://vuldb.com/?id.248999"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240112-0008/","reference_id":"ntap-20240112-0008","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240112-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0253","reference_id":"RHSA-2024:0253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0465","reference_id":"RHSA-2024:0465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0589","reference_id":"RHSA-2024:0589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1081","reference_id":"RHSA-2024:1081","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1081"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1107","reference_id":"RHSA-2024:1107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1383","reference_id":"RHSA-2024:1383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1383"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1477","reference_id":"RHSA-2024:1477","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1477"},{"reference_url":"https://usn.ubuntu.com/6566-1/","reference_id":"USN-6566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6566-1/"},{"reference_url":"https://usn.ubuntu.com/6566-2/","reference_id":"USN-6566-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6566-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049484?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2"}],"aliases":["CVE-2023-7104"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jqy9-zum8-aqfn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31387?format=json","vulnerability_id":"VCID-jsyj-vz3p-rbae","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11655.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11655.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-11655","reference_id":"","reference_type":"","scores":[{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89543","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89621","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89593","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89608","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89612","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.8956","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89561","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89578","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89583","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.8959","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89588","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89582","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89596","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89597","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-11655"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","reference_id":"","reference_type":"","scores":[],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"reference_url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","reference_id":"","reference_type":"","scores":[],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20200416-0001/"},{"reference_url":"https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11","reference_id":"","reference_type":"","scores":[],"url":"https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11"},{"reference_url":"https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c","reference_id":"","reference_type":"","scores":[],"url":"https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c"},{"reference_url":"https://www.oracle.com/security-alerts/cpuApr2021.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2021.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"reference_url":"https://www.tenable.com/security/tns-2021-14","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2021-14"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1824174","reference_id":"1824174","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1824174"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11655","reference_id":"CVE-2020-11655","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11655"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16504","reference_id":"RHSA-2025:16504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16504"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2020-11655"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jsyj-vz3p-rbae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93201?format=json","vulnerability_id":"VCID-kvpm-8vj2-8qcj","summary":"An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"SQLite\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted SQL statement.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2519","reference_id":"","reference_type":"","scores":[{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92866","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92874","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92877","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92875","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92884","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92887","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92893","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92891","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92892","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92904","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.9291","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92913","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92915","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92911","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92919","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2519"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049267?format=json","purl":"pkg:deb/debian/sqlite3@3.16.2-3~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t89-sr37-s3f6"},{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4r35-q18a-2kd2"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5kd2-8zpg-6fah"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-88s4-hq8j-dba4"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-gprj-j4v6-z7ev"},{"vulnerability":"VCID-hfyf-qs8x-pkba"},{"vulnerability":"VCID-j7cb-3ptn-9qeb"},{"vulnerability":"VCID-jc4t-g7qn-tfc7"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-mqb8-wfvg-xbgz"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-qhcj-2nua-8kde"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-tpxf-9kf6-dbf8"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-vchu-y7qg-pucp"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-ym2v-jfk4-q3f5"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-3~bpo8%252B1"}],"aliases":["CVE-2017-2519"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kvpm-8vj2-8qcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83890?format=json","vulnerability_id":"VCID-mqb8-wfvg-xbgz","summary":"sqlite: NULL pointer dereference in tableColumnList","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15286.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15286.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15286","reference_id":"","reference_type":"","scores":[{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64347","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64471","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64498","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64497","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64401","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.6443","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.6439","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64438","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64454","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64466","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64426","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.6446","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64472","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64464","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64485","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15286"},{"reference_url":"https://github.com/Ha0Team/crash-of-sqlite3/blob/master/poc.md","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/Ha0Team/crash-of-sqlite3/blob/master/poc.md"},{"reference_url":"http://www.securityfocus.com/bid/101285","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101285"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1510438","reference_id":"1510438","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1510438"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878680","reference_id":"878680","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878680"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.20.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:3.20.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.20.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15286","reference_id":"CVE-2017-15286","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15286"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049482?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1"}],"aliases":["CVE-2017-15286"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mqb8-wfvg-xbgz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93202?format=json","vulnerability_id":"VCID-mvbm-keyp-akf1","summary":"An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"SQLite\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted SQL statement.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2520","reference_id":"","reference_type":"","scores":[{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.9326","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93268","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93273","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93281","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93286","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.9329","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93288","published_at":"2026-04-12T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93307","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.9332","published_at":"2026-04-21T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93325","published_at":"2026-04-24T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93321","published_at":"2026-04-26T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93318","published_at":"2026-04-29T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93324","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2520"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049267?format=json","purl":"pkg:deb/debian/sqlite3@3.16.2-3~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t89-sr37-s3f6"},{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4r35-q18a-2kd2"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5kd2-8zpg-6fah"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-88s4-hq8j-dba4"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-gprj-j4v6-z7ev"},{"vulnerability":"VCID-hfyf-qs8x-pkba"},{"vulnerability":"VCID-j7cb-3ptn-9qeb"},{"vulnerability":"VCID-jc4t-g7qn-tfc7"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-mqb8-wfvg-xbgz"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-qhcj-2nua-8kde"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-tpxf-9kf6-dbf8"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-vchu-y7qg-pucp"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-ym2v-jfk4-q3f5"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-3~bpo8%252B1"}],"aliases":["CVE-2017-2520"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mvbm-keyp-akf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81687?format=json","vulnerability_id":"VCID-p4b6-m68m-aqeq","summary":"sqlite: zipfileUpdate in ext/misc/zipfile.c mishandles a NULL pathname during an update of a ZIP archive","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19925.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19925.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19925","reference_id":"","reference_type":"","scores":[{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91426","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91515","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91504","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91502","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91433","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91443","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.9145","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91463","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91469","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91475","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91478","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91476","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.915","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91496","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788866","reference_id":"1788866","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788866"},{"reference_url":"https://security.archlinux.org/ASA-202002-3","reference_id":"ASA-202002-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-3"},{"reference_url":"https://security.archlinux.org/AVG-1092","reference_id":"AVG-1092","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1810","reference_id":"RHSA-2020:1810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1810"},{"reference_url":"https://usn.ubuntu.com/4298-1/","reference_id":"USN-4298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4298-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2019-19925"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p4b6-m68m-aqeq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93200?format=json","vulnerability_id":"VCID-q8wn-gjw8-fkhu","summary":"An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"SQLite\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted SQL statement.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2518","reference_id":"","reference_type":"","scores":[{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95977","published_at":"2026-05-05T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95915","published_at":"2026-04-01T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95923","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95931","published_at":"2026-04-04T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95934","published_at":"2026-04-07T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95943","published_at":"2026-04-08T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95946","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95949","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95952","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95963","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95967","published_at":"2026-04-29T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95969","published_at":"2026-04-24T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95968","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"},{"reference_url":"https://usn.ubuntu.com/4019-2/","reference_id":"USN-4019-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049267?format=json","purl":"pkg:deb/debian/sqlite3@3.16.2-3~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t89-sr37-s3f6"},{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4r35-q18a-2kd2"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5kd2-8zpg-6fah"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-88s4-hq8j-dba4"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-gprj-j4v6-z7ev"},{"vulnerability":"VCID-hfyf-qs8x-pkba"},{"vulnerability":"VCID-j7cb-3ptn-9qeb"},{"vulnerability":"VCID-jc4t-g7qn-tfc7"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-mqb8-wfvg-xbgz"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-qhcj-2nua-8kde"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-tpxf-9kf6-dbf8"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-vchu-y7qg-pucp"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-ym2v-jfk4-q3f5"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-3~bpo8%252B1"}],"aliases":["CVE-2017-2518"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q8wn-gjw8-fkhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60261?format=json","vulnerability_id":"VCID-qhcj-2nua-8kde","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9937.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9937.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9937","reference_id":"","reference_type":"","scores":[{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88385","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.8845","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88446","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88444","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.8846","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88466","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88394","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88403","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88407","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88426","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88443","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88435","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04196","scoring_system":"epss","scoring_elements":"0.88759","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04196","scoring_system":"epss","scoring_elements":"0.8877","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9937"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190416-0005/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190416-0005/"},{"reference_url":"https://sqlite.org/src/info/45c73deb440496e8","reference_id":"","reference_type":"","scores":[],"url":"https://sqlite.org/src/info/45c73deb440496e8"},{"reference_url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114383.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114383.html"},{"reference_url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114393.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114393.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"http://www.securityfocus.com/bid/107562","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107562"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1692357","reference_id":"1692357","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1692357"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925290","reference_id":"925290","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925290"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9937","reference_id":"CVE-2019-9937","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9937"},{"reference_url":"https://security.gentoo.org/glsa/201908-09","reference_id":"GLSA-201908-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201908-09"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049482?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1"}],"aliases":["CVE-2019-9937"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qhcj-2nua-8kde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31391?format=json","vulnerability_id":"VCID-r31n-5brf-ykcv","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13435.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13435.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13435","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04878","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04646","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04654","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04793","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04828","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04866","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04879","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05348","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05303","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05292","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0519","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05315","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05233","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05265","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05291","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05325","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841231","reference_id":"1841231","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841231"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4396","reference_id":"RHSA-2021:4396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16504","reference_id":"RHSA-2025:16504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16504"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2020-13435"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r31n-5brf-ykcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86415?format=json","vulnerability_id":"VCID-rf69-j7zt-xfdw","summary":"sqlite: array overrun in the skip-scan optimization leading to memory corruption (DoS)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7443.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7443.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7443","reference_id":"","reference_type":"","scores":[{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.7948","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79486","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79509","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79496","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79524","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79532","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79554","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79537","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79528","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79558","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79557","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79561","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79593","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79599","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79614","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.7963","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7443","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7443"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243476","reference_id":"1243476","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243476"},{"reference_url":"https://usn.ubuntu.com/2698-1/","reference_id":"USN-2698-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2698-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036353?format=json","purl":"pkg:deb/debian/sqlite3@3.8.7.1-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t89-sr37-s3f6"},{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2w6e-cvgg-pqax"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4r35-q18a-2kd2"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5kd2-8zpg-6fah"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-6w13-qjnb-xbb4"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-88s4-hq8j-dba4"},{"vulnerability":"VCID-8d7j-g2rf-tydw"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-gprj-j4v6-z7ev"},{"vulnerability":"VCID-hfyf-qs8x-pkba"},{"vulnerability":"VCID-j7cb-3ptn-9qeb"},{"vulnerability":"VCID-j97s-6d3q-2yb8"},{"vulnerability":"VCID-jc4t-g7qn-tfc7"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-kvpm-8vj2-8qcj"},{"vulnerability":"VCID-mqb8-wfvg-xbgz"},{"vulnerability":"VCID-mvbm-keyp-akf1"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-q8wn-gjw8-fkhu"},{"vulnerability":"VCID-qhcj-2nua-8kde"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-tpxf-9kf6-dbf8"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-uxd9-2vze-w3ge"},{"vulnerability":"VCID-vchu-y7qg-pucp"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-ym2v-jfk4-q3f5"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.8.7.1-1"}],"aliases":["CVE-2013-7443"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rf69-j7zt-xfdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81576?format=json","vulnerability_id":"VCID-sy72-yhap-vbet","summary":"sqlite: Null pointer derreference in src/select.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35525.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35525.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35525","reference_id":"","reference_type":"","scores":[{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44229","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44534","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.4459","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44581","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.4443","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44433","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44353","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44533","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46812","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46845","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46863","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46807","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46866","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46889","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35525","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35525"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122324","reference_id":"2122324","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7108","reference_id":"RHSA-2022:7108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7108"},{"reference_url":"https://usn.ubuntu.com/5615-1/","reference_id":"USN-5615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5615-1/"},{"reference_url":"https://usn.ubuntu.com/5615-2/","reference_id":"USN-5615-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5615-2/"},{"reference_url":"https://usn.ubuntu.com/5615-3/","reference_id":"USN-5615-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5615-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2020-35525"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sy72-yhap-vbet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60259?format=json","vulnerability_id":"VCID-tpxf-9kf6-dbf8","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5018.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5018.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5018","reference_id":"","reference_type":"","scores":[{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.85994","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.85936","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.85931","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.8595","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.85954","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.85944","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.85964","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.85973","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.85974","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02932","scoring_system":"epss","scoring_elements":"0.86357","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02932","scoring_system":"epss","scoring_elements":"0.86367","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02932","scoring_system":"epss","scoring_elements":"0.86385","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02932","scoring_system":"epss","scoring_elements":"0.86386","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02932","scoring_system":"epss","scoring_elements":"0.86405","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02932","scoring_system":"epss","scoring_elements":"0.86415","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02932","scoring_system":"epss","scoring_elements":"0.86428","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5018"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5018","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5018"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1708301","reference_id":"1708301","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1708301"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928770","reference_id":"928770","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928770"},{"reference_url":"https://security.gentoo.org/glsa/201908-09","reference_id":"GLSA-201908-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201908-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4442","reference_id":"RHSA-2020:4442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4442"},{"reference_url":"https://usn.ubuntu.com/4205-1/","reference_id":"USN-4205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4205-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049482?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1"}],"aliases":["CVE-2019-5018"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tpxf-9kf6-dbf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31389?format=json","vulnerability_id":"VCID-u4pu-5b5r-yqg1","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13434.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13434.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13434","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17299","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17347","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17128","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1722","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17277","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17255","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17207","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17147","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17091","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17032","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17015","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.16958","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.16822","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841223","reference_id":"1841223","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841223"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1581","reference_id":"RHSA-2021:1581","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1581"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1968","reference_id":"RHSA-2021:1968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16504","reference_id":"RHSA-2025:16504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16504"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2020-13434"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u4pu-5b5r-yqg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81814?format=json","vulnerability_id":"VCID-um2g-gsw6-wydv","summary":"sqlite: allows a crash if a sub-select uses both DISTINCT and window functions and also has certain ORDER BY usage","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19244.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19244.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19244","reference_id":"","reference_type":"","scores":[{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36304","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36847","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36855","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36507","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36419","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48927","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48907","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48961","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48999","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.4889","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48949","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48957","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49003","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48953","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19244"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","reference_id":"","reference_type":"","scores":[],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1777945","reference_id":"1777945","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1777945"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946656","reference_id":"946656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946656"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.30.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:3.30.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.30.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19244","reference_id":"CVE-2019-19244","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19244"},{"reference_url":"https://usn.ubuntu.com/4205-1/","reference_id":"USN-4205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4205-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2019-19244"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-um2g-gsw6-wydv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45187?format=json","vulnerability_id":"VCID-uxd9-2vze-w3ge","summary":"Multiple vulnerabilities have been found in SQLite, allowing\n    context-dependent attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3414.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3414.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3414","reference_id":"","reference_type":"","scores":[{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90398","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90321","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90324","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90336","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.9034","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90354","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.9036","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90369","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90368","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90362","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90377","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90376","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90375","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.9039","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90385","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212353","reference_id":"1212353","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212353"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968","reference_id":"783968","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968"},{"reference_url":"https://security.gentoo.org/glsa/201507-05","reference_id":"GLSA-201507-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1635","reference_id":"RHSA-2015:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1635"},{"reference_url":"https://usn.ubuntu.com/2698-1/","reference_id":"USN-2698-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2698-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036354?format=json","purl":"pkg:deb/debian/sqlite3@3.8.7.1-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t89-sr37-s3f6"},{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2w6e-cvgg-pqax"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4r35-q18a-2kd2"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5kd2-8zpg-6fah"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-6w13-qjnb-xbb4"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-88s4-hq8j-dba4"},{"vulnerability":"VCID-8d7j-g2rf-tydw"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-gprj-j4v6-z7ev"},{"vulnerability":"VCID-hfyf-qs8x-pkba"},{"vulnerability":"VCID-j7cb-3ptn-9qeb"},{"vulnerability":"VCID-j97s-6d3q-2yb8"},{"vulnerability":"VCID-jc4t-g7qn-tfc7"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-kvpm-8vj2-8qcj"},{"vulnerability":"VCID-mqb8-wfvg-xbgz"},{"vulnerability":"VCID-mvbm-keyp-akf1"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-q8wn-gjw8-fkhu"},{"vulnerability":"VCID-qhcj-2nua-8kde"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-tpxf-9kf6-dbf8"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-uxd9-2vze-w3ge"},{"vulnerability":"VCID-vchu-y7qg-pucp"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-ym2v-jfk4-q3f5"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.8.7.1-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049267?format=json","purl":"pkg:deb/debian/sqlite3@3.16.2-3~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t89-sr37-s3f6"},{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4r35-q18a-2kd2"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5kd2-8zpg-6fah"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-88s4-hq8j-dba4"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-gprj-j4v6-z7ev"},{"vulnerability":"VCID-hfyf-qs8x-pkba"},{"vulnerability":"VCID-j7cb-3ptn-9qeb"},{"vulnerability":"VCID-jc4t-g7qn-tfc7"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-mqb8-wfvg-xbgz"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-qhcj-2nua-8kde"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-tpxf-9kf6-dbf8"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-vchu-y7qg-pucp"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-ym2v-jfk4-q3f5"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-3~bpo8%252B1"}],"aliases":["CVE-2015-3414"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uxd9-2vze-w3ge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82713?format=json","vulnerability_id":"VCID-vchu-y7qg-pucp","summary":"sqlite: heap out-of-bound read in function rtreenode()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8457.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8457.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-8457","reference_id":"","reference_type":"","scores":[{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96311","published_at":"2026-04-01T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96319","published_at":"2026-04-02T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96326","published_at":"2026-04-04T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.9633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96338","published_at":"2026-04-08T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96342","published_at":"2026-04-09T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96346","published_at":"2026-04-11T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96345","published_at":"2026-04-12T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96365","published_at":"2026-04-26T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96366","published_at":"2026-04-29T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96348","published_at":"2026-04-13T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96361","published_at":"2026-04-18T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96363","published_at":"2026-04-21T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96364","published_at":"2026-04-24T12:55:00Z"},{"value":"0.30735","scoring_system":"epss","scoring_elements":"0.96749","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-8457"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010974","reference_id":"1010974","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010974"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1716881","reference_id":"1716881","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1716881"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929775","reference_id":"929775","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1810","reference_id":"RHSA-2020:1810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1810"},{"reference_url":"https://usn.ubuntu.com/4004-1/","reference_id":"USN-4004-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4004-1/"},{"reference_url":"https://usn.ubuntu.com/4004-2/","reference_id":"USN-4004-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4004-2/"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"},{"reference_url":"https://usn.ubuntu.com/4019-2/","reference_id":"USN-4019-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049482?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1"}],"aliases":["CVE-2019-8457"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vchu-y7qg-pucp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31393?format=json","vulnerability_id":"VCID-ye95-1dsg-afgd","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13631.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13631.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13631","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14562","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14756","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14652","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14659","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14719","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14751","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1475","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14685","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16653","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16715","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16471","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16599","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16632","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841568","reference_id":"1841568","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841568"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4442","reference_id":"RHSA-2020:4442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1968","reference_id":"RHSA-2021:1968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16504","reference_id":"RHSA-2025:16504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16504"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2020-13631"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ye95-1dsg-afgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81685?format=json","vulnerability_id":"VCID-ygnn-3qsr-kqg4","summary":"sqlite: mishandling of certain uses of SELECT DISTINCT involving a LEFT JOIN in flattenSubquery in select.c leads to a NULL pointer dereference","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19923.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19923.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19923","reference_id":"","reference_type":"","scores":[{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90814","published_at":"2026-04-01T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90913","published_at":"2026-05-05T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90899","published_at":"2026-04-26T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90897","published_at":"2026-04-29T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.9082","published_at":"2026-04-02T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.9083","published_at":"2026-04-04T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90841","published_at":"2026-04-07T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90867","published_at":"2026-04-12T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90865","published_at":"2026-04-13T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90889","published_at":"2026-04-16T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90887","published_at":"2026-04-21T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.909","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788846","reference_id":"1788846","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788846"},{"reference_url":"https://security.archlinux.org/ASA-202002-3","reference_id":"ASA-202002-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-3"},{"reference_url":"https://security.archlinux.org/AVG-1092","reference_id":"AVG-1092","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1810","reference_id":"RHSA-2020:1810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1810"},{"reference_url":"https://usn.ubuntu.com/4298-1/","reference_id":"USN-4298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4298-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2019-19923"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ygnn-3qsr-kqg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83587?format=json","vulnerability_id":"VCID-ym2v-jfk4-q3f5","summary":"sqlite: NULL pointer dereference with databases with schema corrupted with CREATE TABLE AS allows for denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8740.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8740.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-8740","reference_id":"","reference_type":"","scores":[{"value":"0.12623","scoring_system":"epss","scoring_elements":"0.93929","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12623","scoring_system":"epss","scoring_elements":"0.93938","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12623","scoring_system":"epss","scoring_elements":"0.93947","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12623","scoring_system":"epss","scoring_elements":"0.93951","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12623","scoring_system":"epss","scoring_elements":"0.93959","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12623","scoring_system":"epss","scoring_elements":"0.93962","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12623","scoring_system":"epss","scoring_elements":"0.93966","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13527","scoring_system":"epss","scoring_elements":"0.94249","published_at":"2026-05-05T12:55:00Z"},{"value":"0.13527","scoring_system":"epss","scoring_elements":"0.94236","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13527","scoring_system":"epss","scoring_elements":"0.94241","published_at":"2026-04-18T12:55:00Z"},{"value":"0.13527","scoring_system":"epss","scoring_elements":"0.94242","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13527","scoring_system":"epss","scoring_elements":"0.94245","published_at":"2026-04-26T12:55:00Z"},{"value":"0.13527","scoring_system":"epss","scoring_elements":"0.94246","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-8740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1558804","reference_id":"1558804","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1558804"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893195","reference_id":"893195","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893195"},{"reference_url":"https://usn.ubuntu.com/4205-1/","reference_id":"USN-4205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4205-1/"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049482?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-3%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%252Bdeb10u1"}],"aliases":["CVE-2018-8740"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ym2v-jfk4-q3f5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59799?format=json","vulnerability_id":"VCID-yy9h-fptd-hkay","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00032.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00033.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16168.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16168.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-16168","reference_id":"","reference_type":"","scores":[{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74706","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74836","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.7482","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74827","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74831","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74709","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74736","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74742","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.7478","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74759","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74749","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74786","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74794","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74784","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-16168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZARJHJJDBHI7CE5PZEBXS5HKK6HXKW2/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZARJHJJDBHI7CE5PZEBXS5HKK6HXKW2/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190926-0003/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190926-0003/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200122-0003/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20200122-0003/"},{"reference_url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg116312.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg116312.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"reference_url":"https://www.sqlite.org/src/info/e4598ecbdd18bd82945f6029013296690e719a62","reference_id":"","reference_type":"","scores":[],"url":"https://www.sqlite.org/src/info/e4598ecbdd18bd82945f6029013296690e719a62"},{"reference_url":"https://www.sqlite.org/src/timeline?c=98357d8c1263920b","reference_id":"","reference_type":"","scores":[],"url":"https://www.sqlite.org/src/timeline?c=98357d8c1263920b"},{"reference_url":"https://www.tenable.com/security/tns-2021-08","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2021-08"},{"reference_url":"https://www.tenable.com/security/tns-2021-11","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2021-11"},{"reference_url":"https://www.tenable.com/security/tns-2021-14","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2021-14"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1768986","reference_id":"1768986","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1768986"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.3.4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_design_studio:7.3.4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.3.4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.3.5.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_design_studio:7.3.5.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.3.5.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.4.0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_design_studio:7.4.0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.4.0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:nessus_agent:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tenable:nessus_agent:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:nessus_agent:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16168","reference_id":"CVE-2019-16168","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16168"},{"reference_url":"https://security.gentoo.org/glsa/202003-16","reference_id":"GLSA-202003-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4442","reference_id":"RHSA-2020:4442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1968","reference_id":"RHSA-2021:1968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1968"},{"reference_url":"https://usn.ubuntu.com/4205-1/","reference_id":"USN-4205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4205-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049483?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"},{"vulnerability":"VCID-jqy9-zum8-aqfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3"}],"aliases":["CVE-2019-16168"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yy9h-fptd-hkay"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45193?format=json","vulnerability_id":"VCID-j97s-6d3q-2yb8","summary":"Multiple vulnerabilities have been found in SQLite, allowing\n    context-dependent attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3416.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3416.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3416","reference_id":"","reference_type":"","scores":[{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91841","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.9177","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91779","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91785","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91793","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91805","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91812","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91815","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91817","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91813","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91833","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91832","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212357","reference_id":"1212357","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212357"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968","reference_id":"783968","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968"},{"reference_url":"https://security.gentoo.org/glsa/201507-05","reference_id":"GLSA-201507-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1634","reference_id":"RHSA-2015:1634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1635","reference_id":"RHSA-2015:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1635"},{"reference_url":"https://usn.ubuntu.com/2698-1/","reference_id":"USN-2698-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2698-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572263?format=json","purl":"pkg:deb/debian/sqlite3@3.7.13-1%2Bdeb7u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t89-sr37-s3f6"},{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2w6e-cvgg-pqax"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4r35-q18a-2kd2"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5kd2-8zpg-6fah"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-6w13-qjnb-xbb4"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-88s4-hq8j-dba4"},{"vulnerability":"VCID-8d7j-g2rf-tydw"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-gprj-j4v6-z7ev"},{"vulnerability":"VCID-hfyf-qs8x-pkba"},{"vulnerability":"VCID-j7cb-3ptn-9qeb"},{"vulnerability":"VCID-j97s-6d3q-2yb8"},{"vulnerability":"VCID-jc4t-g7qn-tfc7"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-kvpm-8vj2-8qcj"},{"vulnerability":"VCID-mqb8-wfvg-xbgz"},{"vulnerability":"VCID-mvbm-keyp-akf1"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-q8wn-gjw8-fkhu"},{"vulnerability":"VCID-qhcj-2nua-8kde"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-rf69-j7zt-xfdw"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-tpxf-9kf6-dbf8"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-uxd9-2vze-w3ge"},{"vulnerability":"VCID-vchu-y7qg-pucp"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-ym2v-jfk4-q3f5"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.7.13-1%252Bdeb7u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036354?format=json","purl":"pkg:deb/debian/sqlite3@3.8.7.1-1%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t89-sr37-s3f6"},{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2w6e-cvgg-pqax"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4r35-q18a-2kd2"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5kd2-8zpg-6fah"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-6w13-qjnb-xbb4"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-88s4-hq8j-dba4"},{"vulnerability":"VCID-8d7j-g2rf-tydw"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-gprj-j4v6-z7ev"},{"vulnerability":"VCID-hfyf-qs8x-pkba"},{"vulnerability":"VCID-j7cb-3ptn-9qeb"},{"vulnerability":"VCID-j97s-6d3q-2yb8"},{"vulnerability":"VCID-jc4t-g7qn-tfc7"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-kvpm-8vj2-8qcj"},{"vulnerability":"VCID-mqb8-wfvg-xbgz"},{"vulnerability":"VCID-mvbm-keyp-akf1"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-q8wn-gjw8-fkhu"},{"vulnerability":"VCID-qhcj-2nua-8kde"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-tpxf-9kf6-dbf8"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-uxd9-2vze-w3ge"},{"vulnerability":"VCID-vchu-y7qg-pucp"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-ym2v-jfk4-q3f5"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.8.7.1-1%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049267?format=json","purl":"pkg:deb/debian/sqlite3@3.16.2-3~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1t89-sr37-s3f6"},{"vulnerability":"VCID-1ufy-3uwy-afgx"},{"vulnerability":"VCID-2xdd-xysv-sufz"},{"vulnerability":"VCID-3686-kxzp-gbcf"},{"vulnerability":"VCID-4r35-q18a-2kd2"},{"vulnerability":"VCID-4u4w-a4gk-rqfx"},{"vulnerability":"VCID-5kd2-8zpg-6fah"},{"vulnerability":"VCID-5wf9-5w85-2ybf"},{"vulnerability":"VCID-7wt9-4myp-w3gu"},{"vulnerability":"VCID-88s4-hq8j-dba4"},{"vulnerability":"VCID-8m3z-fgqg-4fgn"},{"vulnerability":"VCID-9ggb-qwny-qqhb"},{"vulnerability":"VCID-ajrb-8r3r-afe3"},{"vulnerability":"VCID-bgz9-v5cv-8kea"},{"vulnerability":"VCID-bxfk-dmdp-53f3"},{"vulnerability":"VCID-chtp-rtmg-6ud5"},{"vulnerability":"VCID-edrj-chna-ekam"},{"vulnerability":"VCID-eu7t-2h5s-4kc5"},{"vulnerability":"VCID-f9jg-cmg5-6ubq"},{"vulnerability":"VCID-gb4s-4wcm-eyft"},{"vulnerability":"VCID-gprj-j4v6-z7ev"},{"vulnerability":"VCID-hfyf-qs8x-pkba"},{"vulnerability":"VCID-j7cb-3ptn-9qeb"},{"vulnerability":"VCID-jc4t-g7qn-tfc7"},{"vulnerability":"VCID-jqy9-zum8-aqfn"},{"vulnerability":"VCID-jsyj-vz3p-rbae"},{"vulnerability":"VCID-mqb8-wfvg-xbgz"},{"vulnerability":"VCID-p4b6-m68m-aqeq"},{"vulnerability":"VCID-qhcj-2nua-8kde"},{"vulnerability":"VCID-r31n-5brf-ykcv"},{"vulnerability":"VCID-sy72-yhap-vbet"},{"vulnerability":"VCID-tpxf-9kf6-dbf8"},{"vulnerability":"VCID-u4pu-5b5r-yqg1"},{"vulnerability":"VCID-um2g-gsw6-wydv"},{"vulnerability":"VCID-vchu-y7qg-pucp"},{"vulnerability":"VCID-ye95-1dsg-afgd"},{"vulnerability":"VCID-ygnn-3qsr-kqg4"},{"vulnerability":"VCID-ym2v-jfk4-q3f5"},{"vulnerability":"VCID-yy9h-fptd-hkay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-3~bpo8%252B1"}],"aliases":["CVE-2015-3416"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j97s-6d3q-2yb8"}],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.7.13-1%252Bdeb7u2"}