{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","type":"deb","namespace":"debian","name":"sqlite3","version":"3.34.1-3","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"3.34.1-3+deb11u1","latest_non_vulnerable_version":"3.46.1-9","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70417?format=json","vulnerability_id":"VCID-6xmb-3zgw-xudu","summary":"sqlite: Denial of Service in SQLite","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-29088.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-29088.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-29088","reference_id":"","reference_type":"","scores":[{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19557","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19249","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19453","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19458","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1941","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19353","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19314","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19321","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19335","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19233","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19222","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19075","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19156","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19324","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19578","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-29088"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29088","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29088"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102670","reference_id":"1102670","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102670"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2358876","reference_id":"2358876","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2358876"},{"reference_url":"https://sqlite.org/releaselog/3_49_1.html","reference_id":"3_49_1.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T19:43:38Z/"}],"url":"https://sqlite.org/releaselog/3_49_1.html"},{"reference_url":"https://sqlite.org/forum/forumpost/48f365daec","reference_id":"48f365daec","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T19:43:38Z/"}],"url":"https://sqlite.org/forum/forumpost/48f365daec"},{"reference_url":"https://github.com/sqlite/sqlite/commit/56d2fd008b108109f489339f5fd55212bb50afd4","reference_id":"56d2fd008b108109f489339f5fd55212bb50afd4","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T19:43:38Z/"}],"url":"https://github.com/sqlite/sqlite/commit/56d2fd008b108109f489339f5fd55212bb50afd4"},{"reference_url":"https://gist.github.com/ylwango613/d3883fb9f6ba8a78086356779ce88248","reference_id":"d3883fb9f6ba8a78086356779ce88248","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T19:43:38Z/"}],"url":"https://gist.github.com/ylwango613/d3883fb9f6ba8a78086356779ce88248"},{"reference_url":"https://usn.ubuntu.com/7528-1/","reference_id":"USN-7528-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7528-1/"},{"reference_url":"https://usn.ubuntu.com/7679-1/","reference_id":"USN-7679-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7679-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939902?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2025-29088"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6xmb-3zgw-xudu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/13197?format=json","vulnerability_id":"VCID-7es8-7d9x-xfgm","summary":"Improper Validation of Array Index\nSQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35737.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35737.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35737","reference_id":"","reference_type":"","scores":[{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97896","published_at":"2026-04-04T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97929","published_at":"2026-05-09T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97926","published_at":"2026-05-07T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97918","published_at":"2026-04-21T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97904","published_at":"2026-04-08T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97928","published_at":"2026-05-05T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97924","published_at":"2026-04-29T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97917","published_at":"2026-04-24T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.9792","published_at":"2026-04-18T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97919","published_at":"2026-04-26T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97912","published_at":"2026-04-13T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97911","published_at":"2026-04-12T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.9791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97907","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35737"},{"reference_url":"https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35737"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/rusqlite/rusqlite","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rusqlite/rusqlite"},{"reference_url":"https://kb.cert.org/vuls/id/720344","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"}],"url":"https://kb.cert.org/vuls/id/720344"},{"reference_url":"https://rustsec.org/advisories/RUSTSEC-2022-0090.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rustsec.org/advisories/RUSTSEC-2022-0090.html"},{"reference_url":"https://security.gentoo.org/glsa/202210-40","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"}],"url":"https://security.gentoo.org/glsa/202210-40"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220915-0009","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20220915-0009"},{"reference_url":"https://sqlite.org/releaselog/3_39_2.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"}],"url":"https://sqlite.org/releaselog/3_39_2.html"},{"reference_url":"https://www.sqlite.org/cves.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"}],"url":"https://www.sqlite.org/cves.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2110291","reference_id":"2110291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2110291"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-35737","reference_id":"CVE-2022-35737","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-35737"},{"reference_url":"https://github.com/advisories/GHSA-jw36-hf63-69r9","reference_id":"GHSA-jw36-hf63-69r9","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-jw36-hf63-69r9"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220915-0009/","reference_id":"ntap-20220915-0009","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220915-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0110","reference_id":"RHSA-2023:0110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0339","reference_id":"RHSA-2023:0339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0425","reference_id":"RHSA-2024:0425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0425"},{"reference_url":"https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/","reference_id":"sqlite-vulnerability-july-2022-library-api","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"}],"url":"https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/"},{"reference_url":"https://usn.ubuntu.com/5712-1/","reference_id":"USN-5712-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5712-1/"},{"reference_url":"https://usn.ubuntu.com/5716-1/","reference_id":"USN-5716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5716-1/"},{"reference_url":"https://usn.ubuntu.com/5716-2/","reference_id":"USN-5716-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5716-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939896?format=json","purl":"pkg:deb/debian/sqlite3@3.39.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.39.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2022-35737","GHSA-jw36-hf63-69r9"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7es8-7d9x-xfgm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68660?format=json","vulnerability_id":"VCID-fyxk-hw7d-ruc4","summary":"sqlite: Integer Truncation in SQLite","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6965.json","reference_id":"","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6965.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-6965","reference_id":"","reference_type":"","scores":[{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35719","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35645","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35599","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77338","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77261","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77282","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77287","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01018","scoring_system":"epss","scoring_elements":"0.77316","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77313","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01026","scoring_system":"epss","scoring_elements":"0.77353","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01182","scoring_system":"epss","scoring_elements":"0.78796","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01182","scoring_system":"epss","scoring_elements":"0.78793","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81282","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81274","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81275","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01524","scoring_system":"epss","scoring_elements":"0.81296","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-6965"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6965","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6965"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109379","reference_id":"1109379","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380149","reference_id":"2380149","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380149"},{"reference_url":"https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8","reference_id":"5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/S:N/AU:N/R:U/V:D/RE:L/U:Green"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-15T13:55:28Z/"}],"url":"https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/52499.py","reference_id":"CVE-2025-6965","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/52499.py"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11802","reference_id":"RHSA-2025:11802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11803","reference_id":"RHSA-2025:11803","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11803"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11933","reference_id":"RHSA-2025:11933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11992","reference_id":"RHSA-2025:11992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11992"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12010","reference_id":"RHSA-2025:12010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12036","reference_id":"RHSA-2025:12036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12349","reference_id":"RHSA-2025:12349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12521","reference_id":"RHSA-2025:12521","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12522","reference_id":"RHSA-2025:12522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12522"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12749","reference_id":"RHSA-2025:12749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12749"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12901","reference_id":"RHSA-2025:12901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12904","reference_id":"RHSA-2025:12904","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12904"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12905","reference_id":"RHSA-2025:12905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13267","reference_id":"RHSA-2025:13267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13335","reference_id":"RHSA-2025:13335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13335"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14101","reference_id":"RHSA-2025:14101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15827","reference_id":"RHSA-2025:15827","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15827"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15828","reference_id":"RHSA-2025:15828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18219","reference_id":"RHSA-2025:18219","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18219"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20936","reference_id":"RHSA-2025:20936","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20936"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21913","reference_id":"RHSA-2025:21913","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21913"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21994","reference_id":"RHSA-2025:21994","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21994"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22529","reference_id":"RHSA-2025:22529","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22529"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22548","reference_id":"RHSA-2025:22548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22868","reference_id":"RHSA-2025:22868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23078","reference_id":"RHSA-2025:23078","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23078"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23079","reference_id":"RHSA-2025:23079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23080","reference_id":"RHSA-2025:23080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23248","reference_id":"RHSA-2025:23248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0001","reference_id":"RHSA-2026:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0076","reference_id":"RHSA-2026:0076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0077","reference_id":"RHSA-2026:0077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0078","reference_id":"RHSA-2026:0078","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0078"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0934","reference_id":"RHSA-2026:0934","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0934"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1652","reference_id":"RHSA-2026:1652","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1652"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3461","reference_id":"RHSA-2026:3461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3462","reference_id":"RHSA-2026:3462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6481","reference_id":"RHSA-2026:6481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6481"},{"reference_url":"https://usn.ubuntu.com/7676-1/","reference_id":"USN-7676-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7676-1/"},{"reference_url":"https://usn.ubuntu.com/7679-1/","reference_id":"USN-7679-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7679-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939903?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2025-6965"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fyxk-hw7d-ruc4"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59800?format=json","vulnerability_id":"VCID-1t89-sr37-s3f6","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5827.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5827.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5827","reference_id":"","reference_type":"","scores":[{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.89731","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.89681","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.89676","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.89691","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.89693","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.89692","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.89703","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.8972","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.89672","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.89666","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04961","scoring_system":"epss","scoring_elements":"0.8968","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05052","scoring_system":"epss","scoring_elements":"0.89735","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05052","scoring_system":"epss","scoring_elements":"0.8975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05052","scoring_system":"epss","scoring_elements":"0.89752","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05052","scoring_system":"epss","scoring_elements":"0.89769","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05052","scoring_system":"epss","scoring_elements":"0.89775","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05052","scoring_system":"epss","scoring_elements":"0.89782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05052","scoring_system":"epss","scoring_elements":"0.89732","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5810","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5810"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5821","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5821"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5828","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5828"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5829","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5829"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5832","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5832"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5838","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5838"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5839","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5839"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5847","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5847"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5848","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5853","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5853"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5868","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6504"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1706805","reference_id":"1706805","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1706805"},{"reference_url":"https://security.gentoo.org/glsa/202003-16","reference_id":"GLSA-202003-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1243","reference_id":"RHSA-2019:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4396","reference_id":"RHSA-2021:4396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4396"},{"reference_url":"https://usn.ubuntu.com/4205-1/","reference_id":"USN-4205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4205-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939884?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-5827"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1t89-sr37-s3f6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31392?format=json","vulnerability_id":"VCID-1ufy-3uwy-afgx","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13630.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13630.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13630","reference_id":"","reference_type":"","scores":[{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22675","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2285","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22895","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22687","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22763","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22836","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22814","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24689","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24669","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24547","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24625","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24815","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24808","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24785","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24724","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24713","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31248","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31205","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13630"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13630","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13630"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841562","reference_id":"1841562","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841562"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4442","reference_id":"RHSA-2020:4442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1968","reference_id":"RHSA-2021:1968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16504","reference_id":"RHSA-2025:16504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16504"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939887?format=json","purl":"pkg:deb/debian/sqlite3@3.32.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.32.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2020-13630"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1ufy-3uwy-afgx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/97796?format=json","vulnerability_id":"VCID-2k32-4p92-1ygz","summary":"An integer overflow exists in the  FTS5 https://sqlite.org/fts5.html  extension. It occurs when the size of an array of tombstone pointers is calculated and truncated into a 32-bit integer. A pointer to partially controlled data can then be written out of bounds.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-7709","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16961","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16965","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17002","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16905","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1689","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1684","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16932","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16708","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16825","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17803","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1803","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17819","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1788","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17896","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17852","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-7709"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1114609","reference_id":"1114609","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1114609"},{"reference_url":"https://github.com/google/security-research/security/advisories/GHSA-v2c8-vqqp-hv3g","reference_id":"GHSA-v2c8-vqqp-hv3g","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:N/VI:H/VA:L/SC:N/SI:H/SA:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T15:10:09Z/"}],"url":"https://github.com/google/security-research/security/advisories/GHSA-v2c8-vqqp-hv3g"},{"reference_url":"https://usn.ubuntu.com/7751-1/","reference_id":"USN-7751-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7751-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939883?format=json","purl":"pkg:deb/debian/sqlite3@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939905?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2025-7709"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2k32-4p92-1ygz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45190?format=json","vulnerability_id":"VCID-2w6e-cvgg-pqax","summary":"Multiple vulnerabilities have been found in SQLite, allowing\n    context-dependent attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3415.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3415.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3415","reference_id":"","reference_type":"","scores":[{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90321","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90398","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90416","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90324","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90336","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.9034","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90354","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.9036","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90369","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90368","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90362","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90377","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90376","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90375","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.9039","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90385","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0794","scoring_system":"epss","scoring_elements":"0.92098","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212356","reference_id":"1212356","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212356"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968","reference_id":"783968","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968"},{"reference_url":"https://security.gentoo.org/glsa/201507-05","reference_id":"GLSA-201507-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1635","reference_id":"RHSA-2015:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1635"},{"reference_url":"https://usn.ubuntu.com/2698-1/","reference_id":"USN-2698-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2698-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939871?format=json","purl":"pkg:deb/debian/sqlite3@3.8.9-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.8.9-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2015-3415"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2w6e-cvgg-pqax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31388?format=json","vulnerability_id":"VCID-2xdd-xysv-sufz","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11656.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11656.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-11656","reference_id":"","reference_type":"","scores":[{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89158","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89211","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89164","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89179","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.892","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89204","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89215","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89208","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06078","scoring_system":"epss","scoring_elements":"0.90819","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06078","scoring_system":"epss","scoring_elements":"0.90788","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06078","scoring_system":"epss","scoring_elements":"0.90782","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06078","scoring_system":"epss","scoring_elements":"0.90801","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06078","scoring_system":"epss","scoring_elements":"0.9083","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06078","scoring_system":"epss","scoring_elements":"0.9078","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06078","scoring_system":"epss","scoring_elements":"0.90777","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06078","scoring_system":"epss","scoring_elements":"0.90776","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06078","scoring_system":"epss","scoring_elements":"0.90787","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-11656"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","reference_id":"","reference_type":"","scores":[],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","reference_id":"","reference_type":"","scores":[],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20200416-0001/"},{"reference_url":"https://www3.sqlite.org/cgi/src/info/b64674919f673602","reference_id":"","reference_type":"","scores":[],"url":"https://www3.sqlite.org/cgi/src/info/b64674919f673602"},{"reference_url":"https://www.oracle.com/security-alerts/cpuApr2021.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2021.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"reference_url":"https://www.sqlite.org/src/info/d09f8c3621d5f7f8","reference_id":"","reference_type":"","scores":[],"url":"https://www.sqlite.org/src/info/d09f8c3621d5f7f8"},{"reference_url":"https://www.tenable.com/security/tns-2021-14","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2021-14"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1824185","reference_id":"1824185","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1824185"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11656","reference_id":"CVE-2020-11656","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11656"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16504","reference_id":"RHSA-2025:16504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16504"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939887?format=json","purl":"pkg:deb/debian/sqlite3@3.32.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.32.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2020-11656"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2xdd-xysv-sufz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81708?format=json","vulnerability_id":"VCID-3686-kxzp-gbcf","summary":"sqlite: mishandles certain uses of INSERT INTO in situations involving embedded '\\0' characters in filenames","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19959.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19959.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19959","reference_id":"","reference_type":"","scores":[{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66739","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66775","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66824","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66838","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66858","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66844","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66812","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66845","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66859","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66843","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66868","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66881","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66878","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66849","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66892","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0052","scoring_system":"epss","scoring_elements":"0.66932","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19959"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1789595","reference_id":"1789595","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1789595"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1810","reference_id":"RHSA-2020:1810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1810"},{"reference_url":"https://usn.ubuntu.com/4298-1/","reference_id":"USN-4298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4298-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939882?format=json","purl":"pkg:deb/debian/sqlite3@3.30.1%2Bfossil191229-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.30.1%252Bfossil191229-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-19959"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3686-kxzp-gbcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84207?format=json","vulnerability_id":"VCID-4r35-q18a-2kd2","summary":"sqlite: Heap-buffer overflow in the getNodeSize function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10989.json","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10989.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10989","reference_id":"","reference_type":"","scores":[{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93876","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93885","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93894","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93906","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.9391","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93913","published_at":"2026-04-11T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93914","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93951","published_at":"2026-05-05T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93963","published_at":"2026-05-07T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93935","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.9394","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93941","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93943","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12478","scoring_system":"epss","scoring_elements":"0.93942","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12809","scoring_system":"epss","scoring_elements":"0.94074","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10989"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469672","reference_id":"1469672","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1469672"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867618","reference_id":"867618","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867618"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"},{"reference_url":"https://usn.ubuntu.com/4019-2/","reference_id":"USN-4019-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939873?format=json","purl":"pkg:deb/debian/sqlite3@3.19.3-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.19.3-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2017-10989"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4r35-q18a-2kd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81766?format=json","vulnerability_id":"VCID-4u4w-a4gk-rqfx","summary":"sqlite: infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19645.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19645.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19645","reference_id":"","reference_type":"","scores":[{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.5277","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.5282","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52788","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52839","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52833","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52883","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52867","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52851","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60861","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.6082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60826","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.6081","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60799","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60812","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60804","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60755","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60803","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1783305","reference_id":"1783305","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1783305"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946612","reference_id":"946612","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946612"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16504","reference_id":"RHSA-2025:16504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16504"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939882?format=json","purl":"pkg:deb/debian/sqlite3@3.30.1%2Bfossil191229-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.30.1%252Bfossil191229-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-19645"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4u4w-a4gk-rqfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82961?format=json","vulnerability_id":"VCID-5kd2-8zpg-6fah","summary":"sqlite: Multiple flaws in sqlite which can be triggered via corrupted internal databases (Magellan)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20505.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20505.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20505","reference_id":"","reference_type":"","scores":[{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.9168","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.91725","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.91688","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.91694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.91702","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.91715","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.91722","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.91727","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07368","scoring_system":"epss","scoring_elements":"0.91723","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08735","scoring_system":"epss","scoring_elements":"0.92518","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08735","scoring_system":"epss","scoring_elements":"0.92535","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08735","scoring_system":"epss","scoring_elements":"0.92546","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08735","scoring_system":"epss","scoring_elements":"0.92512","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08735","scoring_system":"epss","scoring_elements":"0.92524","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08735","scoring_system":"epss","scoring_elements":"0.92515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08735","scoring_system":"epss","scoring_elements":"0.92516","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08735","scoring_system":"epss","scoring_elements":"0.92517","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20505"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/62","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/62"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/64","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/64"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/66","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/66"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/67","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/67"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/68","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/68"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/69","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/69"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/28","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/28"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/29","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/29"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/31","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/31"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/32","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/32"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/33","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/33"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/39","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/39"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190502-0004/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190502-0004/"},{"reference_url":"https://sqlite.org/src/info/1a84668dcfdebaf12415d","reference_id":"","reference_type":"","scores":[],"url":"https://sqlite.org/src/info/1a84668dcfdebaf12415d"},{"reference_url":"https://support.apple.com/kb/HT209443","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209443"},{"reference_url":"https://support.apple.com/kb/HT209446","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209446"},{"reference_url":"https://support.apple.com/kb/HT209447","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209447"},{"reference_url":"https://support.apple.com/kb/HT209448","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209448"},{"reference_url":"https://support.apple.com/kb/HT209450","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209450"},{"reference_url":"https://support.apple.com/kb/HT209451","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209451"},{"reference_url":"http://www.securityfocus.com/bid/106698","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106698"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379","reference_id":"1659379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20505","reference_id":"CVE-2018-20505","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20505"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939879?format=json","purl":"pkg:deb/debian/sqlite3@3.25.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.25.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2018-20505"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5kd2-8zpg-6fah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81684?format=json","vulnerability_id":"VCID-5wf9-5w85-2ybf","summary":"sqlite: incorrect sqlite3WindowRewrite() error handling leads to mishandling certain parser-tree rewriting","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19924.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19924.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19924","reference_id":"","reference_type":"","scores":[{"value":"0.04739","scoring_system":"epss","scoring_elements":"0.89373","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04739","scoring_system":"epss","scoring_elements":"0.89384","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04739","scoring_system":"epss","scoring_elements":"0.89386","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04739","scoring_system":"epss","scoring_elements":"0.89402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04739","scoring_system":"epss","scoring_elements":"0.89406","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04739","scoring_system":"epss","scoring_elements":"0.89414","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04739","scoring_system":"epss","scoring_elements":"0.89369","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.91001","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.91017","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.91031","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.90955","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.90954","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.90978","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.90976","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.9099","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.90988","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06298","scoring_system":"epss","scoring_elements":"0.90984","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788842","reference_id":"1788842","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1810","reference_id":"RHSA-2020:1810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1810"},{"reference_url":"https://usn.ubuntu.com/4298-1/","reference_id":"USN-4298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4298-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939882?format=json","purl":"pkg:deb/debian/sqlite3@3.30.1%2Bfossil191229-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.30.1%252Bfossil191229-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-19924"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5wf9-5w85-2ybf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85041?format=json","vulnerability_id":"VCID-6w13-qjnb-xbb4","summary":"sqlite: Tempdir selection vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6153.json","reference_id":"","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6153.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6153","reference_id":"","reference_type":"","scores":[{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09212","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09259","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09264","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09307","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09313","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09283","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09164","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09158","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09311","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0936","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09315","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09285","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09199","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09359","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09433","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6153"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1352437","reference_id":"1352437","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1352437"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"},{"reference_url":"https://usn.ubuntu.com/4019-2/","reference_id":"USN-4019-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939872?format=json","purl":"pkg:deb/debian/sqlite3@3.13.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.13.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2016-6153"],"risk_score":1.0,"exploitability":"0.5","weighted_severity":"2.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6w13-qjnb-xbb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81767?format=json","vulnerability_id":"VCID-7wt9-4myp-w3gu","summary":"sqlite: mishandling of certain SELECT statements with non-existent VIEW can lead to DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19603.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19603.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19603","reference_id":"","reference_type":"","scores":[{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70622","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70637","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70656","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70679","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70695","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70717","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70701","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70686","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70731","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70738","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.7077","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70779","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.7078","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70761","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70802","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70839","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1785318","reference_id":"1785318","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1785318"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4396","reference_id":"RHSA-2021:4396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4396"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939882?format=json","purl":"pkg:deb/debian/sqlite3@3.30.1%2Bfossil191229-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.30.1%252Bfossil191229-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-19603"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7wt9-4myp-w3gu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60260?format=json","vulnerability_id":"VCID-88s4-hq8j-dba4","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9936.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9936.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9936","reference_id":"","reference_type":"","scores":[{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89131","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89178","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89185","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89182","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89195","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89191","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89208","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89214","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89153","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89156","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04543","scoring_system":"epss","scoring_elements":"0.89174","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05055","scoring_system":"epss","scoring_elements":"0.89832","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05055","scoring_system":"epss","scoring_elements":"0.89843","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05055","scoring_system":"epss","scoring_elements":"0.89803","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05055","scoring_system":"epss","scoring_elements":"0.89817","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9936"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190416-0005/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190416-0005/"},{"reference_url":"https://sqlite.org/src/info/b3fa58dd7403dbd4","reference_id":"","reference_type":"","scores":[],"url":"https://sqlite.org/src/info/b3fa58dd7403dbd4"},{"reference_url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114382.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114382.html"},{"reference_url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114394.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114394.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"http://www.securityfocus.com/bid/107562","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107562"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1692365","reference_id":"1692365","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1692365"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925289","reference_id":"925289","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9936","reference_id":"CVE-2019-9936","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9936"},{"reference_url":"https://security.gentoo.org/glsa/201908-09","reference_id":"GLSA-201908-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201908-09"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939885?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-9936"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-88s4-hq8j-dba4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81775?format=json","vulnerability_id":"VCID-8c5h-9byn-4yh1","summary":"sqlite: omits bits from the colUsed bitmask in the case of a generated column","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19317.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19317.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19317","reference_id":"","reference_type":"","scores":[{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76761","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76765","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76793","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76805","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76816","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76824","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76817","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76861","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76866","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76857","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76889","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76897","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76908","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76898","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76928","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00985","scoring_system":"epss","scoring_elements":"0.76945","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19317"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1784111","reference_id":"1784111","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1784111"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939883?format=json","purl":"pkg:deb/debian/sqlite3@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-19317"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8c5h-9byn-4yh1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93199?format=json","vulnerability_id":"VCID-8d7j-g2rf-tydw","summary":"An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"SQLite\" component. A use-after-free vulnerability allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SQL statement.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2513","reference_id":"","reference_type":"","scores":[{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85252","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85264","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85282","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85285","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85307","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85329","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85327","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85324","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85344","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85346","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85343","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85366","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85375","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85374","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85388","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85414","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02496","scoring_system":"epss","scoring_elements":"0.85432","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2513"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939876?format=json","purl":"pkg:deb/debian/sqlite3@3.15.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.15.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2017-2513"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8d7j-g2rf-tydw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81726?format=json","vulnerability_id":"VCID-8m3z-fgqg-4fgn","summary":"sqlite: invalid pointer dereference in exprListAppendList in window.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19880.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19880.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19880","reference_id":"","reference_type":"","scores":[{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.90982","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.90991","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91001","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91013","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91027","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.90977","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.92364","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.92375","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.92383","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.92347","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.92345","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.92356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.92355","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.9236","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.92361","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08438","scoring_system":"epss","scoring_elements":"0.92354","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19880"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1787032","reference_id":"1787032","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1787032"},{"reference_url":"https://security.archlinux.org/ASA-202002-3","reference_id":"ASA-202002-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-3"},{"reference_url":"https://security.archlinux.org/AVG-1092","reference_id":"AVG-1092","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1092"},{"reference_url":"https://usn.ubuntu.com/4298-1/","reference_id":"USN-4298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4298-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939882?format=json","purl":"pkg:deb/debian/sqlite3@3.30.1%2Bfossil191229-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.30.1%252Bfossil191229-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-19880"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8m3z-fgqg-4fgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31394?format=json","vulnerability_id":"VCID-9ggb-qwny-qqhb","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13632.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13632.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13632","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06449","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06481","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06509","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.065","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0655","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06592","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06586","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06578","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06569","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06505","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06513","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06663","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06674","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06684","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06702","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06832","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06899","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13632"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841574","reference_id":"1841574","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841574"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4442","reference_id":"RHSA-2020:4442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1968","reference_id":"RHSA-2021:1968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16504","reference_id":"RHSA-2025:16504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16504"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939887?format=json","purl":"pkg:deb/debian/sqlite3@3.32.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.32.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2020-13632"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ggb-qwny-qqhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81795?format=json","vulnerability_id":"VCID-ajrb-8r3r-afe3","summary":"sqlite: SQL injection in sqlite3ExprCodeTarget in expr.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19242.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19242.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19242","reference_id":"","reference_type":"","scores":[{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42084","published_at":"2026-04-01T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.4217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42109","published_at":"2026-04-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.4216","published_at":"2026-04-08T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42171","published_at":"2026-04-09T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42194","published_at":"2026-04-11T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42157","published_at":"2026-04-12T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.4213","published_at":"2026-04-13T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42181","published_at":"2026-04-16T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42156","published_at":"2026-04-18T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42085","published_at":"2026-04-21T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.4203","published_at":"2026-04-24T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.42025","published_at":"2026-04-26T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41941","published_at":"2026-04-29T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41799","published_at":"2026-05-05T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41868","published_at":"2026-05-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41887","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19242"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19242"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1778867","reference_id":"1778867","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1778867"},{"reference_url":"https://usn.ubuntu.com/4205-1/","reference_id":"USN-4205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4205-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939882?format=json","purl":"pkg:deb/debian/sqlite3@3.30.1%2Bfossil191229-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.30.1%252Bfossil191229-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-19242"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ajrb-8r3r-afe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61420?format=json","vulnerability_id":"VCID-bapy-tw9e-4fgu","summary":"Multiple vulnerabilities have been discovered in SQLite, the worst of which may lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46908.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46908.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46908","reference_id":"","reference_type":"","scores":[{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33047","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.3339","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33349","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33326","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33364","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33339","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33305","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33152","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33135","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33056","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.32938","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33007","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.3347","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33354","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33387","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46908"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sqlite.org/forum/forumpost/07beac8056151b2f","reference_id":"07beac8056151b2f","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:30Z/"}],"url":"https://sqlite.org/forum/forumpost/07beac8056151b2f"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026293","reference_id":"1026293","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026293"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2152844","reference_id":"2152844","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2152844"},{"reference_url":"https://sqlite.org/src/info/cefc032473ac5ad2","reference_id":"cefc032473ac5ad2","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:30Z/"}],"url":"https://sqlite.org/src/info/cefc032473ac5ad2"},{"reference_url":"https://security.gentoo.org/glsa/202311-03","reference_id":"GLSA-202311-03","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:30Z/"}],"url":"https://security.gentoo.org/glsa/202311-03"},{"reference_url":"https://news.ycombinator.com/item?id=33948588","reference_id":"item?id=33948588","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:30Z/"}],"url":"https://news.ycombinator.com/item?id=33948588"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230203-0005/","reference_id":"ntap-20230203-0005","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230203-0005/"},{"reference_url":"https://usn.ubuntu.com/6566-1/","reference_id":"USN-6566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939883?format=json","purl":"pkg:deb/debian/sqlite3@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939897?format=json","purl":"pkg:deb/debian/sqlite3@3.40.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2022-46908"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bapy-tw9e-4fgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94830?format=json","vulnerability_id":"VCID-bgz9-v5cv-8kea","summary":"A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-36690","reference_id":"","reference_type":"","scores":[{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76655","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76623","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76626","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82533","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82471","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82491","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82513","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82386","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82405","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82401","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82395","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.8243","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82435","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82457","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0172","scoring_system":"epss","scoring_elements":"0.82467","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-36690"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.archlinux.org/AVG-2318","reference_id":"AVG-2318","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2318"},{"reference_url":"https://security.archlinux.org/AVG-2319","reference_id":"AVG-2319","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2319"},{"reference_url":"https://usn.ubuntu.com/5403-1/","reference_id":"USN-5403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939895?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939894?format=json","purl":"pkg:deb/debian/sqlite3@3.36.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.36.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2021-36690"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bgz9-v5cv-8kea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59150?format=json","vulnerability_id":"VCID-bxfk-dmdp-53f3","summary":"A vulnerability in SQLite could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20227.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20227.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20227","reference_id":"","reference_type":"","scores":[{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43493","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43554","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43581","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43519","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.4357","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43584","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43602","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43572","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43616","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43605","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43541","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43472","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43476","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43393","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43263","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43338","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43355","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20227"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20227","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20227"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1924886","reference_id":"1924886","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1924886"},{"reference_url":"https://security.archlinux.org/AVG-1536","reference_id":"AVG-1536","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1536"},{"reference_url":"https://security.gentoo.org/glsa/202103-04","reference_id":"GLSA-202103-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202103-04"},{"reference_url":"https://usn.ubuntu.com/4732-1/","reference_id":"USN-4732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4732-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939893?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2021-20227"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bxfk-dmdp-53f3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31396?format=json","vulnerability_id":"VCID-chtp-rtmg-6ud5","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15358.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15358.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15358","reference_id":"","reference_type":"","scores":[{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11073","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11216","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11279","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11092","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11171","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11228","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11237","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11205","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11044","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11053","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11185","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11119","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11074","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1101","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10946","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11084","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11156","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1851957","reference_id":"1851957","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1851957"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1581","reference_id":"RHSA-2021:1581","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1581"},{"reference_url":"https://usn.ubuntu.com/4438-1/","reference_id":"USN-4438-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4438-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939890?format=json","purl":"pkg:deb/debian/sqlite3@3.32.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.32.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2020-15358"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-chtp-rtmg-6ud5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81573?format=json","vulnerability_id":"VCID-edrj-chna-ekam","summary":"sqlite: Out of bounds access during table rename","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35527.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35527.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35527","reference_id":"","reference_type":"","scores":[{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48595","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48693","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48689","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48646","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.4863","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48641","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48591","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48508","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48569","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48632","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48644","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50887","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.5094","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50923","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.5098","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50978","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.5102","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35527"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122329","reference_id":"2122329","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7108","reference_id":"RHSA-2022:7108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7108"},{"reference_url":"https://usn.ubuntu.com/5615-1/","reference_id":"USN-5615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939887?format=json","purl":"pkg:deb/debian/sqlite3@3.32.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.32.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2020-35527"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-edrj-chna-ekam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31395?format=json","vulnerability_id":"VCID-eu7t-2h5s-4kc5","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13871.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13871","reference_id":"","reference_type":"","scores":[{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85095","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85124","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85128","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.8515","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85157","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85171","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85169","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85166","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85187","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85188","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.8521","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85219","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85216","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85231","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85257","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02437","scoring_system":"epss","scoring_elements":"0.85276","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1845576","reference_id":"1845576","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1845576"},{"reference_url":"https://security.archlinux.org/ASA-202006-11","reference_id":"ASA-202006-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202006-11"},{"reference_url":"https://security.archlinux.org/AVG-1182","reference_id":"AVG-1182","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1182"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939889?format=json","purl":"pkg:deb/debian/sqlite3@3.32.2-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.32.2-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2020-13871"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eu7t-2h5s-4kc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59802?format=json","vulnerability_id":"VCID-f9jg-cmg5-6ubq","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9327.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9327.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9327","reference_id":"","reference_type":"","scores":[{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72012","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.71987","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72026","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.71992","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72063","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.71984","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72039","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76459","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76448","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76477","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76497","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76379","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76374","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76414","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76421","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76405","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76439","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00951","scoring_system":"epss","scoring_elements":"0.76446","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9327"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9327","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9327"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1809315","reference_id":"1809315","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1809315"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951835","reference_id":"951835","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=951835"},{"reference_url":"https://security.gentoo.org/glsa/202003-16","reference_id":"GLSA-202003-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4442","reference_id":"RHSA-2020:4442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4442"},{"reference_url":"https://usn.ubuntu.com/4298-1/","reference_id":"USN-4298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4298-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939892?format=json","purl":"pkg:deb/debian/sqlite3@3.31.1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.31.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2020-9327"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f9jg-cmg5-6ubq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31386?format=json","vulnerability_id":"VCID-gb4s-4wcm-eyft","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20218.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20218.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20218","reference_id":"","reference_type":"","scores":[{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60668","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60742","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60771","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60735","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60799","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.6082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60807","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60788","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60831","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60836","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60821","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.6081","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60823","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60816","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60766","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60814","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60871","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20218"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791313","reference_id":"1791313","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791313"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4442","reference_id":"RHSA-2020:4442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4442"},{"reference_url":"https://usn.ubuntu.com/4298-1/","reference_id":"USN-4298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4298-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939882?format=json","purl":"pkg:deb/debian/sqlite3@3.30.1%2Bfossil191229-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.30.1%252Bfossil191229-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-20218"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gb4s-4wcm-eyft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82962?format=json","vulnerability_id":"VCID-gprj-j4v6-z7ev","summary":"sqlite: Multiple flaws in sqlite which can be triggered via corrupted internal databases (Magellan)","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20506.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20506.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20506","reference_id":"","reference_type":"","scores":[{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92331","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92408","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92386","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92389","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92399","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92347","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92359","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92363","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92369","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92371","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.9238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08492","scoring_system":"epss","scoring_elements":"0.92382","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20506"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/62","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/62"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/64","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/64"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/66","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/66"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/67","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/67"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/68","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/68"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jan/69","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jan/69"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/28","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/28"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/29","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/29"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/31","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/31"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/32","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/32"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/33","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/33"},{"reference_url":"https://seclists.org/bugtraq/2019/Jan/39","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jan/39"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190502-0004/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190502-0004/"},{"reference_url":"https://sqlite.org/src/info/940f2adc8541a838","reference_id":"","reference_type":"","scores":[],"url":"https://sqlite.org/src/info/940f2adc8541a838"},{"reference_url":"https://support.apple.com/kb/HT209443","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209443"},{"reference_url":"https://support.apple.com/kb/HT209446","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209446"},{"reference_url":"https://support.apple.com/kb/HT209447","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209447"},{"reference_url":"https://support.apple.com/kb/HT209448","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209448"},{"reference_url":"https://support.apple.com/kb/HT209450","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209450"},{"reference_url":"https://support.apple.com/kb/HT209451","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT209451"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"http://www.securityfocus.com/bid/106698","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106698"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379","reference_id":"1659379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20506","reference_id":"CVE-2018-20506","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20506"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"},{"reference_url":"https://usn.ubuntu.com/4019-2/","reference_id":"USN-4019-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939879?format=json","purl":"pkg:deb/debian/sqlite3@3.25.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.25.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2018-20506"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gprj-j4v6-z7ev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84017?format=json","vulnerability_id":"VCID-hfyf-qs8x-pkba","summary":"sqlite: Local DoS via dump_callback function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13685.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13685.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13685","reference_id":"","reference_type":"","scores":[{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60434","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.6064","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60588","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60582","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60509","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60536","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60506","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60554","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60571","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60592","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60597","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60603","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60591","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00397","scoring_system":"epss","scoring_elements":"0.60576","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488881","reference_id":"1488881","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488881"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873762","reference_id":"873762","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873762"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"},{"reference_url":"https://usn.ubuntu.com/4019-2/","reference_id":"USN-4019-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939874?format=json","purl":"pkg:deb/debian/sqlite3@3.20.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.20.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2017-13685"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hfyf-qs8x-pkba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78528?format=json","vulnerability_id":"VCID-j7cb-3ptn-9qeb","summary":"sqlite: Crash due to misuse of window functions.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24736.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24736.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24736","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06746","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06823","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06935","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06867","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06853","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06908","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06938","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07348","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07475","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07434","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07425","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07446","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07435","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07361","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08793","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08869","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08938","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08716","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24736"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2186385","reference_id":"2186385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2186385"},{"reference_url":"https://www.sqlite.org/src/info/4feb3159c6bc3f7e33959","reference_id":"4feb3159c6bc3f7e33959","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T17:30:13Z/"}],"url":"https://www.sqlite.org/src/info/4feb3159c6bc3f7e33959"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230526-0005/","reference_id":"ntap-20230526-0005","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T17:30:13Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230526-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3840","reference_id":"RHSA-2023:3840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0425","reference_id":"RHSA-2024:0425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0425"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939891?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2020-24736"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j7cb-3ptn-9qeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45193?format=json","vulnerability_id":"VCID-j97s-6d3q-2yb8","summary":"Multiple vulnerabilities have been found in SQLite, allowing\n    context-dependent attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3416.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3416.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3416","reference_id":"","reference_type":"","scores":[{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91863","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.9177","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91779","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91785","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91793","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91805","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91812","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91815","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91817","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91813","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91833","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91832","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91841","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07527","scoring_system":"epss","scoring_elements":"0.91853","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212357","reference_id":"1212357","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212357"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968","reference_id":"783968","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968"},{"reference_url":"https://security.gentoo.org/glsa/201507-05","reference_id":"GLSA-201507-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1634","reference_id":"RHSA-2015:1634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1635","reference_id":"RHSA-2015:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1635"},{"reference_url":"https://usn.ubuntu.com/2698-1/","reference_id":"USN-2698-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2698-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939871?format=json","purl":"pkg:deb/debian/sqlite3@3.8.9-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.8.9-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2015-3416"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j97s-6d3q-2yb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39747?format=json","vulnerability_id":"VCID-jc4t-g7qn-tfc7","summary":"A vulnerability in SQLite may allow for the remote execution of\n    code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html"},{"reference_url":"https://access.redhat.com/articles/3758321","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/articles/3758321"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20346.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20346.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20346","reference_id":"","reference_type":"","scores":[{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.941","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94193","published_at":"2026-05-09T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94161","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94164","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.9417","published_at":"2026-05-05T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94182","published_at":"2026-05-07T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94109","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94121","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94124","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94133","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94137","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94142","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94141","published_at":"2026-04-12T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94157","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13215","scoring_system":"epss","scoring_elements":"0.94162","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20346"},{"reference_url":"https://blade.tencent.com/magellan/index_en.html","reference_id":"","reference_type":"","scores":[],"url":"https://blade.tencent.com/magellan/index_en.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659677","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659677"},{"reference_url":"https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"},{"reference_url":"https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e","reference_id":"","reference_type":"","scores":[],"url":"https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e"},{"reference_url":"https://crbug.com/900910","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/900910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18336","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18336"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18337","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18339","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18348","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18348"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18349","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18349"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18350","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18350"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18351","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18351"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18353","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18354","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18354"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18355","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18355"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18357","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18357"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20067","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20067"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20070","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20070"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/"},{"reference_url":"https://news.ycombinator.com/item?id=18685296","reference_id":"","reference_type":"","scores":[],"url":"https://news.ycombinator.com/item?id=18685296"},{"reference_url":"https://sqlite.org/src/info/940f2adc8541a838","reference_id":"","reference_type":"","scores":[],"url":"https://sqlite.org/src/info/940f2adc8541a838"},{"reference_url":"https://sqlite.org/src/info/d44318f59044162e","reference_id":"","reference_type":"","scores":[],"url":"https://sqlite.org/src/info/d44318f59044162e"},{"reference_url":"https://support.apple.com/HT209443","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT209443"},{"reference_url":"https://support.apple.com/HT209446","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT209446"},{"reference_url":"https://support.apple.com/HT209447","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT209447"},{"reference_url":"https://support.apple.com/HT209448","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT209448"},{"reference_url":"https://support.apple.com/HT209450","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT209450"},{"reference_url":"https://support.apple.com/HT209451","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT209451"},{"reference_url":"https://worthdoingbadly.com/sqlitebug/","reference_id":"","reference_type":"","scores":[],"url":"https://worthdoingbadly.com/sqlitebug/"},{"reference_url":"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc","reference_id":"","reference_type":"","scores":[],"url":"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc"},{"reference_url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg113218.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg113218.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://www.sqlite.org/releaselog/3_25_3.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.sqlite.org/releaselog/3_25_3.html"},{"reference_url":"https://www.synology.com/security/advisory/Synology_SA_18_61","reference_id":"","reference_type":"","scores":[],"url":"https://www.synology.com/security/advisory/Synology_SA_18_61"},{"reference_url":"http://www.securityfocus.com/bid/106323","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106323"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379","reference_id":"1659379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1659379"},{"reference_url":"https://security.archlinux.org/AVG-840","reference_id":"AVG-840","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-840"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20346","reference_id":"CVE-2018-20346","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20346"},{"reference_url":"https://security.gentoo.org/glsa/201904-21","reference_id":"GLSA-201904-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-21"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"},{"reference_url":"https://usn.ubuntu.com/4019-2/","reference_id":"USN-4019-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939879?format=json","purl":"pkg:deb/debian/sqlite3@3.25.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.25.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2018-20346"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jc4t-g7qn-tfc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77877?format=json","vulnerability_id":"VCID-jqy9-zum8-aqfn","summary":"sqlite: heap-buffer-overflow at sessionfuzz","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7104.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7104.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-7104","reference_id":"","reference_type":"","scores":[{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32443","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31852","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31845","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31772","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31921","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32004","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32126","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32352","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32316","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32343","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32379","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32351","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32478","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-7104"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7104","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7104"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sqlite.org/src/info/0e4e7a05c4204b47","reference_id":"0e4e7a05c4204b47","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/"}],"url":"https://sqlite.org/src/info/0e4e7a05c4204b47"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256194","reference_id":"2256194","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256194"},{"reference_url":"https://sqlite.org/forum/forumpost/5bcbf4571c","reference_id":"5bcbf4571c","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/"}],"url":"https://sqlite.org/forum/forumpost/5bcbf4571c"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/","reference_id":"AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/"},{"reference_url":"https://vuldb.com/?ctiid.248999","reference_id":"?ctiid.248999","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/"}],"url":"https://vuldb.com/?ctiid.248999"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/","reference_id":"D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/"},{"reference_url":"https://vuldb.com/?id.248999","reference_id":"?id.248999","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/"}],"url":"https://vuldb.com/?id.248999"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240112-0008/","reference_id":"ntap-20240112-0008","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:P/I:P/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:36:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240112-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0253","reference_id":"RHSA-2024:0253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0465","reference_id":"RHSA-2024:0465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0589","reference_id":"RHSA-2024:0589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1081","reference_id":"RHSA-2024:1081","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1081"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1107","reference_id":"RHSA-2024:1107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1383","reference_id":"RHSA-2024:1383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1383"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1477","reference_id":"RHSA-2024:1477","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1477"},{"reference_url":"https://usn.ubuntu.com/6566-1/","reference_id":"USN-6566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6566-1/"},{"reference_url":"https://usn.ubuntu.com/6566-2/","reference_id":"USN-6566-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6566-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939895?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939898?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939899?format=json","purl":"pkg:deb/debian/sqlite3@3.43.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.43.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2023-7104"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jqy9-zum8-aqfn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68451?format=json","vulnerability_id":"VCID-jree-ndwj-kfcy","summary":"sqlite: SQLite integer overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7458.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7458.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-7458","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21639","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.216","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21594","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21585","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21488","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21553","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23395","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23597","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23642","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23658","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23616","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23559","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23525","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23745","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24589","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24598","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24566","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-7458"},{"reference_url":"https://sqlite.org/src/info/12ad822d9b827777","reference_id":"12ad822d9b827777","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-29T13:30:48Z/"}],"url":"https://sqlite.org/src/info/12ad822d9b827777"},{"reference_url":"https://sqlite.org/forum/forumpost/16ce2bb7a639e29b","reference_id":"16ce2bb7a639e29b","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-29T13:30:48Z/"}],"url":"https://sqlite.org/forum/forumpost/16ce2bb7a639e29b"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2384237","reference_id":"2384237","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2384237"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939883?format=json","purl":"pkg:deb/debian/sqlite3@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939904?format=json","purl":"pkg:deb/debian/sqlite3@3.42.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.42.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2025-7458"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jree-ndwj-kfcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31387?format=json","vulnerability_id":"VCID-jsyj-vz3p-rbae","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11655.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11655.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-11655","reference_id":"","reference_type":"","scores":[{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89543","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89652","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89612","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89621","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89639","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.8956","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89561","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89578","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89583","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.8959","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89588","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89582","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89596","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89597","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89593","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0489","scoring_system":"epss","scoring_elements":"0.89608","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-11655"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","reference_id":"","reference_type":"","scores":[],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"reference_url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","reference_id":"","reference_type":"","scores":[],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20200416-0001/"},{"reference_url":"https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11","reference_id":"","reference_type":"","scores":[],"url":"https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11"},{"reference_url":"https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c","reference_id":"","reference_type":"","scores":[],"url":"https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c"},{"reference_url":"https://www.oracle.com/security-alerts/cpuApr2021.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2021.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"reference_url":"https://www.tenable.com/security/tns-2021-14","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2021-14"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1824174","reference_id":"1824174","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1824174"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11655","reference_id":"CVE-2020-11655","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11655"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16504","reference_id":"RHSA-2025:16504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16504"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939886?format=json","purl":"pkg:deb/debian/sqlite3@3.31.1-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.31.1-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2020-11655"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jsyj-vz3p-rbae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70397?format=json","vulnerability_id":"VCID-k73q-j1pc-4kcn","summary":"SQLite: integer overflow in SQLite","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3277.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3277.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-3277","reference_id":"","reference_type":"","scores":[{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.72975","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73155","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73112","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73105","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73133","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.72995","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.72971","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73008","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73022","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73046","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73025","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73019","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73062","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73071","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73064","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73103","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73114","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-3277"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359553","reference_id":"2359553","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359553"},{"reference_url":"https://sqlite.org/src/info/498e3f1cf57f164f","reference_id":"498e3f1cf57f164f","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:15:26Z/"}],"url":"https://sqlite.org/src/info/498e3f1cf57f164f"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4459","reference_id":"RHSA-2025:4459","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4459"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7433","reference_id":"RHSA-2025:7433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7517","reference_id":"RHSA-2025:7517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7517"},{"reference_url":"https://usn.ubuntu.com/7528-1/","reference_id":"USN-7528-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7528-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939883?format=json","purl":"pkg:deb/debian/sqlite3@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939901?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2025-3277"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k73q-j1pc-4kcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93201?format=json","vulnerability_id":"VCID-kvpm-8vj2-8qcj","summary":"An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"SQLite\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted SQL statement.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2519","reference_id":"","reference_type":"","scores":[{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92866","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92874","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92877","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92875","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92884","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92887","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92893","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92891","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92892","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92904","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.9291","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92913","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92915","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92911","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92931","published_at":"2026-05-07T12:55:00Z"},{"value":"0.09633","scoring_system":"epss","scoring_elements":"0.92942","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2519"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939877?format=json","purl":"pkg:deb/debian/sqlite3@3.16.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2017-2519"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kvpm-8vj2-8qcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83890?format=json","vulnerability_id":"VCID-mqb8-wfvg-xbgz","summary":"sqlite: NULL pointer dereference in tableColumnList","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15286.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15286.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15286","reference_id":"","reference_type":"","scores":[{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64347","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64564","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64471","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64519","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64401","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.6443","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.6439","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64438","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64454","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64466","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64426","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.6446","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64472","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64464","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64485","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64498","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64497","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15286"},{"reference_url":"https://github.com/Ha0Team/crash-of-sqlite3/blob/master/poc.md","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/Ha0Team/crash-of-sqlite3/blob/master/poc.md"},{"reference_url":"http://www.securityfocus.com/bid/101285","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101285"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1510438","reference_id":"1510438","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1510438"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878680","reference_id":"878680","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878680"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.20.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:3.20.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.20.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15286","reference_id":"CVE-2017-15286","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15286"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939875?format=json","purl":"pkg:deb/debian/sqlite3@3.20.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.20.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2017-15286"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mqb8-wfvg-xbgz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93202?format=json","vulnerability_id":"VCID-mvbm-keyp-akf1","summary":"An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"SQLite\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted SQL statement.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2520","reference_id":"","reference_type":"","scores":[{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.9326","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93268","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93273","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93281","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93286","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.9329","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93288","published_at":"2026-04-12T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93307","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.9332","published_at":"2026-04-21T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93325","published_at":"2026-04-24T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93321","published_at":"2026-04-26T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93318","published_at":"2026-04-29T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93324","published_at":"2026-05-05T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93338","published_at":"2026-05-07T12:55:00Z"},{"value":"0.1061","scoring_system":"epss","scoring_elements":"0.93347","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2520"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939878?format=json","purl":"pkg:deb/debian/sqlite3@3.16.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.16.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2017-2520"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mvbm-keyp-akf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81687?format=json","vulnerability_id":"VCID-p4b6-m68m-aqeq","summary":"sqlite: zipfileUpdate in ext/misc/zipfile.c mishandles a NULL pathname during an update of a ZIP archive","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19925.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19925.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19925","reference_id":"","reference_type":"","scores":[{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91426","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91538","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91515","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.9153","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91433","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91443","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.9145","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91463","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91469","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91475","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91478","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91476","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.915","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91496","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91504","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07012","scoring_system":"epss","scoring_elements":"0.91502","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788866","reference_id":"1788866","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788866"},{"reference_url":"https://security.archlinux.org/ASA-202002-3","reference_id":"ASA-202002-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-3"},{"reference_url":"https://security.archlinux.org/AVG-1092","reference_id":"AVG-1092","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1810","reference_id":"RHSA-2020:1810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1810"},{"reference_url":"https://usn.ubuntu.com/4298-1/","reference_id":"USN-4298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4298-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939882?format=json","purl":"pkg:deb/debian/sqlite3@3.30.1%2Bfossil191229-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.30.1%252Bfossil191229-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-19925"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p4b6-m68m-aqeq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78029?format=json","vulnerability_id":"VCID-ph3q-9hjf-hbgh","summary":"sqlite: use-after-free bug in jsonParseAddNodeArray","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0232.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0232.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0232","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04816","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04734","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04771","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04471","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04496","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04509","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04545","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.0456","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04548","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04533","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04518","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04492","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04501","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04638","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04679","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04713","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0232"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2243754","reference_id":"2243754","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:18:59Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2243754"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-0232","reference_id":"CVE-2024-0232","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:18:59Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-0232"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939883?format=json","purl":"pkg:deb/debian/sqlite3@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939900?format=json","purl":"pkg:deb/debian/sqlite3@3.43.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.43.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2024-0232"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ph3q-9hjf-hbgh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93200?format=json","vulnerability_id":"VCID-q8wn-gjw8-fkhu","summary":"An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"SQLite\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted SQL statement.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2518","reference_id":"","reference_type":"","scores":[{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95986","published_at":"2026-05-09T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95915","published_at":"2026-04-01T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95923","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95931","published_at":"2026-04-04T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95934","published_at":"2026-04-07T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95943","published_at":"2026-04-08T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95946","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95949","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95952","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95963","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95967","published_at":"2026-04-29T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95969","published_at":"2026-04-24T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95968","published_at":"2026-04-26T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95977","published_at":"2026-05-05T12:55:00Z"},{"value":"0.23291","scoring_system":"epss","scoring_elements":"0.95983","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"},{"reference_url":"https://usn.ubuntu.com/4019-2/","reference_id":"USN-4019-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939876?format=json","purl":"pkg:deb/debian/sqlite3@3.15.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.15.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2017-2518"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q8wn-gjw8-fkhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60261?format=json","vulnerability_id":"VCID-qhcj-2nua-8kde","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9937.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9937.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9937","reference_id":"","reference_type":"","scores":[{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88385","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88443","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88435","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.8845","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88446","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88444","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.8846","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88466","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88394","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88403","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88407","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04004","scoring_system":"epss","scoring_elements":"0.88426","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04196","scoring_system":"epss","scoring_elements":"0.88787","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04196","scoring_system":"epss","scoring_elements":"0.88799","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04196","scoring_system":"epss","scoring_elements":"0.88759","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04196","scoring_system":"epss","scoring_elements":"0.8877","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9937"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXD2GYJVTDGEQPUNMMMC5TB7MQXOBBMO/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N66U5PY5UJU4XBFZJH7QNKIDNAVIB4OP/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190416-0005/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190416-0005/"},{"reference_url":"https://sqlite.org/src/info/45c73deb440496e8","reference_id":"","reference_type":"","scores":[],"url":"https://sqlite.org/src/info/45c73deb440496e8"},{"reference_url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114383.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114383.html"},{"reference_url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114393.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg114393.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"http://www.securityfocus.com/bid/107562","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107562"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1692357","reference_id":"1692357","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1692357"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925290","reference_id":"925290","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925290"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.27.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9937","reference_id":"CVE-2019-9937","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9937"},{"reference_url":"https://security.gentoo.org/glsa/201908-09","reference_id":"GLSA-201908-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201908-09"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939885?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-9937"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qhcj-2nua-8kde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31391?format=json","vulnerability_id":"VCID-r31n-5brf-ykcv","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13435.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13435.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13435","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04971","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04646","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04654","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04793","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04828","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04866","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04879","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04878","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04927","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05303","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0519","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05292","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05233","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05265","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05291","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05325","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05348","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05315","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841231","reference_id":"1841231","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841231"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4396","reference_id":"RHSA-2021:4396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16504","reference_id":"RHSA-2025:16504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16504"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939888?format=json","purl":"pkg:deb/debian/sqlite3@3.32.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.32.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2020-13435"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r31n-5brf-ykcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86415?format=json","vulnerability_id":"VCID-rf69-j7zt-xfdw","summary":"sqlite: array overrun in the skip-scan optimization leading to memory corruption (DoS)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7443.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7443.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7443","reference_id":"","reference_type":"","scores":[{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.7948","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79486","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79509","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79496","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79524","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79532","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79554","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79537","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79528","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79558","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79557","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79561","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79593","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79599","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79614","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.7963","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79652","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01273","scoring_system":"epss","scoring_elements":"0.79669","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7443","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7443"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243476","reference_id":"1243476","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243476"},{"reference_url":"https://usn.ubuntu.com/2698-1/","reference_id":"USN-2698-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2698-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939867?format=json","purl":"pkg:deb/debian/sqlite3@3.8.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.8.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2013-7443"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rf69-j7zt-xfdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81576?format=json","vulnerability_id":"VCID-sy72-yhap-vbet","summary":"sqlite: Null pointer derreference in src/select.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35525.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35525.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35525","reference_id":"","reference_type":"","scores":[{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44323","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44581","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.4443","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44433","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44353","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44229","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44307","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44533","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44534","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.4459","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46812","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46845","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46863","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46807","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46866","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46889","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35525","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35525"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122324","reference_id":"2122324","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2122324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7108","reference_id":"RHSA-2022:7108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7108"},{"reference_url":"https://usn.ubuntu.com/5615-1/","reference_id":"USN-5615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5615-1/"},{"reference_url":"https://usn.ubuntu.com/5615-2/","reference_id":"USN-5615-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5615-2/"},{"reference_url":"https://usn.ubuntu.com/5615-3/","reference_id":"USN-5615-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5615-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939887?format=json","purl":"pkg:deb/debian/sqlite3@3.32.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.32.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2020-35525"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sy72-yhap-vbet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60259?format=json","vulnerability_id":"VCID-tpxf-9kf6-dbf8","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5018.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5018.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5018","reference_id":"","reference_type":"","scores":[{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.86034","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.8595","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.85954","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.85944","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.85964","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.85973","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.85974","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.85994","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.86016","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.85936","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02719","scoring_system":"epss","scoring_elements":"0.85931","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02932","scoring_system":"epss","scoring_elements":"0.86357","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02932","scoring_system":"epss","scoring_elements":"0.86367","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02932","scoring_system":"epss","scoring_elements":"0.86385","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02932","scoring_system":"epss","scoring_elements":"0.86386","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02932","scoring_system":"epss","scoring_elements":"0.86405","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02932","scoring_system":"epss","scoring_elements":"0.86415","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02932","scoring_system":"epss","scoring_elements":"0.86428","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5018"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5018","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5018"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1708301","reference_id":"1708301","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1708301"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928770","reference_id":"928770","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928770"},{"reference_url":"https://security.gentoo.org/glsa/201908-09","reference_id":"GLSA-201908-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201908-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4442","reference_id":"RHSA-2020:4442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4442"},{"reference_url":"https://usn.ubuntu.com/4205-1/","reference_id":"USN-4205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4205-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939884?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-5018"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tpxf-9kf6-dbf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31389?format=json","vulnerability_id":"VCID-u4pu-5b5r-yqg1","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13434.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13434.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13434","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17299","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17347","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17128","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1722","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17277","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17255","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17207","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17147","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17091","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17032","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17015","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.16958","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.16822","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.16936","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17043","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841223","reference_id":"1841223","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841223"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1581","reference_id":"RHSA-2021:1581","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1581"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1968","reference_id":"RHSA-2021:1968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16504","reference_id":"RHSA-2025:16504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16504"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939888?format=json","purl":"pkg:deb/debian/sqlite3@3.32.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.32.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2020-13434"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u4pu-5b5r-yqg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81814?format=json","vulnerability_id":"VCID-um2g-gsw6-wydv","summary":"sqlite: allows a crash if a sub-select uses both DISTINCT and window functions and also has certain ORDER BY usage","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19244.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19244.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19244","reference_id":"","reference_type":"","scores":[{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36405","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36847","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36855","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36507","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36419","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36304","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36377","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48961","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48999","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.4889","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48949","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48957","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49003","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48927","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48953","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48907","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19244"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","reference_id":"","reference_type":"","scores":[],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1777945","reference_id":"1777945","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1777945"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946656","reference_id":"946656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946656"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.30.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:3.30.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:3.30.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19244","reference_id":"CVE-2019-19244","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19244"},{"reference_url":"https://usn.ubuntu.com/4205-1/","reference_id":"USN-4205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4205-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939882?format=json","purl":"pkg:deb/debian/sqlite3@3.30.1%2Bfossil191229-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.30.1%252Bfossil191229-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-19244"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-um2g-gsw6-wydv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45187?format=json","vulnerability_id":"VCID-uxd9-2vze-w3ge","summary":"Multiple vulnerabilities have been found in SQLite, allowing\n    context-dependent attackers to cause a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3414.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3414.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3414","reference_id":"","reference_type":"","scores":[{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90321","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90398","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90416","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90324","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90336","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.9034","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90354","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.9036","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90369","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90368","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90362","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90377","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90376","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90375","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.9039","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05653","scoring_system":"epss","scoring_elements":"0.90385","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0794","scoring_system":"epss","scoring_elements":"0.92098","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212353","reference_id":"1212353","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1212353"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968","reference_id":"783968","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783968"},{"reference_url":"https://security.gentoo.org/glsa/201507-05","reference_id":"GLSA-201507-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1635","reference_id":"RHSA-2015:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1635"},{"reference_url":"https://usn.ubuntu.com/2698-1/","reference_id":"USN-2698-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2698-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939871?format=json","purl":"pkg:deb/debian/sqlite3@3.8.9-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.8.9-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2015-3414"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uxd9-2vze-w3ge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61419?format=json","vulnerability_id":"VCID-v5e8-wxcu-nka7","summary":"Multiple vulnerabilities have been discovered in SQLite, the worst of which may lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31239.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31239.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-31239","reference_id":"","reference_type":"","scores":[{"value":"0.05163","scoring_system":"epss","scoring_elements":"0.89854","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05163","scoring_system":"epss","scoring_elements":"0.89857","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05163","scoring_system":"epss","scoring_elements":"0.89871","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05163","scoring_system":"epss","scoring_elements":"0.89876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05163","scoring_system":"epss","scoring_elements":"0.89893","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05163","scoring_system":"epss","scoring_elements":"0.89897","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05163","scoring_system":"epss","scoring_elements":"0.89904","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05163","scoring_system":"epss","scoring_elements":"0.89902","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05163","scoring_system":"epss","scoring_elements":"0.89895","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05163","scoring_system":"epss","scoring_elements":"0.89909","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05163","scoring_system":"epss","scoring_elements":"0.8991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05163","scoring_system":"epss","scoring_elements":"0.89919","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05163","scoring_system":"epss","scoring_elements":"0.89918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05163","scoring_system":"epss","scoring_elements":"0.89933","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05163","scoring_system":"epss","scoring_elements":"0.89947","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05163","scoring_system":"epss","scoring_elements":"0.89959","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-31239"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207557","reference_id":"2207557","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207557"},{"reference_url":"https://security.gentoo.org/glsa/202311-03","reference_id":"GLSA-202311-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202311-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939883?format=json","purl":"pkg:deb/debian/sqlite3@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939894?format=json","purl":"pkg:deb/debian/sqlite3@3.36.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.36.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2021-31239"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v5e8-wxcu-nka7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82713?format=json","vulnerability_id":"VCID-vchu-y7qg-pucp","summary":"sqlite: heap out-of-bound read in function rtreenode()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8457.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8457.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-8457","reference_id":"","reference_type":"","scores":[{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96311","published_at":"2026-04-01T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96319","published_at":"2026-04-02T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96326","published_at":"2026-04-04T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.9633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96338","published_at":"2026-04-08T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96342","published_at":"2026-04-09T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96346","published_at":"2026-04-11T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96345","published_at":"2026-04-12T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96348","published_at":"2026-04-13T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96363","published_at":"2026-04-21T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96364","published_at":"2026-04-24T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96365","published_at":"2026-04-26T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96366","published_at":"2026-04-29T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.26786","scoring_system":"epss","scoring_elements":"0.96361","published_at":"2026-04-18T12:55:00Z"},{"value":"0.30735","scoring_system":"epss","scoring_elements":"0.96749","published_at":"2026-05-05T12:55:00Z"},{"value":"0.30735","scoring_system":"epss","scoring_elements":"0.96752","published_at":"2026-05-07T12:55:00Z"},{"value":"0.30735","scoring_system":"epss","scoring_elements":"0.96757","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-8457"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010974","reference_id":"1010974","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010974"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1716881","reference_id":"1716881","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1716881"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929775","reference_id":"929775","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1810","reference_id":"RHSA-2020:1810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1810"},{"reference_url":"https://usn.ubuntu.com/4004-1/","reference_id":"USN-4004-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4004-1/"},{"reference_url":"https://usn.ubuntu.com/4004-2/","reference_id":"USN-4004-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4004-2/"},{"reference_url":"https://usn.ubuntu.com/4019-1/","reference_id":"USN-4019-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-1/"},{"reference_url":"https://usn.ubuntu.com/4019-2/","reference_id":"USN-4019-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4019-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939884?format=json","purl":"pkg:deb/debian/sqlite3@3.27.2-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.27.2-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-8457"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vchu-y7qg-pucp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70455?format=json","vulnerability_id":"VCID-yc3b-t64n-zyc5","summary":"sqlite: Integer Overflow in SQLite concat_ws Function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-29087.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-29087.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-29087","reference_id":"","reference_type":"","scores":[{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44147","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44424","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44415","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44344","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44258","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4426","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44051","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44129","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44391","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44327","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44379","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44384","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44401","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00236","scoring_system":"epss","scoring_elements":"0.46455","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-29087"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102411","reference_id":"1102411","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102411"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2358028","reference_id":"2358028","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2358028"},{"reference_url":"https://sqlite.org/releaselog/3_49_1.html","reference_id":"3_49_1.html","reference_type":"","scores":[{"value":"3.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-08T13:27:16Z/"}],"url":"https://sqlite.org/releaselog/3_49_1.html"},{"reference_url":"https://gist.github.com/ylwango613/a44a29f1ef074fa783e29f04a0afd62a","reference_id":"a44a29f1ef074fa783e29f04a0afd62a","reference_type":"","scores":[{"value":"3.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-08T13:27:16Z/"}],"url":"https://gist.github.com/ylwango613/a44a29f1ef074fa783e29f04a0afd62a"},{"reference_url":"https://usn.ubuntu.com/7528-1/","reference_id":"USN-7528-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7528-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939883?format=json","purl":"pkg:deb/debian/sqlite3@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939901?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2025-29087"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yc3b-t64n-zyc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31393?format=json","vulnerability_id":"VCID-ye95-1dsg-afgd","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13631.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13631.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13631","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14784","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14659","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14719","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14751","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1475","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14685","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14562","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14695","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14756","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14652","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16653","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16715","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16471","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16599","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16632","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841568","reference_id":"1841568","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1841568"},{"reference_url":"https://security.gentoo.org/glsa/202007-26","reference_id":"GLSA-202007-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4442","reference_id":"RHSA-2020:4442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1968","reference_id":"RHSA-2021:1968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16504","reference_id":"RHSA-2025:16504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16504"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939887?format=json","purl":"pkg:deb/debian/sqlite3@3.32.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.32.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2020-13631"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ye95-1dsg-afgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81685?format=json","vulnerability_id":"VCID-ygnn-3qsr-kqg4","summary":"sqlite: mishandling of certain uses of SELECT DISTINCT involving a LEFT JOIN in flattenSubquery in select.c leads to a NULL pointer dereference","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19923.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19923.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19923","reference_id":"","reference_type":"","scores":[{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90814","published_at":"2026-04-01T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90943","published_at":"2026-05-09T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90913","published_at":"2026-05-05T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90931","published_at":"2026-05-07T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.9082","published_at":"2026-04-02T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.9083","published_at":"2026-04-04T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90841","published_at":"2026-04-07T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90867","published_at":"2026-04-12T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90865","published_at":"2026-04-13T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90889","published_at":"2026-04-16T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90887","published_at":"2026-04-21T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.909","published_at":"2026-04-24T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90899","published_at":"2026-04-26T12:55:00Z"},{"value":"0.062","scoring_system":"epss","scoring_elements":"0.90897","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788846","reference_id":"1788846","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788846"},{"reference_url":"https://security.archlinux.org/ASA-202002-3","reference_id":"ASA-202002-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-3"},{"reference_url":"https://security.archlinux.org/AVG-1092","reference_id":"AVG-1092","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1810","reference_id":"RHSA-2020:1810","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1810"},{"reference_url":"https://usn.ubuntu.com/4298-1/","reference_id":"USN-4298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4298-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939882?format=json","purl":"pkg:deb/debian/sqlite3@3.30.1%2Bfossil191229-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.30.1%252Bfossil191229-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-19923"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ygnn-3qsr-kqg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83587?format=json","vulnerability_id":"VCID-ym2v-jfk4-q3f5","summary":"sqlite: NULL pointer dereference with databases with schema corrupted with CREATE TABLE AS allows for denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8740.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8740.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-8740","reference_id":"","reference_type":"","scores":[{"value":"0.12623","scoring_system":"epss","scoring_elements":"0.93929","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12623","scoring_system":"epss","scoring_elements":"0.93938","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12623","scoring_system":"epss","scoring_elements":"0.93947","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12623","scoring_system":"epss","scoring_elements":"0.93951","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12623","scoring_system":"epss","scoring_elements":"0.93959","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12623","scoring_system":"epss","scoring_elements":"0.93962","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12623","scoring_system":"epss","scoring_elements":"0.93966","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13527","scoring_system":"epss","scoring_elements":"0.94271","published_at":"2026-05-09T12:55:00Z"},{"value":"0.13527","scoring_system":"epss","scoring_elements":"0.94236","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13527","scoring_system":"epss","scoring_elements":"0.94241","published_at":"2026-04-18T12:55:00Z"},{"value":"0.13527","scoring_system":"epss","scoring_elements":"0.94242","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13527","scoring_system":"epss","scoring_elements":"0.94245","published_at":"2026-04-26T12:55:00Z"},{"value":"0.13527","scoring_system":"epss","scoring_elements":"0.94246","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13527","scoring_system":"epss","scoring_elements":"0.94249","published_at":"2026-05-05T12:55:00Z"},{"value":"0.13527","scoring_system":"epss","scoring_elements":"0.9426","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-8740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1558804","reference_id":"1558804","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1558804"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893195","reference_id":"893195","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893195"},{"reference_url":"https://usn.ubuntu.com/4205-1/","reference_id":"USN-4205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4205-1/"},{"reference_url":"https://usn.ubuntu.com/4394-1/","reference_id":"USN-4394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939880?format=json","purl":"pkg:deb/debian/sqlite3@3.22.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.22.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2018-8740"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ym2v-jfk4-q3f5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59799?format=json","vulnerability_id":"VCID-yy9h-fptd-hkay","summary":"Multiple vulnerabilities have been found in SQLite, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00032.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00033.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16168.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16168.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-16168","reference_id":"","reference_type":"","scores":[{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74706","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74889","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74831","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74836","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74865","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74709","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74736","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74742","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.7478","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74759","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74749","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74786","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74794","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74784","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.7482","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74827","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-16168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10365"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZARJHJJDBHI7CE5PZEBXS5HKK6HXKW2/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZARJHJJDBHI7CE5PZEBXS5HKK6HXKW2/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190926-0003/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190926-0003/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200122-0003/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20200122-0003/"},{"reference_url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg116312.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg116312.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"reference_url":"https://www.sqlite.org/src/info/e4598ecbdd18bd82945f6029013296690e719a62","reference_id":"","reference_type":"","scores":[],"url":"https://www.sqlite.org/src/info/e4598ecbdd18bd82945f6029013296690e719a62"},{"reference_url":"https://www.sqlite.org/src/timeline?c=98357d8c1263920b","reference_id":"","reference_type":"","scores":[],"url":"https://www.sqlite.org/src/timeline?c=98357d8c1263920b"},{"reference_url":"https://www.tenable.com/security/tns-2021-08","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2021-08"},{"reference_url":"https://www.tenable.com/security/tns-2021-11","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2021-11"},{"reference_url":"https://www.tenable.com/security/tns-2021-14","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2021-14"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1768986","reference_id":"1768986","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1768986"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.3.4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_design_studio:7.3.4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.3.4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.3.5.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_design_studio:7.3.5.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.3.5.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.4.0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_design_studio:7.4.0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_design_studio:7.4.0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update231:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update231:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update231:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:nessus_agent:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:tenable:nessus_agent:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tenable:nessus_agent:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:zfs_storage_appliance:8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16168","reference_id":"CVE-2019-16168","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16168"},{"reference_url":"https://security.gentoo.org/glsa/202003-16","reference_id":"GLSA-202003-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4442","reference_id":"RHSA-2020:4442","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4442"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1968","reference_id":"RHSA-2021:1968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1968"},{"reference_url":"https://usn.ubuntu.com/4205-1/","reference_id":"USN-4205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4205-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939881?format=json","purl":"pkg:deb/debian/sqlite3@3.29.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.29.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-16168"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yy9h-fptd-hkay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81768?format=json","vulnerability_id":"VCID-z25w-w1h7-kkbv","summary":"sqlite: pragma.c mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19646.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19646.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19646","reference_id":"","reference_type":"","scores":[{"value":"0.07192","scoring_system":"epss","scoring_elements":"0.91548","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07192","scoring_system":"epss","scoring_elements":"0.91555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07192","scoring_system":"epss","scoring_elements":"0.91561","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07192","scoring_system":"epss","scoring_elements":"0.9157","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07192","scoring_system":"epss","scoring_elements":"0.91583","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07192","scoring_system":"epss","scoring_elements":"0.91589","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07192","scoring_system":"epss","scoring_elements":"0.91593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07192","scoring_system":"epss","scoring_elements":"0.91595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09456","scoring_system":"epss","scoring_elements":"0.92863","published_at":"2026-05-09T12:55:00Z"},{"value":"0.09456","scoring_system":"epss","scoring_elements":"0.92821","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09456","scoring_system":"epss","scoring_elements":"0.92822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09456","scoring_system":"epss","scoring_elements":"0.92826","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09456","scoring_system":"epss","scoring_elements":"0.92832","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09456","scoring_system":"epss","scoring_elements":"0.92833","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09456","scoring_system":"epss","scoring_elements":"0.92829","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09456","scoring_system":"epss","scoring_elements":"0.92838","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09456","scoring_system":"epss","scoring_elements":"0.92852","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19646"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1786743","reference_id":"1786743","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1786743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16504","reference_id":"RHSA-2025:16504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16504"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939883?format=json","purl":"pkg:deb/debian/sqlite3@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-19646"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z25w-w1h7-kkbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81714?format=json","vulnerability_id":"VCID-zr1v-9sde-b3fn","summary":"sqlite: error mishandling because of incomplete fix of CVE-2019-19880","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19926.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19926.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19926","reference_id":"","reference_type":"","scores":[{"value":"0.06317","scoring_system":"epss","scoring_elements":"0.90921","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06317","scoring_system":"epss","scoring_elements":"0.90972","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06317","scoring_system":"epss","scoring_elements":"0.90926","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06317","scoring_system":"epss","scoring_elements":"0.90935","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06317","scoring_system":"epss","scoring_elements":"0.90946","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06317","scoring_system":"epss","scoring_elements":"0.90963","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06317","scoring_system":"epss","scoring_elements":"0.90957","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.9233","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92312","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92322","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.9229","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92288","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.923","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92299","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08338","scoring_system":"epss","scoring_elements":"0.92301","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6385"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6391"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6398"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6399"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6401"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6502"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1789364","reference_id":"1789364","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1789364"},{"reference_url":"https://security.archlinux.org/ASA-202002-3","reference_id":"ASA-202002-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-3"},{"reference_url":"https://security.archlinux.org/AVG-1092","reference_id":"AVG-1092","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1092"},{"reference_url":"https://usn.ubuntu.com/4298-1/","reference_id":"USN-4298-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4298-1/"},{"reference_url":"https://usn.ubuntu.com/4298-2/","reference_id":"USN-4298-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4298-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/939883?format=json","purl":"pkg:deb/debian/sqlite3@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939868?format=json","purl":"pkg:deb/debian/sqlite3@3.34.1-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-7es8-7d9x-xfgm"},{"vulnerability":"VCID-fyxk-hw7d-ruc4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939866?format=json","purl":"pkg:deb/debian/sqlite3@3.40.1-2%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2k32-4p92-1ygz"},{"vulnerability":"VCID-6xmb-3zgw-xudu"},{"vulnerability":"VCID-jree-ndwj-kfcy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.40.1-2%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939870?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-7%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-7%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/939869?format=json","purl":"pkg:deb/debian/sqlite3@3.46.1-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.46.1-9%3Fdistro=trixie"}],"aliases":["CVE-2019-19926"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zr1v-9sde-b3fn"}],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sqlite3@3.34.1-3%3Fdistro=trixie"}