Vulnerabilities > Sqlite

DATE CVE VULNERABILITY TITLE RISK
2018-12-21 CVE-2018-20346 Integer Overflow or Wraparound vulnerability in multiple products
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
network
high complexity
sqlite google redhat debian opensuse CWE-190
8.1
2018-03-17 CVE-2018-8740 NULL Pointer Dereference vulnerability in multiple products
In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.
network
low complexity
sqlite debian CWE-476
7.5
2017-10-12 CVE-2017-15286 NULL Pointer Dereference vulnerability in Sqlite 3.20.1
SQLite 3.20.1 has a NULL pointer dereference in tableColumnList in shell.c because it fails to consider certain cases where `sqlite3_step(pStmt)==SQLITE_ROW` is false and a data structure is never initialized.
network
low complexity
sqlite CWE-476
7.5
2017-08-29 CVE-2017-13685 Improper Input Validation vulnerability in Sqlite 3.20.0
The dump_callback function in SQLite 3.20.0 allows remote attackers to cause a denial of service (EXC_BAD_ACCESS and application crash) via a crafted file.
local
low complexity
sqlite CWE-20
5.5
2017-07-07 CVE-2017-10989 Out-of-bounds Read vulnerability in Sqlite
The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.
network
low complexity
sqlite CWE-125
critical
9.8
2016-09-26 CVE-2016-6153 Improper Input Validation vulnerability in multiple products
os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.
local
low complexity
sqlite fedoraproject opensuse CWE-20
5.9