5
CVSSv2

CVE-2018-8740

Published: 17/03/2018 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 447
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

In SQLite up to and including 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sqlite sqlite

debian debian linux 8.0

Vendor Advisories

Debian Bug report logs - #893195 sqlite3: CVE-2018-8740: null pointer derference Package: src:sqlite3; Maintainer for src:sqlite3 is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 17 Mar 2018 09:06:02 UTC Severity: important Tags: patch, security, upstream ...
Several security issues were fixed in SQLite ...
Several security issues were fixed in SQLite ...
A NULL pointer dereference vulnerability was found in SQLite Loading a database whose schema was corrupted using a CREATE TABLE AS statement would result in a SQLite crash ...

Github Repositories

Mend security scan action for Github package registry

Whitesource GP Security Action This action is designed to run as part of the workflow registry_package triggered event It scans the published/updated Docker image in GP and reports back with found security vulnerabilities and license information Usage See actionyml Input Parameters gp-token: GitHub personal access token with read/write privileges to GP This parameter must b

Whitesource GP Security Action This action is designed to run as part of the workflow registry_package triggered event It scans the published/updated Docker image in GP and reports back with found security vulnerabilities and license information Usage See actionyml Input Parameters gp-token: GitHub personal access token with read/write privileges to GP This parameter must b

dsfjk Whitesource GPR Security Action This action is designed to run as part of the workflow registry_package triggered event It scans the published/updated Docker image in GPR and reports back with found security vulnerabilities and license information Usage See actionyml Input Parameters gpr-token: GitHub personal access token with read/write privileges to GPR We strongly

Mend security scan action for Github package registry

Whitesource GP Security Action This action is designed to run as part of the workflow registry_package triggered event It scans the published/updated Docker image in GP and reports back with found security vulnerabilities and license information Usage See actionyml Input Parameters gp-token: GitHub personal access token with read/write privileges to GP This parameter must b

dsfjk Whitesource GPR Security Action This action is designed to run as part of the workflow registry_package triggered event It scans the published/updated Docker image in GPR and reports back with found security vulnerabilities and license information Usage See actionyml Input Parameters gpr-token: GitHub personal access token with read/write privileges to GPR We strongly