A flaw was found in SQLite's SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| sqlite | sqlite | 3.33.0 - 3.34.1 | - |
| oracle | communications_network_charging_and_control | 12.0.1.0 - 12.0.4.0.0 | - |
| oracle | communications_network_charging_and_control |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8
Affected Products
16
References
sqlite / sqlite
| - |
| - |
| oracle | enterprise_manager_for_oracle_database | - | - |
| oracle | jd_edwards_enterpriseone_tools | 9.2.6.0 | - |
| oracle | mysql_workbench | 8.0.26 | - |
| oracle | outside_in_technology | - | - |
| oracle | zfs_storage_appliance_kit | - | - |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Exploitability
Impact