ePrivacy and GPDR Cookie Consent by Cookie Consent
SQLite 3.30.1 Error expr.c sqlite3WindowRewrite() sql injection – Digitalmunition




Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on December 25th, 2019 📆 | 7635 Views ⚑

0

SQLite 3.30.1 Error expr.c sqlite3WindowRewrite() sql injection

CVSS Meta Temp ScoreCurrent Exploit Price (≈)CTI Interest Score
5.5$0-$5k3.01

A vulnerability classified as problematic was found in SQLite 3.30.1. This vulnerability affects the function sqlite3WindowRewrite() of the file expr.c of the component Error Handler. The impact remains unknown.

The weakness was published 12/24/2019. This vulnerability was named CVE-2019-19924 since 12/23/2019. There are known technical details, but no exploit is available. The current price for an exploit might be approx. USD $5k-$25k (estimation calculated on 12/25/2019).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Similar entries are available at 147701 and 147699.

Name

VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.5

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.5
VulDB Vector: 🔒
VulDB Reliability: 🔍

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Unknown
Local: Yes
Remote: No

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: no mitigation known

0-Day Time: 🔒

12/23/2019 CVE assigned
12/24/2019 +1 days Advisory disclosed
12/25/2019 +1 days VulDB entry created
12/25/2019 +0 days VulDB last update
CVE: CVE-2019-19924 (🔒)
See also: 🔒Created: 12/25/2019 10:05 AM
Complete: 🔍

Enable the mail alert feature now!

https://vuldb.com/?id.147700

Tagged with:



Leave a Reply

Your email address will not be published. Required fields are marked *


loading...