sqlite3@5.0.1 vulnerabilities

Asynchronous, non-blocking SQLite3 bindings

Direct Vulnerabilities

Known vulnerabilities in the sqlite3 package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Arbitrary Code Execution

Affected versions of this package are vulnerable to Arbitrary Code Execution via the .ToString() method due to improper sanitization. Exploiting this vulnerability is possible when a binding parameter is a crafted Object and might result in arbitrary JavaScript code execution or DoS.

How to fix Arbitrary Code Execution?

Upgrade sqlite3 to version 5.1.5 or higher.

>=5.0.0 <5.1.5
  • H
Denial of Service (DoS)

Affected versions of this package are vulnerable to Denial of Service (DoS) which will invoke the toString function of the passed parameter. If passed an invalid Function object it will throw and crash the V8 engine.

How to fix Denial of Service (DoS)?

Upgrade sqlite3 to version 5.0.3 or higher.

<5.0.3