mariadb-10.1 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the mariadb-10.1 package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Improper Locking

*
  • M
Improper Locking

*
  • M
Improper Locking

*
  • M
Improper Locking

*
  • H
SQL Injection

*
  • H
SQL Injection

*
  • H
Use After Free

*
  • H
Use After Free

*
  • H
Use After Free

*
  • H
SQL Injection

*
  • H
Reachable Assertion

*
  • H
Use After Free

*
  • H
Use After Free

*
  • H
Use After Free

*
  • H
SQL Injection

*
  • H
SQL Injection

*
  • H
SQL Injection

*
  • H
Use After Free

*
  • H
Buffer Overflow

*
  • H
SQL Injection

*
  • H
CVE-2022-27449

*
  • H
CVE-2022-27452

*
  • H
Reachable Assertion

*
  • H
Use After Free

*
  • H
CVE-2022-27446

*
  • H
CVE-2022-27451

*
  • H
CVE-2022-27445

*
  • H
CVE-2022-27444

*
  • H
OS Command Injection

<10.1.48-0+deb9u2
  • M
CVE-2021-2022

<10.1.47-0+deb9u1
  • M
CVE-2020-14812

<10.1.48-0+deb9u1
  • M
CVE-2020-14765

<10.1.48-0+deb9u1
  • C
Improper Input Validation

<10.1.47-0+deb9u1
  • M
CVE-2020-2752

<10.1.45-0+deb9u1
  • M
CVE-2020-2814

<10.1.45-0+deb9u1
  • M
CVE-2020-2812

<10.1.45-0+deb9u1
  • M
CVE-2020-2574

<10.1.44-0+deb9u1
  • M
CVE-2019-2974

<10.1.44-0+deb9u1
  • M
CVE-2019-2737

<10.1.41-0+deb9u1
  • M
CVE-2019-2740

<10.1.41-0+deb9u1
  • M
CVE-2019-2739

<10.1.41-0+deb9u1
  • M
CVE-2019-2805

<10.1.41-0+deb9u1
  • M
CVE-2019-2627

<10.1.41-0+deb9u1
  • M
CVE-2019-2614

<10.1.41-0+deb9u1
  • M
CVE-2019-2537

<10.1.38-0+deb9u1
  • M
CVE-2019-2503

<10.1.37-0+deb9u1
  • M
CVE-2019-2529

<10.1.38-0+deb9u1
  • M
CVE-2018-3282

<10.1.37-0+deb9u1
  • M
CVE-2018-3251

<10.1.37-0+deb9u1
  • M
CVE-2018-3174

<10.1.37-0+deb9u1
  • M
CVE-2018-3156

<10.1.37-0+deb9u1
  • M
CVE-2018-3143

<10.1.37-0+deb9u1
  • H
CVE-2018-3064

<10.1.37-0+deb9u1
  • M
CVE-2018-3081

<10.1.37-0+deb9u1
  • L
CVE-2018-3066

<10.1.37-0+deb9u1
  • M
CVE-2018-3063

<10.1.37-0+deb9u1
  • M
CVE-2018-3058

<10.1.37-0+deb9u1
  • L
CVE-2018-2767

<10.1.37-0+deb9u1
  • M
CVE-2018-2781

<10.1.37-0+deb9u1
  • H
CVE-2018-2755

<10.1.37-0+deb9u1
  • M
CVE-2018-2782

<10.1.37-0+deb9u1
  • M
CVE-2018-2766

<10.1.37-0+deb9u1
  • M
CVE-2018-2761

<10.1.37-0+deb9u1
  • M
CVE-2018-2817

<10.1.37-0+deb9u1
  • M
CVE-2018-2813

<10.1.37-0+deb9u1
  • M
CVE-2018-2771

<10.1.37-0+deb9u1
  • M
CVE-2018-2787

<10.1.37-0+deb9u1
  • M
CVE-2018-2819

<10.1.37-0+deb9u1
  • M
CVE-2018-2784

<10.1.37-0+deb9u1
  • H
CVE-2017-15365

<10.1.37-0+deb9u1
  • M
CVE-2018-2612

<10.1.37-0+deb9u1
  • M
CVE-2018-2668

<10.1.37-0+deb9u1
  • M
CVE-2018-2640

<10.1.37-0+deb9u1
  • M
CVE-2018-2622

<10.1.37-0+deb9u1
  • M
CVE-2018-2665

<10.1.37-0+deb9u1
  • H
CVE-2018-2562

<10.1.37-0+deb9u1
  • M
Information Exposure

<10.1.37-0+deb9u1
  • M
CVE-2017-10378

<10.1.37-0+deb9u1
  • L
CVE-2017-3653

<10.1.26-0+deb9u1
  • M
CVE-2017-3636

<10.1.26-0+deb9u1
  • M
CVE-2017-3641

<10.1.26-0+deb9u1
  • M
CVE-2017-3464

<10.1.23-1
  • H
CVE-2017-3309

<10.1.23-1
  • M
CVE-2017-3453

<10.1.23-1
  • H
CVE-2017-3308

<10.1.23-1
  • M
CVE-2017-3456

<10.1.23-1
  • H
Use After Free

<10.1.23-1
  • M
CVE-2017-3317

<10.1.21-1
  • M
CVE-2017-3238

<10.1.21-1
  • M
CVE-2017-3312

<10.1.21-1
  • M
CVE-2017-3244

<10.1.21-1
  • M
CVE-2017-3265

<10.1.21-1
  • M
CVE-2017-3243

<10.1.21-1
  • M
Information Exposure

<10.1.23-1
  • M
Improper Input Validation

<10.1.21-1
  • M
Improper Privilege Management

<10.1.21-1
  • M
CVE-2017-3291

<10.1.21-1
  • M
CVE-2017-3318

<10.1.21-1
  • H
Link Following

<10.1.21-1