Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

sqlite

About This Vendor

sqlite is a technology vendor producing software and infrastructure products. As a software provider, sqlite's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of sqlite's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 63 known vulnerabilities from sqlite. This includes 10 critical-severity issues and 32 high-severity issues that represent significant risk. These vulnerabilities affect 67 distinct products across sqlite's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2009 through 2025, indicating decades of continuous security attention and research. Organizations deploying sqlite products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2008-6589 2009-04-03 2025-04-09 - 4.3 Likely
CVE-2008-6590 2009-04-03 2025-04-09 - 5.0 Likely
CVE-2008-6592 2009-04-03 2025-04-09 - 7.5 Likely
CVE-2008-6593 2009-04-03 2025-04-09 - 7.5 Likely
CVE-2015-3414 2015-04-24 2025-04-12 - 7.5 Likely
CVE-2015-3415 2015-04-24 2025-04-12 - 7.5 Likely
CVE-2015-3416 2015-04-24 2025-04-12 - 7.5 Likely
CVE-2015-3717 2015-07-03 2025-04-12 - 7.5 Likely
CVE-2013-7443 2015-08-12 2025-04-12 - 5.0 Likely
CVE-2015-5895 2015-09-18 2025-04-12 - 10.0 Likely
CVE-2015-6607 2015-10-06 2025-04-12 - 6.8 Likely
CVE-2016-6153 2016-09-26 2025-04-12 5.9 4.6 Unknown
CVE-2017-10989 2017-07-07 2025-04-20 9.8 7.5 Likely
CVE-2017-13685 2017-08-29 2025-04-20 5.5 4.3 Likely
CVE-2017-15286 2017-10-12 2025-04-20 7.5 5.0 Likely
CVE-2018-8740 2018-03-17 2024-11-21 7.5 5.0 Likely
CVE-2018-20346 2018-12-21 2024-11-21 8.1 6.8 Likely
CVE-2019-9936 2019-03-22 2024-11-21 7.5 5.0 Likely
CVE-2019-9937 2019-03-22 2024-11-21 7.5 5.0 Likely
CVE-2018-20505 2019-04-03 2024-11-21 7.5 5.0 Likely
CVE-2018-20506 2019-04-03 2024-11-21 8.1 6.8 Likely
CVE-2019-5018 2019-05-10 2024-11-21 8.1 6.8 Likely
CVE-2019-8457 2019-05-30 2024-11-21 9.8 7.5 Likely
CVE-2019-16168 2019-09-09 2024-11-21 6.5 4.3 Likely
CVE-2019-19244 2019-11-25 2024-11-21 7.5 5.0 Likely
CVE-2019-19242 2019-11-27 2024-11-21 5.9 4.3 Likely
CVE-2019-19317 2019-12-05 2024-11-21 9.8 7.5 Likely
CVE-2019-19645 2019-12-09 2024-11-21 5.5 2.1 Unknown
CVE-2019-19603 2019-12-09 2024-11-21 7.5 5.0 Likely
CVE-2019-19646 2019-12-09 2024-11-21 9.8 7.5 Likely
CVE-2019-19880 2019-12-18 2024-11-21 7.5 5.0 Likely
CVE-2019-19926 2019-12-23 2024-11-21 7.5 5.0 Likely
CVE-2019-19923 2019-12-24 2024-11-21 7.5 5.0 Likely
CVE-2019-19924 2019-12-24 2024-11-21 5.3 5.0 Likely
CVE-2019-19925 2019-12-24 2024-11-21 7.5 5.0 Likely
CVE-2019-20218 2020-01-02 2024-11-21 7.5 5.0 Likely
CVE-2019-19959 2020-01-03 2024-11-21 7.5 5.0 Likely
CVE-2020-9327 2020-02-21 2024-11-21 7.5 5.0 Likely
CVE-2020-11655 2020-04-09 2024-11-21 7.5 5.0 Likely
CVE-2020-11656 2020-04-09 2024-11-21 9.8 7.5 Likely
CVE-2020-13434 2020-05-24 2024-11-21 5.5 2.1 Unknown
CVE-2020-13435 2020-05-24 2024-11-21 5.5 2.1 Unknown
CVE-2020-13630 2020-05-27 2024-11-21 7.0 4.4 Unknown
CVE-2020-13631 2020-05-27 2024-11-21 5.5 2.1 Unknown
CVE-2020-13632 2020-05-27 2024-11-21 5.5 2.1 Unknown
CVE-2020-13871 2020-06-06 2024-11-21 7.5 5.0 Likely
CVE-2020-15358 2020-06-27 2024-11-21 5.5 2.1 Unknown
CVE-2021-20227 2021-03-23 2024-11-21 5.5 2.1 Unknown
CVE-2021-36690 2021-08-24 2025-11-03 7.5 5.0 Likely
CVE-2021-45346 2022-02-14 2024-11-21 4.3 4.0 Likely
CVE-2022-35737 2022-08-03 2026-02-13 7.5 - -
CVE-2020-35525 2022-09-01 2024-11-21 7.5 - -
CVE-2020-35527 2022-09-01 2024-11-21 9.8 - -
CVE-2022-46908 2022-12-12 2025-05-05 7.3 - -
CVE-2021-31239 2023-05-09 2025-05-05 7.5 - -
CVE-2023-7104 2023-12-29 2025-11-03 5.5 5.2 Unknown
CVE-2024-0232 2024-01-16 2024-11-21 4.7 - -
CVE-2022-31631 2025-02-12 2025-07-02 9.1 - -
CVE-2025-29087 2025-04-07 2025-04-30 3.2 - -
CVE-2025-29088 2025-04-10 2025-09-30 5.6 - -
CVE-2025-3277 2025-04-14 2025-08-18 9.8 - -
CVE-2025-6965 2025-07-15 2025-11-04 9.8 - -
CVE-2025-7458 2025-07-29 2025-08-11 9.1 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for sqlite by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with sqlite's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.