{"containers":{"cna":{"affected":[{"product":"sqlite3","vendor":"n/a","versions":[{"lessThan":"5.0.3","status":"affected","version":"unspecified","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Cristian-Alexandru Staicu"}],"datePublic":"2022-05-01T00:00:00.000Z","descriptions":[{"lang":"en","value":"The package sqlite3 before 5.0.3 are vulnerable to Denial of Service (DoS) which will invoke the toString function of the passed parameter. If passed an invalid Function object it will throw and crash the V8 engine."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","exploitCodeMaturity":"PROOF_OF_CONCEPT","integrityImpact":"NONE","privilegesRequired":"NONE","remediationLevel":"NOT_DEFINED","reportConfidence":"NOT_DEFINED","scope":"UNCHANGED","temporalScore":7.1,"temporalSeverity":"HIGH","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P","version":"3.1"}}],"problemTypes":[{"descriptions":[{"description":"Denial of Service (DoS)","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-05-01T15:25:15.000Z","orgId":"bae035ff-b466-4ff4-94d0-fc9efd9e1730","shortName":"snyk"},"references":[{"tags":["x_refsource_MISC"],"url":"https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645"},{"tags":["x_refsource_MISC"],"url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470"},{"tags":["x_refsource_MISC"],"url":"https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a"}],"title":"Denial of Service (DoS)","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"report@snyk.io","DATE_PUBLIC":"2022-05-01T15:20:21.681780Z","ID":"CVE-2022-21227","STATE":"PUBLIC","TITLE":"Denial of Service (DoS)"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"sqlite3","version":{"version_data":[{"version_affected":"<","version_value":"5.0.3"}]}}]},"vendor_name":"n/a"}]}},"credit":[{"lang":"eng","value":"Cristian-Alexandru Staicu"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The package sqlite3 before 5.0.3 are vulnerable to Denial of Service (DoS) which will invoke the toString function of the passed parameter. If passed an invalid Function object it will throw and crash the V8 engine."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Denial of Service (DoS)"}]}]},"references":{"reference_data":[{"name":"https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645","refsource":"MISC","url":"https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645"},{"name":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470","refsource":"MISC","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470"},{"name":"https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a","refsource":"MISC","url":"https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T02:31:59.270Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a"}]}]},"cveMetadata":{"assignerOrgId":"bae035ff-b466-4ff4-94d0-fc9efd9e1730","assignerShortName":"snyk","cveId":"CVE-2022-21227","datePublished":"2022-05-01T15:25:15.734Z","dateReserved":"2022-02-24T00:00:00.000Z","dateUpdated":"2024-09-16T18:48:34.205Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}