### [CVE-2021-45346](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45346) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect. ### POC #### Reference - https://github.com/guyinatuxedo/sqlite3_record_leaking #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CKA-codespace/cg-compare - https://github.com/Dariani223/DevOpsFinal - https://github.com/Giovanni26101982/Grupo4_Docker_Tarea3 - https://github.com/GrigGM/05-virt-04-docker-hw - https://github.com/Myash-New/05-virt-04-docker-in-practice - https://github.com/Oscar112248/Grupo4_Docker_Tarea3 - https://github.com/PaulJara84/Grupo4_Docker_Tarea3 - https://github.com/TinchoXD/Grupo4_Docker_Tarea3 - https://github.com/akaganeite/CVE4PP - https://github.com/drewtwitchell/scancompare - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/guyinatuxedo/Beyond_Oblivion - https://github.com/mmbazm/secure_license_server - https://github.com/oportero/Grupo4_Docker_Tarea3 - https://github.com/testing-felickz/docker-scout-demo