[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:70412
SQL Server 2019 is installed

oval:org.secpod.oval:def:93694
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via a connection driver.

oval:org.secpod.oval:def:93693
Microsoft SQL ODBC Driver Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via a connection driver.

oval:org.secpod.oval:def:93695
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could ...

oval:org.secpod.oval:def:93696
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could ...

oval:org.secpod.oval:def:87528
The host is installed with SQL Server and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

oval:org.secpod.oval:def:87650
The host is missing an critical security update for KB5021124

oval:org.secpod.oval:def:87529
The host is installed with SQL Server and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

oval:org.secpod.oval:def:87653
The host is missing an critical security update for KB5021125

oval:org.secpod.oval:def:87530
The host is installed with SQL Server and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

oval:org.secpod.oval:def:87531
The host is installed with SQL Server and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

oval:org.secpod.oval:def:87532
The host is installed with SQL Server and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

oval:org.secpod.oval:def:87533
The host is installed with SQL Server and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

oval:org.secpod.oval:def:81547
The host is installed with SQL Server and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted query. Successful exploitation could allow an authenticated attacker could execute a specially crafted query using $ partition ...

oval:org.secpod.oval:def:81555
The host is missing an important security update for KB5014356

oval:org.secpod.oval:def:81552
The host is missing an important security update for KB5014353

oval:org.secpod.oval:def:93697
Microsoft SQL Server Denial of Service Vulnerability. An attacker could impact availability of the service resulting in Denial of Service (DoS).

oval:org.secpod.oval:def:93703
The host is missing an important security update for KB5029378

oval:org.secpod.oval:def:93704
The host is missing an important security update for KB5029377

oval:org.secpod.oval:def:98908
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client.

oval:org.secpod.oval:def:98911
The host is missing an important security update for KB5035434

oval:org.secpod.oval:def:98912
The host is missing an important security update for KB5036335

oval:org.secpod.oval:def:98907
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client.

oval:org.secpod.oval:def:98905
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client.

oval:org.secpod.oval:def:98906
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client.

oval:org.secpod.oval:def:98903
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client.

oval:org.secpod.oval:def:98904
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client.

oval:org.secpod.oval:def:98901
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client.

oval:org.secpod.oval:def:98902
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client.

oval:org.secpod.oval:def:98900
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client.

oval:org.secpod.oval:def:98899
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.

oval:org.secpod.oval:def:98896
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.

oval:org.secpod.oval:def:98897
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client.

oval:org.secpod.oval:def:98898
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client.

oval:org.secpod.oval:def:98892
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit executio ...

oval:org.secpod.oval:def:98893
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client.

oval:org.secpod.oval:def:98894
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.

oval:org.secpod.oval:def:98895
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client.

oval:org.secpod.oval:def:98888
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.

oval:org.secpod.oval:def:98889
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.

oval:org.secpod.oval:def:98887
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.

oval:org.secpod.oval:def:98891
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.

oval:org.secpod.oval:def:98890
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.

oval:org.secpod.oval:def:98882
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.

oval:org.secpod.oval:def:98883
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.

oval:org.secpod.oval:def:98884
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.

oval:org.secpod.oval:def:98885
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.

oval:org.secpod.oval:def:98886
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.

oval:org.secpod.oval:def:98880
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client.

oval:org.secpod.oval:def:98881
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client.

oval:org.secpod.oval:def:98877
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit executio ...

oval:org.secpod.oval:def:98878
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit executio ...

oval:org.secpod.oval:def:98879
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit executio ...

oval:org.secpod.oval:def:98876
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit executio ...

oval:org.secpod.oval:def:98872
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.

oval:org.secpod.oval:def:98873
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.

oval:org.secpod.oval:def:98874
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.

oval:org.secpod.oval:def:98875
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client.

oval:org.secpod.oval:def:98871
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit executio ...

CVE    1
CVE-2022-23276
*CPE
cpe:/a:microsoft:sql_server:2019

© SecPod Technologies