📦 Sql Server 2022
by Microsoft
🔍 What is Sql Server 2022?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in SQL Server allows attackers with existing network access to bypass authentication checks and execute privileged functions. It affects organizations running vulnerable SQL Server ...
This SQL injection vulnerability in Microsoft SQL Server allows authenticated attackers to execute arbitrary SQL commands, potentially leading to privilege escalation. It affects SQL Server instances ...
This command injection vulnerability in SQL Server allows authenticated attackers to execute arbitrary commands on the database server, potentially gaining full system control. It affects SQL Server i...
This SQL injection vulnerability in Microsoft SQL Server allows authenticated attackers to execute arbitrary SQL commands, potentially leading to privilege escalation. It affects SQL Server instances ...
This vulnerability allows an authenticated attacker with existing SQL Server access to elevate privileges over the network, potentially gaining administrative control. It affects Microsoft SQL Server ...
This vulnerability in SQL Server involves improper initialization of resources, allowing unauthorized attackers to read uninitialized memory contents over the network. This can lead to information dis...
This vulnerability allows remote attackers to execute arbitrary code on Microsoft SQL Server instances by exploiting a use-after-free memory corruption flaw. It affects SQL Server installations with n...
This CVE describes an elevation of privilege vulnerability in Microsoft SQL Server where an authenticated attacker could execute arbitrary code with elevated privileges. It affects SQL Server instance...
This vulnerability in Microsoft SQL Server allows authenticated attackers to elevate their privileges within the database system. Attackers could gain administrative control over SQL Server instances,...
This vulnerability in Microsoft SQL Server's Native Scoring component allows authenticated attackers to execute arbitrary code remotely. It affects SQL Server instances with the Native Scoring feature...
This vulnerability in Microsoft SQL Server allows authenticated attackers to execute arbitrary code with elevated privileges, potentially gaining full control of the database server. It affects SQL Se...
This vulnerability in Microsoft SQL Server Native Scoring allows an authenticated attacker to read sensitive information from memory. It affects SQL Server instances where the Native Scoring feature i...
This vulnerability in Microsoft SQL Server Native Scoring allows remote attackers to execute arbitrary code on affected systems. Attackers can exploit this use-after-free vulnerability to gain SYSTEM ...
This vulnerability in SQL Server Native Client OLE DB Provider allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects systems using thi...
This vulnerability in SQL Server Native Client OLE DB Provider allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects applications usin...
This vulnerability in Microsoft OLE DB Driver for SQL Server allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects applications using ...
This vulnerability in SQL Server Native Client OLE DB Provider allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects applications usin...
This vulnerability in SQL Server Native Client OLE DB Provider allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects applications usin...
This vulnerability in SQL Server Native Client OLE DB Provider allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects systems using the...
This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of SQL Server Native Client OLE DB Provider. Attackers can exploit this integer overflow vul...
This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of SQL Server Native Client OLE DB Provider. Attackers can exploit this heap-based buffer ov...
This vulnerability in SQL Server Native Client OLE DB Provider allows remote attackers to execute arbitrary code by sending specially crafted requests to an affected system. It affects applications us...
This vulnerability in SQL Server Native Client OLE DB Provider allows remote attackers to execute arbitrary code by sending specially crafted requests to an affected system. It affects systems running...
This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of SQL Server Native Client OLE DB Provider. Attackers can exploit this heap-based buffer ov...
This vulnerability in SQL Server Native Client OLE DB Provider allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects systems using thi...
This vulnerability in SQL Server Native Client OLE DB Provider allows remote attackers to execute arbitrary code on affected systems by sending specially crafted queries. It affects systems running vu...
This vulnerability in SQL Server Native Client OLE DB Provider allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects systems using the...
This vulnerability in SQL Server Native Client OLE DB Provider allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects systems using the...
This vulnerability in SQL Server Native Client OLE DB Provider allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects systems using thi...
This vulnerability in SQL Server Native Client OLE DB Provider allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects systems running v...
This vulnerability in SQL Server Native Client OLE DB Provider allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects applications usin...
This vulnerability in Microsoft OLE DB Driver for SQL Server allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects applications using ...
This vulnerability in Microsoft OLE DB Driver for SQL Server allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects applications using ...
This vulnerability in Microsoft OLE DB Driver for SQL Server allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects applications using ...
This vulnerability in Microsoft ODBC Driver for SQL Server allows an attacker to execute arbitrary code on affected systems by sending specially crafted queries. It affects applications using vulnerab...
This vulnerability in Microsoft OLE DB Driver for SQL Server allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects applications using ...
This vulnerability in Microsoft OLE DB Driver for SQL Server allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects applications using ...
This vulnerability in Microsoft OLE DB Driver for SQL Server allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects applications using ...
This vulnerability in Microsoft OLE DB Driver for SQL Server allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects applications using ...
This vulnerability in Microsoft OLE DB Driver for SQL Server allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects applications using ...