Download
| Alert*
oval:org.secpod.oval:def:70412
SQL Server 2019 is installed oval:org.secpod.oval:def:93694 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via a connection driver. oval:org.secpod.oval:def:93693 Microsoft SQL ODBC Driver Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via a connection driver. oval:org.secpod.oval:def:93695 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could ... oval:org.secpod.oval:def:93696 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability. An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could ... oval:org.secpod.oval:def:87528 The host is installed with SQL Server and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact. oval:org.secpod.oval:def:87650 The host is missing an critical security update for KB5021124 oval:org.secpod.oval:def:87529 The host is installed with SQL Server and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact. oval:org.secpod.oval:def:87653 The host is missing an critical security update for KB5021125 oval:org.secpod.oval:def:87530 The host is installed with SQL Server and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact. oval:org.secpod.oval:def:87531 The host is installed with SQL Server and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact. oval:org.secpod.oval:def:87532 The host is installed with SQL Server and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact. oval:org.secpod.oval:def:87533 The host is installed with SQL Server and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact. oval:org.secpod.oval:def:81547 The host is installed with SQL Server and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted query. Successful exploitation could allow an authenticated attacker could execute a specially crafted query using $ partition ... oval:org.secpod.oval:def:81555 The host is missing an important security update for KB5014356 oval:org.secpod.oval:def:81552 The host is missing an important security update for KB5014353 oval:org.secpod.oval:def:93697 Microsoft SQL Server Denial of Service Vulnerability. An attacker could impact availability of the service resulting in Denial of Service (DoS). oval:org.secpod.oval:def:93703 The host is missing an important security update for KB5029378 oval:org.secpod.oval:def:93704 The host is missing an important security update for KB5029377 oval:org.secpod.oval:def:98908 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client. oval:org.secpod.oval:def:98911 The host is missing an important security update for KB5035434 oval:org.secpod.oval:def:98912 The host is missing an important security update for KB5036335 oval:org.secpod.oval:def:98907 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client. oval:org.secpod.oval:def:98905 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client. oval:org.secpod.oval:def:98906 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client. oval:org.secpod.oval:def:98903 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client. oval:org.secpod.oval:def:98904 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client. oval:org.secpod.oval:def:98901 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client. oval:org.secpod.oval:def:98902 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client. oval:org.secpod.oval:def:98900 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client. oval:org.secpod.oval:def:98899 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. oval:org.secpod.oval:def:98896 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. oval:org.secpod.oval:def:98897 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client. oval:org.secpod.oval:def:98898 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client. oval:org.secpod.oval:def:98892 An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit executio ... oval:org.secpod.oval:def:98893 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client. oval:org.secpod.oval:def:98894 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. oval:org.secpod.oval:def:98895 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client. oval:org.secpod.oval:def:98888 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. oval:org.secpod.oval:def:98889 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. oval:org.secpod.oval:def:98887 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. oval:org.secpod.oval:def:98891 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. oval:org.secpod.oval:def:98890 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. oval:org.secpod.oval:def:98882 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. oval:org.secpod.oval:def:98883 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. oval:org.secpod.oval:def:98884 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. oval:org.secpod.oval:def:98885 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. oval:org.secpod.oval:def:98886 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. oval:org.secpod.oval:def:98880 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client. oval:org.secpod.oval:def:98881 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client. oval:org.secpod.oval:def:98877 An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit executio ... oval:org.secpod.oval:def:98878 An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit executio ... oval:org.secpod.oval:def:98879 An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit executio ... oval:org.secpod.oval:def:98876 An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit executio ... oval:org.secpod.oval:def:98872 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. oval:org.secpod.oval:def:98873 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. oval:org.secpod.oval:def:98874 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. oval:org.secpod.oval:def:98875 An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via a connection driver. This could result in the database returning malicious data that could cause arbitrary code execution on the client. oval:org.secpod.oval:def:98871 An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit executio ... |