Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sql server 2016 vulnerabilities and exploits
(subscribe to this query)
578
VMScore
CVE-2016-7250
Microsoft SQL Server 2014 SP1, 2014 SP2, and 2016 does not properly perform a cast of an unspecified pointer, which allows remote authenticated users to gain privileges via unknown vectors, aka "SQL RDBMS Engine Elevation of Privilege Vulnerability."
Microsoft Sql Server 2014
Microsoft Sql Server 2016
578
VMScore
CVE-2016-7253
The agent in Microsoft SQL Server 2012 SP2, 2012 SP3, 2014 SP1, 2014 SP2, and 2016 does not properly check the atxcore.dll ACL, which allows remote authenticated users to gain privileges via unspecified vectors, aka "SQL Server Agent Elevation of Privilege Vulnerability.&quo...
Microsoft Sql Server 2012
Microsoft Sql Server 2014
578
VMScore
CVE-2016-7254
Microsoft SQL Server 2012 SP2 and 2012 SP3 does not properly perform a cast of an unspecified pointer, which allows remote authenticated users to gain privileges via unknown vectors, aka "SQL RDBMS Engine Elevation of Privilege Vulnerability."
Microsoft Sql Server 2012
578
VMScore
CVE-2016-1446
SQL injection vulnerability in Cisco WebEx Meetings Server 2.6 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCuy83200.
Cisco Webex Meetings Server 2.6.1.39
Cisco Webex Meetings Server 2.6.0
534
VMScore
CVE-2022-29143
Microsoft SQL Server Remote Code Execution Vulnerability
Microsoft Sql Server 2014
Microsoft Sql Server 2016
Microsoft Sql Server 2017
Microsoft Sql Server 2019
534
VMScore
CVE-2016-8998
IBM Tivoli Storage Manager Server 7.1 could allow an authenticated user with TSM administrator privileges to cause a buffer overflow using a specially crafted SQL query and execute arbitrary code on the server. IBM Reference #: 1998747.
Ibm Tivoli Storage Manager 7.1.3
Ibm Tivoli Storage Manager 7.1.3.000
Ibm Tivoli Storage Manager 7.1.5
Ibm Tivoli Storage Manager 7.1.5.200
Ibm Tivoli Storage Manager 7.1.1.100
Ibm Tivoli Storage Manager 7.1.1.300
Ibm Tivoli Storage Manager 7.1.4.1
Ibm Tivoli Storage Manager 7.1.4.2
Ibm Tivoli Storage Manager 7.1.1.2
Ibm Tivoli Storage Manager 7.1.1.200
Ibm Tivoli Storage Manager 7.1.3.2
Ibm Tivoli Storage Manager 7.1.4
Ibm Tivoli Storage Manager 7.1.1
Ibm Tivoli Storage Manager 7.1.1.1
Ibm Tivoli Storage Manager 7.1.3.1
Ibm Tivoli Storage Manager 7.1.3.100
Ibm Tivoli Storage Manager 7.1.7
515
VMScore
CVE-2016-8022
Authentication bypass by spoofing vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and previous versions) allows remote unauthenticated malicious user to execute arbitrary code or cause a denial of service via a crafted authentication cookie.
Mcafee Virusscan Enterprise
1 EDB exploit
1 Article
510
VMScore
CVE-2016-2388
The Universal Worklist Configuration in SAP NetWeaver AS JAVA 7.4 allows remote malicious users to obtain sensitive user information via a crafted HTTP request, aka SAP Security Note 2256846.
Sap Netweaver Application Server Java
2 EDB exploits
1 Github repository
1 Article
445
VMScore
CVE-2016-10556
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS In Postgres, SQLite, and Microsoft SQL Server there is an issue where arrays are treated as strings and improperl...
Sequelizejs Sequelize
1 Github repository
445
VMScore
CVE-2017-8516
Microsoft SQL Server Analysis Services in Microsoft SQL Server 2012, Microsoft SQL Server 2014, and Microsoft SQL Server 2016 allows an information disclosure vulnerability when it improperly enforces permissions, aka "Microsoft SQL Server Analysis Services Information Discl...
Microsoft Sql Server 2016
Microsoft Sql Server 2012
Microsoft Sql Server 2014
1 Article
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »