cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-49021,https://securityvulnerability.io/vulnerability/CVE-2024-49021,Microsoft SQL Server Remote Code Execution Vulnerability,"Microsoft SQL Server has been identified with a Remote Code Execution vulnerability that poses significant risks by enabling attackers to execute arbitrary code on affected installations. When exploited, this vulnerability can lead to unauthorized access and control over database management systems, potentially compromising sensitive data. The affected versions include SQL Server 2016, 2017, 2019, and 2022, underscoring the need for users to apply necessary security patches to mitigate the risks. For more detailed information, refer to the vendor advisory.",Microsoft,"Microsoft Sql Server 2017 (gdr),Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2016 Service Pack 3 (gdr),Microsoft Sql Server 2016 Service Pack 3 Azure Connect Feature Pack,Microsoft Sql Server 2017 (cu 31),Microsoft Sql Server 2022 (gdr),Microsoft Sql Server 2019 (cu 29),Microsoft Sql Server 2022 For (cu 15)",7.8,HIGH,0.0005000000237487257,false,false,false,false,,false,false,2024-11-12T18:15:00.000Z,0 CVE-2024-49043,https://securityvulnerability.io/vulnerability/CVE-2024-49043,Microsoft.SqlServer.XEvent.Configuration.dll Remote Code Execution Vulnerability,"A vulnerability exists in the Microsoft.SqlServer.XEvent.Configuration.dll component of Microsoft SQL Server, allowing potential attackers to execute remote code on affected systems. This security issue arises when the software fails to properly validate input data within the configuration DLL, leading to an exploitable condition. Successful exploitation can result in unauthorized access, allowing adversaries to perform arbitrary actions on the system, which could compromise the integrity and confidentiality of the server. Organizations utilizing affected versions of Microsoft SQL Server must implement necessary patches and updates to mitigate the risks associated with this vulnerability.",Microsoft,"Microsoft Sql Server 2017 (gdr),Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2016 Service Pack 3 (gdr),Microsoft Sql Server 2016 Service Pack 3 Azure Connect Feature Pack,Microsoft Sql Server 2017 (cu 31),Microsoft Sql Server 2022 (gdr),Microsoft Sql Server 2019 (cu 29),Microsoft Sql Server 2022 For (cu 15)",7.8,HIGH,0.0005000000237487257,false,false,false,false,,false,false,2024-11-12T18:15:00.000Z,0