cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-23384,https://securityvulnerability.io/vulnerability/CVE-2023-23384,Microsoft SQL Server Remote Code Execution Vulnerability,"A significant vulnerability in Microsoft SQL Server could allow an attacker to execute arbitrary code remotely, potentially compromising the integrity and confidentiality of the database environment. This vulnerability poses a threat to user data and overall system security, making it crucial for organizations to apply necessary updates and mitigations promptly. For more details, please refer to the official Microsoft advisory.",Microsoft,"Microsoft Sql Server 2008 Service Pack 4 (qfe),Microsoft Sql Server 2012 Service Pack 4 (qfe),Microsoft Sql Server 2012 For X64-based Systems Service Pack 4 (qfe),Microsoft Sql Server 2017 (gdr),Microsoft Sql Server 2008 R2 Service Pack 3 (qfe),Microsoft Sql Server 2014 Service Pack 3 (gdr),Microsoft Sql Server 2014 Service Pack 3 (cu 4),Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2016 Service Pack 3 (gdr),Microsoft Sql Server 2016 Service Pack 3 Azure Connect Feature Pack,Microsoft Sql Server 2017 (cu 31),Microsoft Sql Server 2019 (cu 18),Microsoft Sql Server 2022 (gdr)",7.3,HIGH,0.003719999920576811,false,false,false,false,,false,false,2023-04-11T21:15:00.000Z,0 CVE-2023-21718,https://securityvulnerability.io/vulnerability/CVE-2023-21718,Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability,"A remote code execution vulnerability exists when the Microsoft ODBC Driver for SQL Server improperly handles objects in memory. An attacker who successfully exploits this vulnerability could run arbitrary code on the affected system. To exploit the vulnerability, an attacker would need to send a specially crafted request to the SQL Server, potentially compromising the confidentiality, integrity, and availability of affected systems. Users are advised to update to the latest version to mitigate risk.",Microsoft,"Microsoft Sql Server 2012 Service Pack 4 (qfe),Microsoft Sql Server 2012 For X64-based Systems Service Pack 4 (qfe),Microsoft Sql Server 2017 (gdr),Microsoft Sql Server 2014 Service Pack 3 (gdr),Microsoft Sql Server 2014 Service Pack 3 (cu 4),Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2016 Service Pack 3 (gdr),Microsoft Sql Server 2016 Service Pack 3 Azure Connect Feature Pack,Microsoft Sql Server 2017 (cu 31),Microsoft Sql Server 2022 (gdr),Microsoft Sql Server 2019 (cu 18),Microsoft Sql Server 2008 R2 Service Pack 3 (qfe),Microsoft Sql Server 2008 Service Pack 4 (qfe)",7.8,HIGH,0.0028699999675154686,false,false,false,false,,false,false,2023-02-14T20:15:00.000Z,0 CVE-2023-21528,https://securityvulnerability.io/vulnerability/CVE-2023-21528,Microsoft SQL Server Remote Code Execution Vulnerability,"This vulnerability in Microsoft SQL Server allows remote attackers to execute arbitrary code on the server by exploiting a flaw in the configuration or operational parameters of the database service. It poses significant risks to data integrity and confidentiality, making it crucial for administrators to apply relevant patches and secure configurations to mitigate potential exploitation.",Microsoft,"Microsoft Sql Server 2016 Service Pack 3 Azure Connect Feature Pack,Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2016 Service Pack 3 (gdr),Microsoft Sql Server 2014 Service Pack 3 (gdr),Microsoft Sql Server 2014 Service Pack 3 (cu 4),Microsoft Sql Server 2012 Service Pack 4 (qfe),Microsoft Sql Server 2017 (gdr),Microsoft Sql Server 2012 For X64-based Systems Service Pack 4 (qfe),Microsoft Sql Server 2017 (cu 31),Microsoft Sql Server 2019 (cu 18),Microsoft Sql Server 2008 Service Pack 4 (qfe),Microsoft Sql Server 2008 R2 Service Pack 3 (qfe),Microsoft Sql Server 2022 (gdr)",7.8,HIGH,0.0028699999675154686,false,false,false,false,,false,false,2023-02-14T20:15:00.000Z,0