Update

SQL Server 2019Microsoft Corporation

SQL Server 2019

to version 15.0.4003.23

View all applications
Patching for Windows Mac Linux

CVE Vulnerabilities for SQL Server 2019

CVEPublishedSeverityDetailsExploitabilityImpact Vector
CVE‑2024‑00562024‑01‑09 18:15:47HIGH (9)Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability26NETWORK
CVE‑2023‑381692023‑08‑08 18:15:22HIGH (9)Microsoft SQL OLE DB Remote Code Execution Vulnerability36NETWORK
CVE‑2023‑367852023‑10‑10 18:15:18HIGH (8)Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability26LOCAL
CVE‑2023‑367302023‑10‑10 18:15:17HIGH (8)Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability26LOCAL
CVE‑2023‑367282023‑10‑10 18:15:17MEDIUM (6)Microsoft SQL Server Denial of Service Vulnerability24LOCAL
CVE‑2023‑364202023‑10‑10 18:15:12HIGH (8)Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability26LOCAL
CVE‑2023‑364172023‑10‑10 18:15:12HIGH (8)Microsoft SQL OLE DB Remote Code Execution Vulnerability26LOCAL
CVE‑2023‑320282023‑06‑16 01:15:28HIGH (8)Microsoft SQL OLE DB Remote Code Execution Vulnerability26LOCAL
CVE‑2023‑320272023‑06‑16 01:15:28HIGH (8)Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability26LOCAL
CVE‑2023‑320262023‑06‑16 01:15:28HIGH (8)Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability26LOCAL
CVE‑2023‑320252023‑06‑16 01:15:28HIGH (8)Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability26LOCAL
CVE‑2023‑293562023‑06‑16 01:15:28HIGH (8)Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability26LOCAL
CVE‑2023‑293492023‑06‑16 01:15:28HIGH (8)Microsoft ODBC and OLE DB Remote Code Execution Vulnerability26LOCAL
CVE‑2023‑233842023‑04‑11 21:15:18HIGH (7)Microsoft SQL Server Remote Code Execution Vulnerability43NETWORK
CVE‑2023‑217182023‑02‑14 20:15:15HIGH (8)Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability26LOCAL
CVE‑2023‑217132023‑02‑14 20:15:14HIGH (9)Microsoft SQL Server Remote Code Execution Vulnerability36NETWORK
CVE‑2023‑217052023‑02‑14 20:15:14HIGH (9)Microsoft SQL Server Remote Code Execution Vulnerability36NETWORK
CVE‑2023‑217042023‑02‑14 20:15:14HIGH (8)Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability26LOCAL
CVE‑2023‑215282023‑02‑14 20:15:12HIGH (8)Microsoft SQL Server Remote Code Execution Vulnerability26LOCAL
CVE‑2022‑291432022‑06‑15 22:15:13HIGH (8)Microsoft SQL Server Remote Code Execution Vulnerability26NETWORK
CVE‑2021‑16362021‑01‑12 20:15:30HIGH (9)Microsoft SQL Elevation of Privilege Vulnerability36NETWORK
CVE‑2020‑06182020‑02‑11 22:15:13HIGH (9)A remote code execution vulnerability exists in Microsoft SQL Server Reporting Services when it incorrectly handles page requests, aka 'Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability'.36NETWORK
CVE‑2019‑10682019‑07‑15 19:15:17MEDIUM (7)A remote code execution vulnerability exists in Microsoft SQL Server when it incorrectly handles processing of internal functions, aka 'Microsoft SQL Server Remote Code Execution Vulnerability'.00NETWORK
CVE‑2019‑08192019‑05‑16 19:29:01MEDIUM (4)An information disclosure vulnerability exists in Microsoft SQL Server Analysis Services when it improperly enforces metadata permissions, aka 'Microsoft SQL Server Analysis Services Information Disclosure Vulnerability'.00NETWORK
CVE‑2018‑82732018‑08‑15 17:29:03CRITICAL (10)A buffer overflow vulnerability exists in the Microsoft SQL Server that could allow remote code execution on an affected system, aka "Microsoft SQL Server Remote Code Execution Vulnerability." This affects Microsoft SQL Server.46NETWORK
CVE‑2017‑85162017‑08‑08 21:29:01HIGH (8)Microsoft SQL Server Analysis Services in Microsoft SQL Server 2012, Microsoft SQL Server 2014, and Microsoft SQL Server 2016 allows an information disclosure vulnerability when it improperly enforces permissions, aka "Microsoft SQL Server Analysis Services Information Disclosure Vulnerability".44NETWORK
CVE‑2016‑72542016‑11‑10 07:00:08MEDIUM (7)Microsoft SQL Server 2012 SP2 and 2012 SP3 does not properly perform a cast of an unspecified pointer, which allows remote authenticated users to gain privileges via unknown vectors, aka "SQL RDBMS Engine Elevation of Privilege Vulnerability."00NETWORK
CVE‑2016‑72532016‑11‑10 07:00:07MEDIUM (7)The agent in Microsoft SQL Server 2012 SP2, 2012 SP3, 2014 SP1, 2014 SP2, and 2016 does not properly check the atxcore.dll ACL, which allows remote authenticated users to gain privileges via unspecified vectors, aka "SQL Server Agent Elevation of Privilege Vulnerability."00NETWORK
CVE‑2016‑72522016‑11‑10 07:00:06MEDIUM (4)Microsoft SQL Server 2016 mishandles the FILESTREAM path, which allows remote authenticated users to gain privileges via unspecified vectors, aka "SQL Analysis Services Information Disclosure Vulnerability."00NETWORK
CVE‑2016‑72512016‑11‑10 07:00:05MEDIUM (4)Cross-site scripting (XSS) vulnerability in the MDS API in Microsoft SQL Server 2016 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka "MDS API XSS Vulnerability."00NETWORK
CVE‑2016‑72502016‑11‑10 07:00:04MEDIUM (7)Microsoft SQL Server 2014 SP1, 2014 SP2, and 2016 does not properly perform a cast of an unspecified pointer, which allows remote authenticated users to gain privileges via unknown vectors, aka "SQL RDBMS Engine Elevation of Privilege Vulnerability."00NETWORK
CVE‑2016‑72492016‑11‑10 07:00:03MEDIUM (7)Microsoft SQL Server 2016 does not properly perform a cast of an unspecified pointer, which allows remote authenticated users to gain privileges via unknown vectors, aka "SQL RDBMS Engine Elevation of Privilege Vulnerability."00NETWORK
CVE‑2015‑17632015‑07‑14 23:59:02HIGH (9)Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 does not prevent use of uninitialized memory in certain attempts to execute virtual functions, which allows remote authenticated users to execute arbitrary code via a crafted query, aka "SQL Server Remote Code Execution Vulnerability."00NETWORK
CVE‑2015‑17622015‑07‑14 23:59:01HIGH (7)Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014, when transactional replication is configured, does not prevent use of uninitialized memory in unspecified function calls, which allows remote authenticated users to execute arbitrary code by leveraging certain permissions and making a crafted query, as demonstrated by the VIEW SERVER STATE permission, aka "SQL Server Remote Code Execution Vulnerability."00NETWORK
CVE‑2015‑17612015‑07‑14 23:59:00MEDIUM (7)Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 uses an incorrect class during casts of unspecified pointers, which allows remote authenticated users to gain privileges by leveraging certain write access, aka "SQL Server Elevation of Privilege Vulnerability."00NETWORK
CVE‑2014‑40612014‑08‑12 21:55:08MEDIUM (7)Microsoft SQL Server 2008 SP3, 2008 R2 SP2, and 2012 SP1 does not properly control use of stack memory for processing of T-SQL batch commands, which allows remote authenticated users to cause a denial of service (daemon hang) via a crafted T-SQL statement, aka "Microsoft SQL Server Stack Overrun Vulnerability."00NETWORK
CVE‑2014‑18202014‑08‑12 21:55:07MEDIUM (4)Cross-site scripting (XSS) vulnerability in Master Data Services (MDS) in Microsoft SQL Server 2012 SP1 and 2014 on 64-bit platforms allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "SQL Master Data Services XSS Vulnerability."00NETWORK
CVE‑2012‑25522012‑10‑09 21:55:03MEDIUM (4)Cross-site scripting (XSS) vulnerability in the SQL Server Report Manager in Microsoft SQL Server 2000 Reporting Services SP2 and SQL Server 2005 SP4, 2008 SP2 and SP3, 2008 R2 SP1, and 2012 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka "Reflected XSS Vulnerability."00NETWORK
CVE‑2012‑18562012‑08‑15 01:55:01HIGH (9)The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL Server 2008 SP2, SP3, R2, R2 SP1, and R2 SP2, Commerce Server 2002 SP4, Commerce Server 2007 SP2, Commerce Server 2009 Gold and R2, Host Integration Server 2004 SP1, Visual FoxPro 8.0 SP1, Visual FoxPro 9.0 SP2, and Visual Basic 6.0 Runtime allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption, aka "MSCOMCTL.OCX RCE Vulnerability."36NETWORK
CVE‑2012‑01582012‑04‑10 21:55:02HIGH (9)The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0 Runtime allow remote attackers to execute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers "system state" corruption, as exploited in the wild in April 2012, aka "MSCOMCTL.OCX RCE Vulnerability."00NETWORK
CVE‑2011‑12802011‑06‑16 20:55:02MEDIUM (4)The XML Editor in Microsoft InfoPath 2007 SP2 and 2010; SQL Server 2005 SP3 and SP4 and 2008 SP1, SP2, and R2; SQL Server Management Studio Express (SSMSE) 2005; and Visual Studio 2005 SP1, 2008 SP1, and 2010 does not properly handle external entities, which allows remote attackers to read arbitrary files via a crafted .disco (Web Service Discovery) file, aka "XML External Entities Resolution Vulnerability."00NETWORK
Windows Mac Linux

What applications does Lavawall® monitor?

Lavawall monitors patches for over 7,500 applications. This is a summary of the most popular applications.
Click here for the full list.
Click the applications below for the current version and known vulnerabilities.
Logos are property of their respective trademark holders and are not affiliated with ThreeShield or Lavawall. We have not audited the security of most of the listed tools.
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.