Kaspersky ID:
KLA77105
Detekováno:
11/12/2024
Aktualizováno:
07/15/2025

Popis

Multiple vulnerabilities were found in Microsoft SQL Server. Malicious users can exploit these vulnerabilities to execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in SQL Server Native Client can be exploited remotely to execute arbitrary code.
  2. A remote code execution vulnerability in Microsoft SQL Server can be exploited remotely to execute arbitrary code.
  3. A remote code execution vulnerability in Microsoft.SqlServer.XEvent.Configuration.dll can be exploited remotely to execute arbitrary code.

Oficiální doporučení

Související produkty

seznam CVE

  • CVE-2024-49009
    critical
  • CVE-2024-49018
    critical
  • CVE-2024-48997
    critical
  • CVE-2024-49017
    critical
  • CVE-2024-49012
    critical
  • CVE-2024-49013
    critical
  • CVE-2024-49006
    critical
  • CVE-2024-49000
    critical
  • CVE-2024-49021
    critical
  • CVE-2024-49008
    critical
  • CVE-2024-49015
    critical
  • CVE-2024-48995
    critical
  • CVE-2024-48998
    critical
  • CVE-2024-49004
    critical
  • CVE-2024-49001
    critical
  • CVE-2024-49011
    critical
  • CVE-2024-43462
    critical
  • CVE-2024-49002
    critical
  • CVE-2024-48999
    critical
  • CVE-2024-49003
    critical
  • CVE-2024-48996
    critical
  • CVE-2024-49005
    critical
  • CVE-2024-49007
    critical
  • CVE-2024-43459
    critical
  • CVE-2024-49043
    critical
  • CVE-2024-49016
    critical
  • CVE-2024-49010
    critical
  • CVE-2024-38255
    critical
  • CVE-2024-49014
    critical
  • CVE-2024-48993
    critical
  • CVE-2024-48994
    critical

seznam KB

Zobrazit více

Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com

Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Zjistěte více
Kaspersky Premium
Zjistěte více
Do you want to save your changes?
Your message has been sent successfully.