Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Microsoft SQL Server 2012 Service Pack 4 (QFE) | 11.0.0 ~ 11.0.7512.11 | - | |
| Microsoft | Microsoft SQL Server 2012 for x64-based Systems Service Pack 4 (QFE) | 11.0.0 ~ 11.0.7512.11 | - | |
| Microsoft | Microsoft SQL Server 2017 (GDR) | 14.0.0 ~ 14.0.2047.8 | - | |
| Microsoft | Microsoft SQL Server 2014 Service Pack 3 (GDR) | 12.0.0 ~ 12.0.6444.4 | - | |
| Microsoft | Microsoft SQL Server 2014 Service Pack 3 (CU 4) | 12.0.0 ~ 12.0.6174.8 | - | |
| Microsoft | Microsoft SQL Server 2019 (GDR) | 15.0.0 ~ 15.0.2101.7 | - | |
| Microsoft | Microsoft SQL Server 2016 Service Pack 3 (GDR) | 13.0.0 ~ 13.0.6430.49 | - | |
| Microsoft | Microsoft SQL Server 2016 Service Pack 3 Azure Connect Feature Pack | 13.0.0 ~ 13.0.7024.30 | - | |
| Microsoft | Microsoft SQL Server 2017 (CU 31) | 14.0.0 ~ 14.0.3460.9 | - | |
| Microsoft | Microsoft SQL Server 2022 (GDR) | 16.0.0 ~ 16.0.1050.5 | - | |
| Microsoft | Microsoft SQL Server 2019 (CU 18) | 15.0.0 ~ 15.0.4280.7 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-21689 | 9.8 CRITICAL | Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulner |
| CVE-2023-21690 | 9.8 CRITICAL | Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulner |
| CVE-2023-21692 | 9.8 CRITICAL | Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulner |
| CVE-2023-21803 | 9.8 CRITICAL | Windows iSCSI Discovery Service Remote Code Execution Vulnerability |
| CVE-2023-21716 | 9.8 CRITICAL | Microsoft Word Remote Code Execution Vulnerability |
| CVE-2023-21686 | 8.8 HIGH | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
| CVE-2023-21684 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-21707 | 8.8 HIGH | Microsoft Exchange Server Remote Code Execution Vulnerability |
| CVE-2023-21706 | 8.8 HIGH | Microsoft Exchange Server Remote Code Execution Vulnerability |
| CVE-2023-21717 | 8.8 HIGH | Microsoft SharePoint Server Elevation of Privilege Vulnerability |
| CVE-2023-21529 | 8.8 HIGH | Microsoft Exchange Server Remote Code Execution Vulnerability |
| CVE-2023-21797 | 8.8 HIGH | Microsoft ODBC Driver Remote Code Execution Vulnerability |
| CVE-2023-21798 | 8.8 HIGH | Microsoft ODBC Driver Remote Code Execution Vulnerability |
| CVE-2023-21799 | 8.8 HIGH | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
| CVE-2023-21685 | 8.8 HIGH | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
| CVE-2023-21713 | 8.8 HIGH | Microsoft SQL Server Remote Code Execution Vulnerability |
| CVE-2023-21777 | 8.7 HIGH | Azure App Service on Azure Stack Hub Elevation of Privilege Vulnerability |
| CVE-2023-23374 | 8.3 HIGH | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability |
| CVE-2023-21806 | 8.2 HIGH | Power BI Report Server Spoofing Vulnerability |
| CVE-2023-21778 | 8.0 HIGH | Microsoft Dynamics Unified Service Desk Remote Code Execution Vulnerability |
Showing top 20 of 78 CVEs. View all on vendor page → →
No comments yet