Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
sql_server_2022 Vendor: microsoft

About This Product

sql_server_2022 is a software product developed by microsoft, a major technology provider with a global presence in enterprise and consumer markets. This product serves as critical infrastructure in many organizational deployments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 105 known vulnerabilities affecting microsoft sql_server_2022. This includes 104 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2024 to 2026, indicating a recent active security attention. 1 medium-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2024-28906 2024-04-09 2025-01-07 8.8 - -
CVE-2024-28908 2024-04-09 2025-01-07 8.8 - -
CVE-2024-28909 2024-04-09 2025-01-07 8.8 - -
CVE-2024-28910 2024-04-09 2025-01-07 8.8 - -
CVE-2024-28911 2024-04-09 2025-01-07 8.8 - -
CVE-2024-28912 2024-04-09 2025-01-07 8.8 - -
CVE-2024-28913 2024-04-09 2025-01-07 8.8 - -
CVE-2024-28914 2024-04-09 2025-01-07 8.8 - -
CVE-2024-28915 2024-04-09 2025-01-07 8.8 - -
CVE-2024-28926 2024-04-09 2025-01-15 8.8 - -
CVE-2024-28927 2024-04-09 2025-01-15 8.8 - -
CVE-2024-28929 2024-04-09 2025-01-14 8.8 - -
CVE-2024-28930 2024-04-09 2025-01-14 8.8 - -
CVE-2024-28931 2024-04-09 2025-01-14 8.8 - -
CVE-2024-28932 2024-04-09 2025-01-14 8.8 - -
CVE-2024-28933 2024-04-09 2025-01-14 8.8 - -
CVE-2024-28934 2024-04-09 2025-01-14 8.8 - -
CVE-2024-28935 2024-04-09 2025-01-14 8.8 - -
CVE-2024-28936 2024-04-09 2025-01-14 8.8 - -
CVE-2024-28937 2024-04-09 2025-01-14 8.8 - -
CVE-2024-28938 2024-04-09 2025-01-14 8.8 - -
CVE-2024-28939 2024-04-09 2025-01-15 8.8 - -
CVE-2024-28940 2024-04-09 2025-01-15 8.8 - -
CVE-2024-28941 2024-04-09 2025-01-14 8.8 - -
CVE-2024-28942 2024-04-09 2025-01-15 8.8 - -
CVE-2024-28943 2024-04-09 2025-01-16 8.8 - -
CVE-2024-28944 2024-04-09 2025-01-15 8.8 - -
CVE-2024-28945 2024-04-09 2025-01-15 8.8 - -
CVE-2024-29043 2024-04-09 2025-01-16 8.8 - -
CVE-2024-29044 2024-04-09 2025-01-15 8.8 - -
CVE-2024-29045 2024-04-09 2025-01-15 7.5 - -
CVE-2024-29046 2024-04-09 2025-01-15 8.8 - -
CVE-2024-29047 2024-04-09 2025-01-15 8.8 - -
CVE-2024-29048 2024-04-09 2025-01-15 8.8 - -
CVE-2024-29982 2024-04-09 2025-01-15 8.8 - -
CVE-2024-29983 2024-04-09 2025-01-15 8.8 - -
CVE-2024-29984 2024-04-09 2025-01-15 8.8 - -
CVE-2024-29985 2024-04-09 2025-01-15 8.8 - -
CVE-2024-20701 2024-07-09 2024-11-21 8.8 - -
CVE-2024-21303 2024-07-09 2024-11-21 8.8 - -
CVE-2024-21308 2024-07-09 2025-01-15 8.8 - -
CVE-2024-21317 2024-07-09 2025-01-15 8.8 - -
CVE-2024-21331 2024-07-09 2025-01-15 8.8 - -
CVE-2024-21332 2024-07-09 2025-01-15 8.8 - -
CVE-2024-21333 2024-07-09 2025-01-15 8.8 - -
CVE-2024-21335 2024-07-09 2025-01-15 8.8 - -
CVE-2024-21373 2024-07-09 2025-01-15 8.8 - -
CVE-2024-21398 2024-07-09 2025-01-15 8.8 - -
CVE-2024-21414 2024-07-09 2025-01-15 8.8 - -
CVE-2024-21415 2024-07-09 2025-01-15 8.8 - -
CVE-2024-21425 2024-07-09 2025-01-15 8.8 - -
CVE-2024-21428 2024-07-09 2025-01-15 8.8 - -
CVE-2024-21449 2024-07-09 2024-11-21 8.8 - -
CVE-2024-28928 2024-07-09 2025-01-15 8.8 - -
CVE-2024-35256 2024-07-09 2024-11-21 8.8 - -
CVE-2024-35271 2024-07-09 2024-11-21 8.8 - -
CVE-2024-35272 2024-07-09 2024-11-21 8.8 - -
CVE-2024-37318 2024-07-09 2024-11-21 8.8 - -
CVE-2024-37319 2024-07-09 2024-11-21 8.8 - -
CVE-2024-37320 2024-07-09 2024-11-21 8.8 - -
CVE-2024-37321 2024-07-09 2024-11-21 8.8 - -
CVE-2024-37322 2024-07-09 2024-11-21 8.8 - -
CVE-2024-37323 2024-07-09 2024-11-21 8.8 - -
CVE-2024-37324 2024-07-09 2024-11-21 8.8 - -
CVE-2024-37326 2024-07-09 2024-11-21 8.8 - -
CVE-2024-37327 2024-07-09 2024-11-21 8.8 - -
CVE-2024-37328 2024-07-09 2024-11-21 8.8 - -
CVE-2024-37329 2024-07-09 2024-11-21 8.8 - -
CVE-2024-37330 2024-07-09 2024-11-21 8.8 - -
CVE-2024-37331 2024-07-09 2024-11-21 8.8 - -
CVE-2024-37332 2024-07-09 2024-11-21 8.8 - -
CVE-2024-37333 2024-07-09 2024-11-21 8.8 - -
CVE-2024-37334 2024-07-09 2024-11-21 8.8 - -
CVE-2024-37336 2024-07-09 2024-11-21 8.8 - -
CVE-2024-38087 2024-07-09 2024-11-21 8.8 - -
CVE-2024-38088 2024-07-09 2024-11-21 8.8 - -
CVE-2024-26186 2024-09-10 2024-09-23 8.8 - -
CVE-2024-26191 2024-09-10 2024-09-23 8.8 - -
CVE-2024-37335 2024-09-10 2024-09-23 8.8 - -
CVE-2024-37337 2024-09-10 2024-09-23 7.1 - -
CVE-2024-37338 2024-09-10 2024-09-23 8.8 - -
CVE-2024-37339 2024-09-10 2024-09-23 8.8 - -
CVE-2024-37340 2024-09-10 2024-09-23 8.8 - -
CVE-2024-37341 2024-09-10 2024-09-23 8.8 - -
CVE-2024-37342 2024-09-10 2024-09-23 7.1 - -
CVE-2024-37965 2024-09-10 2025-01-29 8.8 - -
CVE-2024-37966 2024-09-10 2025-01-15 7.1 - -
CVE-2024-37980 2024-09-10 2025-01-07 8.8 - -
CVE-2024-49021 2024-11-12 2024-11-15 7.8 - -
CVE-2024-49043 2024-11-12 2024-11-15 7.8 - -
CVE-2025-49717 2025-07-08 2025-07-17 8.5 - -
CVE-2025-49718 2025-07-08 2025-07-17 7.5 - -
CVE-2025-49719 2025-07-08 2025-07-17 7.5 - -
CVE-2025-24999 2025-08-12 2025-08-14 8.8 - -
CVE-2025-47954 2025-08-12 2025-08-14 8.8 - -
CVE-2025-49758 2025-08-12 2025-08-14 8.8 - -
CVE-2025-49759 2025-08-12 2025-08-14 8.8 - -
CVE-2025-53727 2025-08-12 2025-08-14 8.8 - -
CVE-2025-47997 2025-09-09 2025-09-12 6.5 - -
CVE-2025-55227 2025-09-09 2025-09-12 8.8 - -
CVE-2025-59499 2025-11-11 2025-11-17 8.8 - -
CVE-2026-20803 2026-01-13 2026-01-16 7.2 - -
CVE-2026-21262 2026-03-10 2026-03-13 8.8 - -
CVE-2026-26115 2026-03-10 2026-03-13 8.8 - -
CVE-2026-26116 2026-03-10 2026-03-13 8.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for microsoft sql_server_2022 by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.