Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Low
CVE-2018-14581
Disclosure Date: July 31, 2018 (last updated November 27, 2024)
Redgate .NET Reflector before 10.0.7.774 and SmartAssembly before 6.12.5 allow attackers to execute code by decompiling a compiled .NET object (such as a DLL or EXE file) with a specific embedded resource file.
0
Attacker Value
Unknown
CVE-2022-47870
Disclosure Date: April 04, 2023 (last updated October 08, 2023)
A Cross Site Scripting (XSS) vulnerability in the web SQL monitor login page in Redgate SQL Monitor 12.1.31.893 allows remote attackers to inject arbitrary web Script or HTML via the returnUrl parameter.
0
Attacker Value
Unknown
CVE-2022-47542
Disclosure Date: March 30, 2023 (last updated October 08, 2023)
Red Gate SQL Monitor 11.0.14 through 12.1.46 has Incorrect Access Control, exploitable remotely for Escalation of Privileges.
0
Attacker Value
Unknown
CVE-2020-15526
Disclosure Date: July 09, 2020 (last updated February 21, 2025)
In Redgate SQL Monitor 7.1.4 through 10.1.6 (inclusive), the scope for disabling some TLS security certificate checks can extend beyond that defined by various options on the Configuration > Notifications pages to disable certificate checking for alert notifications. These TLS security checks are also ignored during monitoring of VMware machines. This would make SQL Monitor vulnerable to potential man-in-the-middle attacks when sending alert notification emails, posting to Slack or posting to webhooks. The vulnerability is fixed in version 10.1.7.
0
Attacker Value
Unknown
CVE-2020-9318
Disclosure Date: February 20, 2020 (last updated February 21, 2025)
Red Gate SQL Monitor 9.0.13 through 9.2.14 allows an administrative user to perform a SQL injection attack by configuring the SNMP alert settings in the UI. This is fixed in 9.2.15.
0
Attacker Value
Unknown
CVE-2015-9098
Disclosure Date: June 22, 2017 (last updated November 26, 2024)
In Redgate SQL Monitor before 3.10 and 4.x before 4.2, a remote attacker can gain unauthenticated access to the Base Monitor, resulting in the ability to execute arbitrary SQL commands on any monitored Microsoft SQL Server machines. If the Base Monitor is connecting to these machines using an account with SQL admin privileges, then code execution on the operating system can result in full system compromise (if Microsoft SQL Server is running with local administrator privileges).
0