{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T02:37:02.108","vulnerabilities":[{"cve":{"id":"CVE-2019-1068","sourceIdentifier":"secure@microsoft.com","published":"2019-07-15T19:15:16.983","lastModified":"2024-11-21T04:35:57.057","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A remote code execution vulnerability exists in Microsoft SQL Server when it incorrectly handles processing of internal functions, aka 'Microsoft SQL Server Remote Code Execution Vulnerability'."},{"lang":"es","value":"Se presenta una vulnerabilidad de ejecución de código remota en Microsoft SQL Server cuando se maneja incorrectamente el procesamiento de funciones internas, también se conoce como 'Microsoft SQL Server Remote Code Execution Vulnerability'."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:sql_server:2014:sp2:*:*:*:*:*:*","matchCriteriaId":"58837806-386A-40AC-B8D3-35765113D75C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:sql_server:2014:sp3:*:*:*:*:*:*","matchCriteriaId":"03C65D96-44D0-4411-8B84-961973F1E4D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:sql_server:2016:sp1:*:*:*:*:x64:*","matchCriteriaId":"A917F2BE-D5AA-47F4-866F-0264FA7CA255"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:sql_server:2016:sp2:*:*:*:*:x64:*","matchCriteriaId":"CDCE78A8-26F9-4F9E-BDDD-E59DEA4A3791"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:sql_server:2017:*:*:*:*:*:x64:*","matchCriteriaId":"2FF9FC32-3E6E-4256-B6BD-C4EF1932CA18"}]}]}],"references":[{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1068","source":"secure@microsoft.com","tags":["Patch","Vendor Advisory"]},{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1068","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}