Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft jet 4.0 vulnerabilities and exploits
(subscribe to this query)
676
VMScore
CVE-2000-0323
The Microsoft Jet database engine allows an malicious user to modify text files via a database query, aka the "Text I-ISAM" vulnerability.
Microsoft Jet 3.5
Microsoft Jet 3.51
Microsoft Jet 4.0
668
VMScore
CVE-2004-0197
Buffer overflow in Microsoft Jet Database Engine 4.0 allows remote malicious users to execute arbitrary code via a specially-crafted database query.
Microsoft Jet 4.0
725
VMScore
CVE-2000-0325
The Microsoft Jet database engine allows an malicious user to execute commands via a database query, aka the "VBA Shell" vulnerability.
Microsoft Jet 3.5
Microsoft Jet 3.5.1
1 EDB exploit
828
VMScore
CVE-2008-1200
Unspecified vulnerability in Microsoft Access allows remote user-assisted malicious users to execute arbitrary code via a crafted .MDB file, possibly related to Jet Engine (msjet40.dll). NOTE: this is probably a different issue than CVE-2007-6026.
Microsoft Access 2000
Microsoft Jet 4.0
755
VMScore
CVE-2002-0859
Buffer overflow in the OpenDataSource function of the Jet engine on Microsoft SQL Server 2000 allows remote malicious users to execute arbitrary code.
Microsoft Sql Server 2000
Microsoft Jet 4.0
1 EDB exploit
935
VMScore
CVE-2007-6026
Stack-based buffer overflow in Microsoft msjet40.dll 4.0.8618.0 (aka Microsoft Jet Engine), as used by Access 2003 in Microsoft Office 2003 SP3, allows user-assisted malicious users to execute arbitrary code via a crafted MDB file database file containing a column structure with ...
Microsoft Jet 4.0.8618.0
Microsoft Office 2003
Microsoft Windows Xp
Microsoft Windows 2003 Server
Microsoft Windows Nt 4.0
Microsoft Windows 2000
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21991
CVE-2024-32674
path traversal
CVE-2023-21987
denial of service
dos
CVE-2024-4647
CVE-2024-25519
CVE-2024-33612
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started