Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft jet 4.0 vulnerabilities and exploits
(subscribe to this query)
7.6
CVSSv2
CVE-2000-0323
The Microsoft Jet database engine allows an malicious user to modify text files via a database query, aka the "Text I-ISAM" vulnerability.
Microsoft Jet 3.5
Microsoft Jet 3.51
Microsoft Jet 4.0
7.5
CVSSv2
CVE-2004-0197
Buffer overflow in Microsoft Jet Database Engine 4.0 allows remote malicious users to execute arbitrary code via a specially-crafted database query.
Microsoft Jet 4.0
7.2
CVSSv2
CVE-2000-0325
The Microsoft Jet database engine allows an malicious user to execute commands via a database query, aka the "VBA Shell" vulnerability.
Microsoft Jet 3.5
Microsoft Jet 3.5.1
1 EDB exploit
9.3
CVSSv2
CVE-2008-1200
Unspecified vulnerability in Microsoft Access allows remote user-assisted malicious users to execute arbitrary code via a crafted .MDB file, possibly related to Jet Engine (msjet40.dll). NOTE: this is probably a different issue than CVE-2007-6026.
Microsoft Access 2000
Microsoft Jet 4.0
7.5
CVSSv2
CVE-2002-0859
Buffer overflow in the OpenDataSource function of the Jet engine on Microsoft SQL Server 2000 allows remote malicious users to execute arbitrary code.
Microsoft Sql Server 2000
Microsoft Jet 4.0
1 EDB exploit
9.3
CVSSv2
CVE-2007-6026
Stack-based buffer overflow in Microsoft msjet40.dll 4.0.8618.0 (aka Microsoft Jet Engine), as used by Access 2003 in Microsoft Office 2003 SP3, allows user-assisted malicious users to execute arbitrary code via a crafted MDB file database file containing a column structure with ...
Microsoft Jet 4.0.8618.0
Microsoft Office 2003
Microsoft Windows Xp
Microsoft Windows 2003 Server
Microsoft Windows Nt 4.0
Microsoft Windows 2000
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
firewall
CVE-2024-35649
stored XSS
CVE-2022-28654
CVE-2020-35153
CVE-2024-27348
CVE-2022-28652
local users
CVE-2017-3506
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started