Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft jet 4.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0323
The Microsoft Jet database engine allows an malicious user to modify text files via a database query, aka the "Text I-ISAM" vulnerability.
Microsoft Jet 3.5
Microsoft Jet 3.51
Microsoft Jet 4.0
NA
CVE-2004-0197
Buffer overflow in Microsoft Jet Database Engine 4.0 allows remote malicious users to execute arbitrary code via a specially-crafted database query.
Microsoft Jet 4.0
NA
CVE-2000-0325
The Microsoft Jet database engine allows an malicious user to execute commands via a database query, aka the "VBA Shell" vulnerability.
Microsoft Jet 3.5
Microsoft Jet 3.5.1
1 EDB exploit
NA
CVE-2008-1200
Unspecified vulnerability in Microsoft Access allows remote user-assisted malicious users to execute arbitrary code via a crafted .MDB file, possibly related to Jet Engine (msjet40.dll). NOTE: this is probably a different issue than CVE-2007-6026.
Microsoft Access 2000
Microsoft Jet 4.0
NA
CVE-2002-0859
Buffer overflow in the OpenDataSource function of the Jet engine on Microsoft SQL Server 2000 allows remote malicious users to execute arbitrary code.
Microsoft Sql Server 2000
Microsoft Jet 4.0
1 EDB exploit
NA
CVE-2007-6026
Stack-based buffer overflow in Microsoft msjet40.dll 4.0.8618.0 (aka Microsoft Jet Engine), as used by Access 2003 in Microsoft Office 2003 SP3, allows user-assisted malicious users to execute arbitrary code via a crafted MDB file database file containing a column structure with ...
Microsoft Jet 4.0.8618.0
Microsoft Office 2003
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2000
Microsoft Windows 2003 Server
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30065
CVE-2024-5843
CVE-2024-30080
code execution
CVE-2024-4577
CVE-2024-26169
wireless
remote code execution
CVE-2024-36103
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started