Microsoft Windows Data Access Components vulnerabilities
3 known vulnerabilities affecting microsoft/windows_data_access_components.
Total CVEs
3
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL3
Vulnerabilities
Page 1 of 1
CVE-2012-1891CRITICALCVSS 9.8v6.02012-07-10
CVE-2012-1891 [CRITICAL] CWE-119 CVE-2012-1891: Heap-based buffer overflow in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2 and Windows Da
Heap-based buffer overflow in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2 and Windows Data Access Components (WDAC) 6.0 allows remote attackers to execute arbitrary code via crafted XML data that triggers access to an uninitialized object in memory, aka "ADO Cachesize Heap Overflow RCE Vulnerability."
nvd
CVE-2011-0027CRITICALCVSS 9.3PoCv6.02011-01-12
CVE-2011-0027 [CRITICAL] CVE-2011-0027: Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6
Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, does not properly validate memory allocation for internal data structures, which allows remote attackers to execute arbitrary code, possibly via a large CacheSize property that triggers an integer wrap and a buffer overflow, aka "ADO Record Memory Vulnera
nvd
CVE-2011-0026CRITICALCVSS 9.3v6.02011-01-12
CVE-2011-0026 [CRITICAL] CWE-189 CVE-2011-0026: Integer signedness error in the SQLConnectW function in an ODBC API (odbc32.dll) in Microsoft Data A
Integer signedness error in the SQLConnectW function in an ODBC API (odbc32.dll) in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, allows remote attackers to execute arbitrary code via a long string in the Data Source Name (DSN) and a crafted szDSN argument, which bypasses a signed comparison
nvd