4 results (0.005 seconds)

CVSS: 9.8EPSS: 59%CPEs: 21EXPL: 0

10 Jul 2012 — Heap-based buffer overflow in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2 and Windows Data Access Components (WDAC) 6.0 allows remote attackers to execute arbitrary code via crafted XML data that triggers access to an uninitialized object in memory, aka "ADO Cachesize Heap Overflow RCE Vulnerability." Desbordamiento de búfer basado en memoria dinámica en Microsoft Data Access Components (MDAC) v2.8 SP1 y SP2 y Windows Data Access Components (WDAC) v6.0, permite a atacantes remotos ejecutar códig... • http://www.us-cert.gov/cas/techalerts/TA12-192A.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-908: Use of Uninitialized Resource •

CVSS: 10.0EPSS: 61%CPEs: 18EXPL: 0

11 Jan 2011 — Integer signedness error in the SQLConnectW function in an ODBC API (odbc32.dll) in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, allows remote attackers to execute arbitrary code via a long string in the Data Source Name (DSN) and a crafted szDSN argument, which bypasses a signed comparison and leads to a buffer overflow, aka "DSN Overflow Vulnerability." Error en la propiedad signedness de enteros en la función SQLConnectW en una API de ODBC (odbc3... • http://osvdb.org/70443 • CWE-189: Numeric Errors •

CVSS: 9.8EPSS: 71%CPEs: 18EXPL: 1

11 Jan 2011 — Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, does not properly validate memory allocation for internal data structures, which allows remote attackers to execute arbitrary code, possibly via a large CacheSize property that triggers an integer wrap and a buffer overflow, aka "ADO Record Memory Vulnerability." NOTE: this might be a duplicate of CVE-2010-1117 or CVE-2010-1118. Microsoft Data Access Components (MDAC) versión 2.8 SP1 y SP2 y Windows Data ... • https://www.exploit-db.com/exploits/15984 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 72%CPEs: 13EXPL: 3

27 Oct 2006 — The Execute method in the ADODB.Connection 2.7 and 2.8 ActiveX control objects (ADODB.Connection.2.7 and ADODB.Connection.2.8) in the Microsoft Data Access Components (MDAC) 2.5 SP3, 2.7 SP1, 2.8, and 2.8 SP1 does not properly track freed memory when the second argument is a BSTR, which allows remote attackers to cause a denial of service (Internet Explorer crash) and possibly execute arbitrary code via certain strings in the second and third arguments. El objeto de control ActiveX ADODB.Connection 2.7 (ADO... • https://www.exploit-db.com/exploits/2629 • CWE-20: Improper Input Validation •