Filtered by vendor Microsoft
Subscriptions
Filtered by product Access
Subscriptions
Total
29 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2013-3157 | 1 Microsoft | 1 Access | 2025-04-11 | N/A |
| Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka "Access Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3155. | ||||
| CVE-2010-1881 | 1 Microsoft | 2 Access, Office | 2025-04-11 | N/A |
| The FieldList ActiveX control in the Microsoft Access Wizard Controls in ACCWIZ.dll in Microsoft Office Access 2003 SP3 does not properly interact with the memory-access approach used by Internet Explorer and Office during instantiation, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTML document that references this control along with crafted persistent storage data, aka "ACCWIZ.dll Uninitialized Variable Vulnerability." | ||||
| CVE-2010-0814 | 1 Microsoft | 2 Access, Office | 2025-04-11 | N/A |
| The Microsoft Access Wizard Controls in ACCWIZ.dll in Microsoft Office Access 2003 SP3 and 2007 SP1 and SP2 do not properly interact with the memory-allocation approach used by Internet Explorer during instantiation, which allows remote attackers to execute arbitrary code via a web site that references multiple ActiveX controls, as demonstrated by the ImexGrid and FieldList controls, aka "Access ActiveX Control Vulnerability." | ||||
| CVE-2013-3156 | 1 Microsoft | 1 Access | 2025-04-11 | N/A |
| Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka "Access File Format Memory Corruption Vulnerability." | ||||
| CVE-2021-28455 | 1 Microsoft | 23 365 Apps, Access, Office and 20 more | 2024-11-21 | 8.8 High |
| Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability | ||||
| CVE-2020-1582 | 1 Microsoft | 3 365 Apps, Access, Office | 2024-11-21 | 7.8 High |
| A remote code execution vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Access. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. The security update addresses the vulnerability by correcting how Microsoft Access handles objects in memory. | ||||
| CVE-2020-0760 | 1 Microsoft | 10 Access, Excel, Office and 7 more | 2024-11-21 | 8.8 High |
| A remote code execution vulnerability exists when Microsoft Office improperly loads arbitrary type libraries, aka 'Microsoft Office Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0991. | ||||
| CVE-2018-8312 | 1 Microsoft | 2 Access, Office | 2024-11-21 | N/A |
| A remote code execution vulnerability exists when Microsoft Access fails to properly handle objects in memory, aka "Microsoft Access Remote Code Execution Vulnerability." This affects Microsoft Access, Microsoft Office. | ||||
| CVE-2018-0903 | 1 Microsoft | 2 Access, Office | 2024-11-21 | N/A |
| Microsoft Access 2010 SP2, Microsoft Access 2013 SP1, Microsoft Access 2016, and Microsoft Office 2016 Click-to-Run allow a remote code execution vulnerability due to how objects are handled in memory, aka "Microsoft Access Remote Code Execution Vulnerability". | ||||