A memory corruption flaw in the JET database engine allows a remote attacker to execute arbitrary codes on the system. This Microsoft Windows vulnerability can be exploited by persuading a victim to open specially-crafted content to execute arbitrary code in the context of the current process. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. This is a Zero-Day advisory.
Beware of suspicious behavior.
Enable and configure firewalls and antivirus.
Improve spam configurations and properties.
Patches for this Zero-day are not available as of yet, visit the Microsoft website for any future patches.