Race condition in the Enterprise Tree ActiveX control (EnterpriseControls.dll 11.5.0.313) in Crystal Reports XI Release 2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the SelectedSession method, which triggers a buffer overflow.
Max CVSS
9.3
EPSS Score
1.68%
Published
2008-01-22
Updated
2024-02-02
Stack-based buffer overflow in Visual Studio Crystal Reports for Microsoft Visual Studio .NET 2002 and 2002 SP1, .NET 2003 and 2003 SP1, and 2005 and 2005 SP1 (formerly Business Objects Crystal Reports XI Professional) allows user-assisted remote attackers to execute arbitrary code via a crafted RPT file.
Max CVSS
7.6
EPSS Score
95.36%
Published
2006-11-28
Updated
2018-10-17
Business Objects Crystal Enterprise 9 and 10 generates predictable session identifiers, which allows remote attackers to hijack sessions of other users via WCSID cookie values.
Max CVSS
7.5
EPSS Score
1.83%
Published
2006-11-29
Updated
2017-07-20
Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.
Max CVSS
7.5
EPSS Score
96.55%
Published
2004-08-06
Updated
2018-10-12
WebIntelligence 2.7.1 uses guessable user session cookies, which allows remote attackers to hijack sessions.
Max CVSS
7.5
EPSS Score
4.29%
Published
2003-12-31
Updated
2008-09-05
Crystal Reports, when displaying data for a password protected database using HTML pages, embeds the username and password in cleartext in the HTML page and the URL, which allows remote attackers to obtain passwords.
Max CVSS
7.5
EPSS Score
0.93%
Published
2001-01-10
Updated
2017-07-11
6 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!