Lucene search

K

Crystal Reports Security Vulnerabilities

cve
cve

CVE-2010-2590

Heap-based buffer overflow in the CrystalReports12.CrystalPrintControl.1 ActiveX control in PrintControl.dll 12.3.2.753 in SAP Crystal Reports 2008 SP3 Fix Pack 3.2 allows remote attackers to execute arbitrary code via a long ServerResourceVersion property value.

7.9AI Score

0.915EPSS

2010-12-22 03:00 AM
75
cve
cve

CVE-2010-3032

Integer overflow in the OBGIOPServerWorker::extractHeader function in the ebus-3-3-2-6.dll module in SAP Crystal Reports 2008 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a GIOP packet with a crafted size, which triggers a heap-based buffer ov...

8.3AI Score

0.117EPSS

2010-08-17 08:00 PM
28
cve
cve

CVE-2014-5505

Stack-based buffer overflow in SAP Crystal Reports allows remote attackers to execute arbitrary code via a crafted data source string in an RPT file.

8.2AI Score

0.585EPSS

2014-09-04 05:55 PM
29
cve
cve

CVE-2014-5506

Double free vulnerability in SAP Crystal Reports allows remote attackers to execute arbitrary code via crafted connection string record in an RPT file.

7.9AI Score

0.302EPSS

2014-09-04 05:55 PM
205
cve
cve

CVE-2018-2427

SAP BusinessObjects Business Intelligence Suite, versions 4.10 and 4.20, and SAP Crystal Reports (version for Visual Studio .NET, Version 2010) allows an attacker to inject code that can be executed by the application. An attacker could thereby control the behaviour of the application.

8.8CVSS

8.6AI Score

0.002EPSS

2018-07-10 06:29 PM
36
cve
cve

CVE-2019-0285

The .NET SDK WebForm Viewer in SAP Crystal Reports for Visual Studio (fixed in version 2010) discloses sensitive database information including credentials which can be misused by the attacker.

9.8CVSS

9.3AI Score

0.053EPSS

2019-04-10 09:29 PM
62
cve
cve

CVE-2020-6208

SAP Business Objects Business Intelligence Platform (Crystal Reports), versions- 4.1, 4.2, allows an attacker with basic authorization to inject code that can be executed by the application and thus allowing the attacker to control the behaviour of the application, leading to Remote Code Execution....

8.2CVSS

8.3AI Score

0.006EPSS

2020-03-10 09:15 PM
60