Heap-based buffer overflow in the rfcguisink.rfcguisink.1 ActiveX control in the EnjoySAP SAP GUI, on systems using ASCII versions, allows remote attackers to execute arbitrary code via a long first argument to the LaunchGui function....
Stack-based buffer overflow in the kweditcontrol.kwedit.1 ActiveX control in FrontEndSapGuikwedit.dll in the EnjoySAP SAP GUI allows remote attackers to execute arbitrary code via a long argument to the PrepareToPostHTML function. Date published : 2007-07-06...
vtiger CRM before 5.0.3 allows remote authenticated users with access to the Analytics DashBoard menu to bypass data restrictions and read the pipeline of the entire organization, possibly involving modules/Potentials/Potentials.php. Date published : 2007-07-06...
SQL injection vulnerability in the dashboard (include/utils/SearchUtils.php) in vtiger CRM before 5.0.3 allows remote authenticated users to execute arbitrary SQL commands via the assigned_user_id parameter in a Potentials ListView action to index.php. Date published...
The SOAP webservice in vtiger CRM before 5.0.3 does not ensure that authenticated accounts are active, which allows remote authenticated users with inactive accounts to access and modify data, as demonstrated by the Thunderbird...
vtiger CRM before 5.0.3, when a migrated build is used, allows remote authenticated users to read certain other users’ calendar activities via a (1) home page or (2) event list view. Date published :...
WordPlugin in the wordintegration component in vtiger CRM before 5.0.3 allows remote authenticated users to bypass field level security permissions and merge arbitrary fields in an Email template, as demonstrated by the fields in...
index.php in vtiger CRM before 5.0.3 allows remote authenticated users to obtain all users’ names and e-mail addresses, and possibly change user settings, via a modified record parameter in a DetailView action to the...
Multiple cross-site scripting (XSS) vulnerabilities in AdventNet ManageEngine OpManager 6 and 7 allow remote attackers to inject arbitrary web script or HTML via the (1) name parameter in (a) ping.do and (b) traceRoute.do in...
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.