CVE-2025-0556
- EPSS 0.1%
- Veröffentlicht 12.02.2025 16:15:43
- Zuletzt bearbeitet 20.02.2025 20:41:40
In Progress® Telerik® Report Server, versions prior to 2025 Q1 (11.0.25.211) when using the older .NET Framework implementation, communication of non-sensitive information between the service agent process and app host process occurs over an unencryp...
CVE-2024-7295
- EPSS 0.07%
- Veröffentlicht 13.11.2024 16:15:20
- Zuletzt bearbeitet 18.11.2024 17:41:49
In Progress® Telerik® Report Server versions prior to 2024 Q4 (10.3.24.1112), the encryption of local asset data used an older algorithm which may allow a sophisticated actor to decrypt this information.
CVE-2024-8015
- EPSS 0.4%
- Veröffentlicht 09.10.2024 15:15:17
- Zuletzt bearbeitet 15.10.2024 14:55:12
In Progress Telerik Report Server versions prior to 2024 Q3 (10.2.24.924), a remote code execution attack is possible through object injection via an insecure type resolution vulnerability.
CVE-2024-7292
- EPSS 0.07%
- Veröffentlicht 09.10.2024 15:15:15
- Zuletzt bearbeitet 15.10.2024 14:50:16
In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), a credential stuffing attack is possible through improper restriction of excessive login attempts.
CVE-2024-6327
- EPSS 2.9%
- Veröffentlicht 24.07.2024 14:15:06
- Zuletzt bearbeitet 21.11.2024 09:49:26
In Progress® Telerik® Report Server versions prior to 2024 Q2 (10.1.24.709), a remote code execution attack is possible through an insecure deserialization vulnerability.
CVE-2024-4837
- EPSS 0.18%
- Veröffentlicht 15.05.2024 17:15:16
- Zuletzt bearbeitet 16.01.2025 17:05:52
In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via a trust boundary violation vulnerability.
CVE-2024-1800
- EPSS 76.35%
- Veröffentlicht 20.03.2024 13:15:11
- Zuletzt bearbeitet 16.01.2025 17:07:24
In Progress® Telerik® Report Server versions prior to 2024 Q1 (10.0.24.130), a remote code execution attack is possible through an insecure deserialization vulnerability.