Progress

Openedge

15 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 02.05.2022 00:15:08
  • Zuletzt bearbeitet 21.11.2024 06:59:48

In Progress OpenEdge before 11.7.14 and 12.x before 12.2.9, certain SUID binaries within the OpenEdge application were susceptible to privilege escalation. If exploited, a local attacker could elevate their privileges and compromise the affected syst...

  • EPSS 0.06%
  • Veröffentlicht 31.10.2017 07:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Insecure default configuration in Progress Software OpenEdge 10.2x and 11.x allows unauthenticated remote attackers to specify arbitrary URLs from which to load and execute malicious Java classes via port 20931.

Exploit
  • EPSS 3.52%
  • Veröffentlicht 12.11.2014 16:55:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Directory traversal vulnerability in report/reportViewAction.jsp in Progress Software OpenEdge 11.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the selection parameter.

  • EPSS 2.04%
  • Veröffentlicht 15.07.2007 21:30:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Heap-based buffer overflow in _mprosrv.exe in Progress Software Progress 9.1E and OpenEdge 10.1x, as used by the RSA Authentication Manager 6.0 and 6.1, SecurID Appliance 2.0, ACE/Server 5.2, and possibly other products, allows remote attackers to ex...

  • EPSS 3.49%
  • Veröffentlicht 29.06.2007 18:30:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Buffer overflow in _mprosrv in Progress Software OpenEdge before 9.1E0422, and 10.x before 10.1B01, allows remote attackers to have an unknown impact via a malformed TCP/IP message.