Description

In Progress® Telerik® Report Server versions prior to 2024 Q1 (10.0.24.130), a remote code execution attack is possible through an insecure deserialization vulnerability.
Published: 2024-03-20
Score: 9.9 Critical
EPSS: 72.3% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Jan 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Progress
Progress telerik Report Server
CPEs cpe:2.3:a:progress:telerik_report_server:*:*:*:*:*:*:*:*
Vendors & Products Progress
Progress telerik Report Server

Subscriptions

Progress Telerik Report Server
cve-icon MITRE

Status: PUBLISHED

Assigner: ProgressSoftware

Published:

Updated: 2024-08-01T18:48:22.048Z

Reserved: 2024-02-22T20:41:23.940Z

Link: CVE-2024-1800

cve-icon Vulnrichment

Updated: 2024-08-01T18:48:22.048Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-20T13:15:11.980

Modified: 2025-01-16T17:07:24.633

Link: CVE-2024-1800

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses