Description
In Progress® Telerik® Reporting versions prior to 2024 Q2 (18.1.24.2.514), a code execution attack is possible by a local threat actor through an insecure deserialization vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-32754 | In Progress® Telerik® Reporting versions prior to 2024 Q2 (18.1.24.2.514), a code execution attack is possible by a local threat actor through an insecure deserialization vulnerability. |
References
History
Thu, 16 Jan 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Progress
Progress telerik Reporting |
|
| CPEs | cpe:2.3:a:progress:telerik_reporting:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Progress
Progress telerik Reporting |
Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2024-08-01T20:33:53.025Z
Reserved: 2024-04-25T17:02:09.150Z
Link: CVE-2024-4200
Updated: 2024-08-01T20:33:53.025Z
Status : Analyzed
Published: 2024-05-15T17:15:15.367
Modified: 2025-01-16T18:07:50.387
Link: CVE-2024-4200
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD