Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-48237 | In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), a password brute forcing attack is possible through weak password requirements. |
Tue, 15 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Progress telerik Reporting
|
|
| CPEs | cpe:2.3:a:progress:telerik_reporting:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Progress telerik Reporting
|
Wed, 09 Oct 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Progress
Progress telerik Report Server |
|
| CPEs | cpe:2.3:a:progress:telerik_report_server:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Progress
Progress telerik Report Server |
|
| Metrics |
ssvc
|
Wed, 09 Oct 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), a password brute forcing attack is possible through weak password requirements. | |
| Title | Password policy for new users is not strong enough | |
| Weaknesses | CWE-521 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2024-10-09T16:18:01.674Z
Reserved: 2024-07-30T14:58:13.290Z
Link: CVE-2024-7293
Updated: 2024-10-09T16:17:56.083Z
Status : Analyzed
Published: 2024-10-09T15:15:16.200
Modified: 2024-10-15T14:51:15.487
Link: CVE-2024-7293
No data.
OpenCVE Enrichment
No data.
EUVD