Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 27 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Feb 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:progress:telerik_ui_for_asp.net_ajax:*:*:*:*:*:*:*:* |
Thu, 26 Feb 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Progress
Progress telerik Ui For Asp.net Ajax |
|
| Vendors & Products |
Progress
Progress telerik Ui For Asp.net Ajax |
Wed, 25 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Progress® Telerik® UI for AJAX, versions prior to 2026.1.225, an insufficient entropy vulnerability exists in RadAsyncUpload, where a predictable temporary identifier, based on timestamp and filename, can enable collisions and file content tampering. | |
| Title | Insufficient Entropy Vulnerability in Telerik UI for ASP.NET AJAX | |
| Weaknesses | CWE-331 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2026-02-27T17:06:16.616Z
Reserved: 2026-02-20T16:20:51.770Z
Link: CVE-2026-2878
Updated: 2026-02-27T17:06:13.052Z
Status : Analyzed
Published: 2026-02-25T15:20:54.293
Modified: 2026-02-26T15:23:31.757
Link: CVE-2026-2878
No data.
OpenCVE Enrichment
Updated: 2026-04-17T15:30:06Z