Progress
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Progress product.
RSS Feeds for Progress security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Progress products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Progress Sorted by Most Security Vulnerabilities since 2018
Known Exploited Progress Vulnerabilities
The following Progress vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| Progress WhatsUp Gold Path Traversal Vulnerability |
Progress WhatsUp Gold contains a path traversal vulnerability that allows an unauthenticated attacker to achieve remote code execution. CVE-2024-4885 Exploit Probability: 94.3% |
March 3, 2025 |
| Progress Kemp LoadMaster OS Command Injection Vulnerability |
Progress Kemp LoadMaster contains an OS command injection vulnerability that allows an unauthenticated, remote attacker to access the system through the LoadMaster management interface, enabling arbitrary system command execution. CVE-2024-1212 Exploit Probability: 94.3% |
November 18, 2024 |
| Progress WhatsUp Gold SQL Injection Vulnerability |
Progress WhatsUp Gold contains a SQL injection vulnerability that allows an unauthenticated attacker to retrieve the user's encrypted password if the application is configured with only a single user. CVE-2024-6670 Exploit Probability: 94.5% |
September 16, 2024 |
| Progress Telerik Report Server Authentication Bypass by Spoofing Vulnerability |
Progress Telerik Report Server contains an authorization bypass by spoofing vulnerability that allows an attacker to obtain unauthorized access. CVE-2024-4358 Exploit Probability: 94.3% |
June 13, 2024 |
| Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability |
Progress WS_FTP Server contains a deserialization of untrusted data vulnerability in the Ad Hoc Transfer module that allows an authenticated attacker to execute remote commands on the underlying operating system. CVE-2023-40044 Exploit Probability: 94.4% |
October 5, 2023 |
| Progress MOVEit Transfer SQL Injection Vulnerability |
Progress MOVEit Transfer contains a SQL injection vulnerability that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or delete database elements. CVE-2023-34362 Exploit Probability: 94.3% |
June 2, 2023 |
Of the known exploited vulnerabilities above, 6 are in the top 1%, or the 99th percentile of the EPSS exploit probability rankings.
By the Year
In 2026 there have been 1 vulnerability in Progress with an average score of 3.7 out of ten. Last year, in 2025 Progress had 24 security vulnerabilities published. Right now, Progress is on track to have less security vulnerabilities in 2026 than it did last year. Last year, the average CVE base score was greater by 3.33
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 1 | 3.70 |
| 2025 | 24 | 7.03 |
| 2024 | 83 | 7.87 |
| 2023 | 37 | 7.08 |
| 2022 | 8 | 6.70 |
| 2021 | 6 | 8.68 |
| 2020 | 3 | 5.40 |
| 2019 | 5 | 6.53 |
| 2018 | 9 | 8.13 |
It may take a day or so for new Progress vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Progress Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2025-11235 | Jan 06, 2026 |
Progress MOVEit Transfer Unverified Password Change (REST API) <2023.1.3Unverified Password Change vulnerability in Progress MOVEit Transfer on Windows (REST API modules).This issue affects MOVEit Transfer: from 2023.1.0 before 2023.1.3, from 2023.0.0 before 2023.0.8, from 2022.1.0 before 2022.1.11, from 2022.0.0 before 2022.0.10. |
|
| CVE-2025-13147 | Nov 19, 2025 |
Progress MOVEit Transfer SSRF Vulnerability: before 2024.1.8, 2025.0.04.0.3Server-Side Request Forgery (SSRF) vulnerability in Progress MOVEit Transfer.This issue affects MOVEit Transfer: before 2024.1.8, from 2025.0.0 before 2025.0.4. |
|
| CVE-2025-10703 | Nov 19, 2025 |
Code Injection via SpyAttribute log=(file) in Progress DataDirect Connect JDBCImproper Control of Generation of Code ('Code Injection') vulnerability in Progress DataDirect Connect for JDBC drivers, Progress DataDirect Open Access JDBC driver and Hybrid Data Pipeline allows Remote Code Inclusion. The SpyAttribute connection option implemented by the DataDirect Connect for JDBC drivers, DataDirect Hybrid Data Pipeline JDBC driver and the DataDirect OpenAccess JDBC driver log=(file) construct allows the user to specify an arbitrary file for the JDBC driver to write its log information to. If an application allows an end user to specify a value for the SpyAttributes connection option then an attacker could cause java script to be written to a log file. If the log file was in the correct location with the correct extension, an application server could see that log file as a resource to be served. The attacker could fetch the resource from the server causing the java script to be executed. This issue affects: DataDirect Connect for JDBC for Amazon Redshift: through 6.0.0.001392, fixed in 6.0.0.001541 DataDirect Connect for JDBC for Apache Cassandra: through 6.0.0.000805, fixed in 6.0.0.000833 DataDirect Connect for JDBC for Hive: through 6.0.1.001499, fixed in 6.0.1.001628 DataDirect Connect for JDBC for Apache Impala: through 6.0.0.001155, fixed in 6.0.0.001279 DataDirect Connect for JDBC for Apache SparkSQL: through 6.0.1.001222, fixed in 6.0.1.001344 DataDirect Connect for JDBC Autonomous REST Connector: through 6.0.1.006961, fixed in 6.0.1.007063 DataDirect Connect for JDBC for DB2: through 6.0.0.000717, fixed in 6.0.0.000964 DataDirect Connect for JDBC for Google Analytics 4: through 6.0.0.000454, fixed in 6.0.0.000525 DataDirect Connect for JDBC for Google BigQuery: through 6.0.0.002279, fixed in 6.0.0.002410 DataDirect Connect for JDBC for Greenplum: through 6.0.0.001712, fixed in 6.0.0.001727 DataDirect Connect for JDBC for Informix: through 6.0.0.000690, fixed in 6.0.0.0851 DataDirect Connect for JDBC for Microsoft Dynamics 365: through 6.0.0.003161, fixed in 6.0.0.3198 DataDirect Connect for JDBC for Microsoft SQLServer: through 6.0.0.001936, fixed in 6.0.0.001957 DataDirect Connect for JDBC for Microsoft Sharepoint: through 6.0.0.001559, fixed in 6.0.0.001587 DataDirect Connect for JDBC for MongoDB: through 6.1.0.001654, fixed in 6.1.0.001669 DataDirect Connect for JDBC for MySQL: through 5.1.4.000330, fixed in 5.1.4.000364 DataDirect Connect for JDBC for Oracle Database: through 6.0.0.001747, fixed in 6.0.0.001776 DataDirect Connect for JDBC for Oracle Eloqua: through 6.0.0.001438, fixed in 6.0.0.001458 DataDirect Connect for JDBC for Oracle Sales Cloud: through 6.0.0.001225, fixed in 6.0.0.001316 DataDirect Connect for JDBC for Oracle Service Cloud: through 5.1.4.000298, fixed in 5.1.4.000309 DataDirect Connect for JDBC for PostgreSQL: through 6.0.0.001843, fixed in 6.0.0.001856 DataDirect Connect for JDBC for Progress OpenEdge: through 5.1.4.000187, fixed in 5.1.4.000189 DataDirect Connect for JDBC for Salesforce: through 6.0.0.003020, fixed in 6.0.0.003125 DataDirect Connect for JDBC for SAP HANA: through 6.0.0.000879, product retired DataDirect Connect for JDBC for SAP S/4 HANA: through 6.0.1.001818, fixed in 6.0.1.001858 DataDirect Connect for JDBC for Sybase ASE: through 5.1.4.000161, fixed in 5.1.4.000162 DataDirect Connect for JDBC for Snowflake: through 6.0.1.001821, fixed in 6.0.1.001856 DataDirect Hybrid Data Pipeline Server: through 4.6.2.3309, fixed in 4.6.2.3430 DataDirect Hybrid Data Pipeline JDBC Driver: through 4.6.2.0607, fixed in 4.6.2.1023 DataDirect Hybrid Data Pipeline On Premises Connector: through 4.6.2.1223, fixed in 4.6.2.1339 DataDirect Hybrid Data Pipeline Docker: through 4.6.2.3316, fixed in 4.6.2.3430 DataDirect OpenAccess JDBC Driver: through 8.1.0.0177, fixed in 8.1.0.0183 DataDirect OpenAccess JDBC Driver: through 9.0.0.0019, fixed in 9.0.0.0022 |
|
| CVE-2025-10702 | Nov 19, 2025 |
CVE-2025-10702: SpyAttributes Code Injection in Progress DataDirect JDBCImproper Control of Generation of Code ('Code Injection') vulnerability in Progress DataDirect Connect for JDBC drivers, Progress DataDirect Open Access JDBC driver and Hybrid Data Pipeline allows Remote Code Inclusion. The SpyAttribute connection option implemented by the DataDirect Connect for JDBC drivers, DataDirect Hybrid Data Pipeline JDBC driver and the DataDirect OpenAccess JDBC driver supports an undocumented syntax construct for the option value that if discovered can be used by an attacker. If an application allows an end user to specify a value for the SpyAttributes connection option then an attacker can use the undocumented syntax to cause the driver to load an arbitrary class on the class path and execute a constructor on that class. This issue affects: DataDirect Connect for JDBC for Amazon Redshift: through 6.0.0.001392, fixed in 6.0.0.001541 DataDirect Connect for JDBC for Apache Cassandra: through 6.0.0.000805, fixed in 6.0.0.000833 DataDirect Connect for JDBC for Hive: through 6.0.1.001499, fixed in 6.0.1.001628 DataDirect Connect for JDBC for Apache Impala: through 6.0.0.001155, fixed in 6.0.0.001279 DataDirect Connect for JDBC for Apache SparkSQL: through 6.0.1.001222, fixed in 6.0.1.001344 DataDirect Connect for JDBC Autonomous REST Connector: through 6.0.1.006961, fixed in 6.0.1.007063 DataDirect Connect for JDBC for DB2: through 6.0.0.000717, fixed in 6.0.0.000964 DataDirect Connect for JDBC for Google Analytics 4: through 6.0.0.000454, fixed in 6.0.0.000525 DataDirect Connect for JDBC for Google BigQuery: through 6.0.0.002279, fixed in 6.0.0.002410 DataDirect Connect for JDBC for Greenplum: through 6.0.0.001712, fixed in 6.0.0.001727 DataDirect Connect for JDBC for Informix: through 6.0.0.000690, fixed in 6.0.0.0851 DataDirect Connect for JDBC for Microsoft Dynamics 365: through 6.0.0.003161, fixed in 6.0.0.3198 DataDirect Connect for JDBC for Microsoft SQLServer: through 6.0.0.001936, fixed in 6.0.0.001957 DataDirect Connect for JDBC for Microsoft Sharepoint: through 6.0.0.001559, fixed in 6.0.0.001587 DataDirect Connect for JDBC for MongoDB: through 6.1.0.001654, fixed in 6.1.0.001669 DataDirect Connect for JDBC for MySQL: through 5.1.4.000330, fixed in 5.1.4.000364 DataDirect Connect for JDBC for Oracle Database: through 6.0.0.001747, fixed in 6.0.0.001776 DataDirect Connect for JDBC for Oracle Eloqua: through 6.0.0.001438, fixed in 6.0.0.001458 DataDirect Connect for JDBC for Oracle Sales Cloud: through 6.0.0.001225, fixed in 6.0.0.001316 DataDirect Connect for JDBC for Oracle Service Cloud: through 5.1.4.000298, fixed in 5.1.4.000309 DataDirect Connect for JDBC for PostgreSQL: through 6.0.0.001843, fixed in 6.0.0.001856 DataDirect Connect for JDBC for Progress OpenEdge: through 5.1.4.000187, fixed in 5.1.4.000189 DataDirect Connect for JDBC for Salesforce: through 6.0.0.003020, fixed in 6.0.0.003125 DataDirect Connect for JDBC for SAP HANA: through 6.0.0.000879, product retired DataDirect Connect for JDBC for SAP S/4 HANA: through 6.0.1.001818, fixed in 6.0.1.001858 DataDirect Connect for JDBC for Sybase ASE: through 5.1.4.000161, fixed in 5.1.4.000162 DataDirect Connect for JDBC for Snowflake: through 6.0.1.001821, fixed in 6.0.1.001856 DataDirect Hybrid Data Pipeline Server: through 4.6.2.3309, fixed in 4.6.2.3430 DataDirect Hybrid Data Pipeline JDBC Driver: through 4.6.2.0607, fixed in 4.6.2.1023 DataDirect Hybrid Data Pipeline On Premises Connector: through 4.6.2.1223, fixed in 4.6.2.1339 DataDirect Hybrid Data Pipeline Docker: through 4.6.2.3316, fixed in 4.6.2.3430 DataDirect OpenAccess JDBC Driver: through 8.1.0.0177, fixed in 8.1.0.0183 DataDirect OpenAccess JDBC Driver: through 9.0.0.0019, fixed in 9.0.0.0022 |
|
| CVE-2025-10932 | Oct 29, 2025 |
Uncontrolled Resource Consumption in MOVEit Transfer AS2 Module (pre2025.0.3)Uncontrolled Resource Consumption vulnerability in Progress MOVEit Transfer (AS2 module).This issue affects MOVEit Transfer: from 2025.0.0 before 2025.0.3, from 2024.1.0 before 2024.1.7, from 2023.1.0 before 2023.1.16. |
|
| CVE-2025-3600 | May 14, 2025 |
Unsafe Reflection in Telerik UI for AJAX v2011.2.712–2025.1.218 – DoS CrashIn Progress® Telerik® UI for AJAX, versions 2011.2.712 to 2025.1.218, an unsafe reflection vulnerability exists that may lead to an unhandled exception resulting in a crash of the hosting process and denial of service. |
|
| CVE-2025-2572 | Apr 14, 2025 |
WhatsUp Gold <=2024.0.2 Unauth DB Manipulation via WrlsMacAddressGroupIn WhatsUp Gold versions released before 2024.0.3, a database manipulation vulnerability allows an unauthenticated attacker to modify the contents of WhatsUp.dbo.WrlsMacAddressGroup. |
|
| CVE-2025-1968 | Apr 09, 2025 |
Insufficient Session Expiration in Progress Sitefinity 14–15.2 (before 15.2.8429)Insufficient Session Expiration vulnerability in Progress Software Corporation Sitefinity under some specific and uncommon circumstances allows reusing Session IDs (Session Replay Attacks).This issue affects Sitefinity: from 14.0 through 14.3, from 14.4 before 14.4.8145, from 15.0 before 15.0.8231, from 15.1 before 15.1.8332, from 15.2 before 15.2.8429. |
|
| CVE-2025-2324 | Mar 19, 2025 |
Privilege Escalation in Progress MOVEit Transfer SFTP (Shared Accounts) – before 2024.1.2Improper Privilege Management vulnerability for users configured as Shared Accounts in Progress MOVEit Transfer (SFTP module) allows Privilege Escalation.This issue affects MOVEit Transfer: from 2023.1.0 before 2023.1.12, from 2024.0.0 before 2024.0.8, from 2024.1.0 before 2024.1.2. |
|
| CVE-2025-1758 | Mar 19, 2025 |
Progress LoadMaster 7.2.40+ Buffer Overflow via Improper Input ValidationImproper Input Validation vulnerability in Progress LoadMaster allows : Buffer OverflowThis issue affects: * LoadMaster: 7.2.40.0 and above * ECS: All versions * Multi-Tenancy: 7.1.35.4 and above |
|
| CVE-2024-6097 | Feb 12, 2025 |
Telerik Reporting 19.0.25.211 Info Disclosure Absolute Path VulnerabilityIn Progress® Telerik® Reporting versions prior to 2025 Q1 (19.0.25.211), information disclosure is possible by a local threat actor through an absolute path vulnerability. |
|
| CVE-2024-11628 | Feb 12, 2025 |
Prototype Pollution in Telerik Kendo UI Vue v2.4v6.0.1 Enables InjectionIn Progress® Telerik® Kendo UI for Vue versions v2.4.0 through v6.0.1, an attacker can introduce or modify properties within the global prototype chain which can result in denial of service or command injection. |
|
| CVE-2024-11629 | Feb 12, 2025 |
Telerik Document Processing Lib before 2025.1.205: Arbitrary File Export to RTFIn Progress® Telerik® Document Processing Libraries, versions prior to 2025 Q1 (2025.1.205), using .NET Standard 2.0, the contents of a file at an arbitrary path can be exported to RTF. |
|
| CVE-2025-0332 | Feb 12, 2025 |
Telerik UI for WinForms <2025.1.211 Path Traversal in Archive ExtractionIn Progress® Telerik® UI for WinForms, versions prior to 2025 Q1 (2025.1.211), using the improper limitation of a target path can lead to decompressing an archive's content into a restricted directory. |
|
| CVE-2024-12629 | Feb 12, 2025 |
KendoReact Prototype Pollution v3.5.0-v9.4.0 Progress TelerikIn Progress® Telerik® KendoReact versions v3.5.0 through v9.4.0, an attacker can introduce or modify properties within the global prototype chain which can result in denial of service or command injection. |
|
| CVE-2024-11343 | Feb 12, 2025 |
Telerik DP Libs <2025 Q1: Unzip Causes Arbitrary FS AccessIn Progress® Telerik® Document Processing Libraries, versions prior to 2025 Q1 (2025.1.205), unzipping an archive can lead to arbitrary file system access. |
|
| CVE-2025-0556 | Feb 12, 2025 |
Telerik Report Server <11.0.25.211: Unencrypted Tunnel Allows Network SniffingIn Progress® Telerik® Report Server, versions prior to 2025 Q1 (11.0.25.211) when using the older .NET Framework implementation, communication of non-sensitive information between the service agent process and app host process occurs over an unencrypted tunnel, which can be subjected to local network traffic sniffing. |
|
| CVE-2024-56135 | Feb 05, 2025 |
Progress LoadMaster 7.2.48.12-7.2.60.1 OS Command Injection via Auth InputImproper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection. This issue affects: ?Product Affected Versions LoadMaster From 7.2.55.0 to 7.2.60.1 (inclusive) ? From 7.2.49.0 to 7.2.54.12 (inclusive) ? 7.2.48.12 and all prior versions ECS All prior versions to 7.2.60.1 (inclusive) |
|
| CVE-2024-56134 | Feb 05, 2025 |
Progress LoadMaster <7.2.60.1 OS Cmd InjectionImproper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection. This issue affects: ?Product Affected Versions LoadMaster From 7.2.55.0 to 7.2.60.1 (inclusive) ? From 7.2.49.0 to 7.2.54.12 (inclusive) ? 7.2.48.12 and all prior versions Multi-Tenant Hypervisor 7.1.35.12 and all prior versions ECS All prior versions to 7.2.60.1 (inclusive) |
|
| CVE-2024-56133 | Feb 05, 2025 |
Progress LoadMaster <=7.2.60.1: OS Command Injection (Auth)Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection. This issue affects: ?Product Affected Versions LoadMaster From 7.2.55.0 to 7.2.60.1 (inclusive) ? From 7.2.49.0 to 7.2.54.12 (inclusive) ? 7.2.48.12 and all prior versions ECS All prior versions to 7.2.60.1 (inclusive) |
|
| CVE-2024-56132 | Feb 05, 2025 |
Progress LoadMaster OS Command Injection 7.2.48.12+ upto 7.2.60.1Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection. This issue affects: ?Product Affected Versions LoadMaster From 7.2.55.0 to 7.2.60.1 (inclusive) ? From 7.2.49.0 to 7.2.54.12 (inclusive) ? 7.2.48.12 and all prior versions ECS All prior versions to 7.2.60.1 (inclusive) |
|
| CVE-2024-56131 | Feb 05, 2025 |
Progress LoadMaster 7.2.55.0-7.2.60.1 OS CI (Auth)Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection. This issue affects: ?Product Affected Versions LoadMaster From 7.2.55.0 to 7.2.60.1 (inclusive) ? From 7.2.49.0 to 7.2.54.12 (inclusive) ? 7.2.48.12 and all prior versions Multi-Tenant Hypervisor 7.1.35.12 and all prior versions ECS All prior versions to 7.2.60.1 (inclusive) |
|
| CVE-2024-11627 | Jan 07, 2025 |
Insufficient Expiration in Progress Sitefinity 4.015.2 Session Fixation: Insufficient Session Expiration vulnerability in Progress Sitefinity allows : Session Fixation.This issue affects Sitefinity: from 4.0 through 14.4.8142, from 15.0.8200 through 15.0.8229, from 15.1.8300 through 15.1.8327, from 15.2.8400 through 15.2.8421. |
|
| CVE-2024-11626 | Jan 07, 2025 |
Sitefinity XSS in CMS Admin (v4.0-15.2.8421)Improper Neutralization of Input During CMS Backend (adminstrative section) Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Progress Sitefinity.This issue affects Sitefinity: from 4.0 through 14.4.8142, from 15.0.8200 through 15.0.8229, from 15.1.8300 through 15.1.8327, from 15.2.8400 through 15.2.8421. |
|
| CVE-2024-11625 | Jan 07, 2025 |
Sitefinity Info Disclosure via Error Msg (4.0-15.2.8421)Information Exposure Through an Error Message vulnerability in Progress Software Corporation Sitefinity.This issue affects Sitefinity: from 4.0 through 14.4.8142, from 15.0.8200 through 15.0.8229, from 15.1.8300 through 15.1.8327, from 15.2.8400 through 15.2.8421. |
|
| CVE-2024-12105 | Dec 31, 2024 |
Auth Info Disclosure via HTTP in WhatsUp Gold <2024.0.2In WhatsUp Gold versions released before 2024.0.2, an authenticated user can use a specially crafted HTTP request that can lead to information disclosure. |
|
| CVE-2024-12106 | Dec 31, 2024 |
Unauth LDAP Config in WhatsUp Gold pre-2024.0.2In WhatsUp Gold versions released before 2024.0.2, an unauthenticated attacker can configure LDAP settings. |
|
| CVE-2024-12108 | Dec 31, 2024 |
WhatsUp Gold <2024.0.2 Public API Access ExploitIn WhatsUp Gold versions released before 2024.0.2, an attacker can gain access to the WhatsUp Gold server via the public API. |
|
| CVE-2024-11220 | Dec 06, 2024 |
Telerik Reporting Privilege Escalation via Malicious RDLX FileA local low-level user on the server machine with credentials to the running OAS services can create and execute a report with an rdlx file on the server system itself. Any code within the rdlx file of the report executes with SYSTEM privileges, resulting in privilege escalation. |
|
| CVE-2024-8785 | Dec 02, 2024 |
WhatsUp Gold NmAPI.exe Remote Unauthenticated Registry Manipulation VulnerabilityIn WhatsUp Gold versions released before 2024.0.1, a remote unauthenticated attacker could leverage NmAPI.exe to create or change an existing registry value in registry path HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ipswitch\. |
|
| CVE-2024-46905 | Dec 02, 2024 |
SQL Injection Vulnerability in WhatsUp Gold Leading to Privilege EscalationIn WhatsUp Gold versions released before 2024.0.1, a SQL Injection vulnerability allows an authenticated lower-privileged user (at least Network Manager permissions required) to achieve privilege escalation to the admin account. |
|
| CVE-2024-46906 | Dec 02, 2024 |
SQL Injection Vulnerability in WhatsUp Gold Report ViewerIn WhatsUp Gold versions released before 2024.0.1, a SQL Injection vulnerability allows an authenticated low-privileged user (at least Report Viewer permissions required) to achieve privilege escalation to the admin account. |
|
| CVE-2024-46907 | Dec 02, 2024 |
SQL Injection Vulnerability in WhatsUp Gold Leading to Privilege EscalationIn WhatsUp Gold versions released before 2024.0.1, a SQL Injection vulnerability allows an authenticated low-privileged user (at least Report Viewer permissions required) to achieve privilege escalation to the admin account. |
|
| CVE-2024-46908 | Dec 02, 2024 |
SQL Injection Vulnerability in WhatsUp Gold Leading to Privilege EscalationIn WhatsUp Gold versions released before 2024.0.1, a SQL Injection vulnerability allows an authenticated low-privileged user (at least Report Viewer permissions required) to achieve privilege escalation to the admin account. |
|
| CVE-2024-46909 | Dec 02, 2024 |
WhatsUp Gold Remote Code Execution VulnerabilityIn WhatsUp Gold versions released before 2024.0.1, a remote unauthenticated attacker could leverage this vulnerability to execute code in the context of the service account. |
|
| CVE-2024-10013 | Nov 13, 2024 |
Telerik UI for WinForms Insecure Deserialization Code Execution VulnerabilityIn Progress Telerik UI for WinForms versions prior to 2024 Q4 (2024.4.1113), a code execution attack is possible through an insecure deserialization vulnerability. |
|
| CVE-2024-7295 | Nov 13, 2024 |
In Progress® Telerik® Report Server: Weak Encryption Vulnerability in Local Asset DataIn Progress® Telerik® Report Server versions prior to 2024 Q4 (10.3.24.1112), the encryption of local asset data used an older algorithm which may allow a sophisticated actor to decrypt this information. |
|
| CVE-2024-8049 | Nov 13, 2024 |
Telerik Document Processing Libraries: Denial of Service via Resource ExhaustionIn Progress Telerik Document Processing Libraries, versions prior to 2024 Q4 (2024.4.1106), importing a document with unsupported features can lead to excessive processing, leading to excessive use of computing resources leaving the application process unavailable. |
|
| CVE-2024-7763 | Oct 24, 2024 |
WhatsUp Gold <2024.0.0: Auth Bypass Exposes Encrypted CredentialsIn WhatsUp Gold versions released before 2024.0.0, an Authentication Bypass issue exists which allows an attacker to obtain encrypted user credentials. |
|
| CVE-2024-8755 | Oct 11, 2024 |
Progress LoadMaster 7.2.60.1 OS Command Injection via Improper Input ValidationImproper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.This issue affects: ?Product Affected Versions LoadMaster From 7.2.55.0 to 7.2.60.1 (inclusive) ? From 7.2.49.0 to 7.2.54.12 (inclusive) ? 7.2.48.12 and all prior versions Multi-Tenant Hypervisor 7.1.35.12 and all prior versions ECS All prior versions to 7.2.60.1 (inclusive) |
|
| CVE-2024-7840 | Oct 09, 2024 |
Progress Telerik Reporting: cmd inj before v18.2.24.924 via hyperlinkIn Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a command injection attack is possible through improper neutralization of hyperlink elements. |
|
| CVE-2024-7293 | Oct 09, 2024 |
Password Brute-Force on Telerik Report Server <=10.2.24.806 (Weak PW)In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), a password brute forcing attack is possible through weak password requirements. |
|
| CVE-2024-7292 | Oct 09, 2024 |
Progress Telerik Report Server <10.2.24.806: Excessive Logins -> Cred StuffingIn Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), a credential stuffing attack is possible through improper restriction of excessive login attempts. |
|
| CVE-2024-8048 | Oct 09, 2024 |
Telerik Reporting <18.2.24.924: Code Exec via ObjInje. (CVE-2024-8048)In Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a code execution attack is possible using object injection via insecure expression evaluation. |
|
| CVE-2024-8015 | Oct 09, 2024 |
RCE via Object Injection in Telerik Report Server <=10.2.24.924In Progress Telerik Report Server versions prior to 2024 Q3 (10.2.24.924), a remote code execution attack is possible through object injection via an insecure type resolution vulnerability. |
|
| CVE-2024-8014 | Oct 09, 2024 |
Telerik Reporting <18.2.24.924: Code Exec via Object InjectionIn Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a code execution attack is possible through object injection via an insecure type resolution vulnerability. |
|
| CVE-2024-7294 | Oct 09, 2024 |
DoS via UnrateLimEndpoints in Telerik Report Server <10.2.24.806In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), an HTTP DoS attack is possible on anonymous endpoints without rate limiting. |
|
| CVE-2024-7679 | Sep 25, 2024 |
Command Injection in Telerik UI for WinForms < 2024 Q3 via Hyperlink ElementsIn Progress Telerik UI for WinForms versions prior to 2024 Q3 (2024.3.924), a command injection attack is possible through improper neutralization of hyperlink elements. |
|
| CVE-2024-6658 | Sep 12, 2024 |
LoadMaster & ECS 7.x OS Command Injection via Authenticated Input (before 7.2.60)Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows OS Command Injection.This issue affects: ?Product Affected Versions LoadMaster From 7.2.55.0 to 7.2.60.0 (inclusive) ? From 7.2.49.0 to 7.2.54.11 (inclusive) ? 7.2.48.12 and all prior versions Multi-Tenant Hypervisor 7.1.35.11 and all prior versions ECS All prior versions to 7.2.60.0 (inclusive) |
|
| CVE-2024-7591 | Sep 05, 2024 |
Command Injection in Progress LoadMaster 7.2.40+ via Improper Input ValidationImproper Input Validation vulnerability in Progress LoadMaster allows OS Command Injection.This issue affects: * LoadMaster: 7.2.40.0 and above * ECS: All versions * Multi-Tenancy: 7.1.35.4 and above |
|