Telerik Ui For Asp Net Ajax Progress Telerik Ui For Asp Net Ajax

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Progress Telerik Ui For Asp Net Ajax.

By the Year

In 2026 there have been 0 vulnerabilities in Progress Telerik Ui For Asp Net Ajax. Last year, in 2025 Telerik Ui For Asp Net Ajax had 1 security vulnerability published. Right now, Telerik Ui For Asp Net Ajax is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 1 0.00
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 1 9.80
2020 0 0.00
2019 1 0.00

It may take a day or so for new Telerik Ui For Asp Net Ajax vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Progress Telerik Ui For Asp Net Ajax Security Vulnerabilities

Unsafe Reflection in Telerik UI for AJAX v2011.2.712–2025.1.218 – DoS Crash
CVE-2025-3600 - May 14, 2025

In Progress® Telerik® UI for AJAX, versions 2011.2.712 to 2025.1.218, an unsafe reflection vulnerability exists that may lead to an unhandled exception resulting in a crash of the hosting process and denial of service.

An issue was discovered in Progress Telerik UI for ASP.NET AJAX 2021.1.224
CVE-2021-28141 9.8 - Critical - March 11, 2021

An issue was discovered in Progress Telerik UI for ASP.NET AJAX 2021.1.224. It allows unauthorized access to MicrosoftAjax.js through the Telerik.Web.UI.WebResource.axd file. This may allow the attacker to gain unauthorized access to the server and execute code. To exploit, one must use the parameter _TSM_HiddenField_ and inject a command at the end of the URI. NOTE: the vendor states that this is not a vulnerability. The request's output does not indicate that a "true" command was executed on the server, and the request's output does not leak any private source code or data from the server

AuthZ

Path traversal in RadChart in Telerik UI for ASP.NET AJAX
CVE-2019-19790 - December 13, 2019

Path traversal in RadChart in Telerik UI for ASP.NET AJAX allows a remote attacker to read and delete an image with extension .BMP, .EXIF, .GIF, .ICON, .JPEG, .PNG, .TIFF, or .WMF on the server through a specially crafted request. NOTE: RadChart was discontinued in 2014 in favor of RadHtmlChart. All RadChart versions were affected. To avoid this vulnerability, you must remove RadChart's HTTP handler from a web.config (its type is Telerik.Web.UI.ChartHttpHandler).

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Progress Telerik Ui For Asp Net Ajax or by Progress? Click the Watch button to subscribe.

Progress
Vendor

subscribe