Progress Telerik Ui For Asp Net Ajax
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Progress Telerik Ui For Asp Net Ajax.
By the Year
In 2026 there have been 0 vulnerabilities in Progress Telerik Ui For Asp Net Ajax. Last year, in 2025 Telerik Ui For Asp Net Ajax had 1 security vulnerability published. Right now, Telerik Ui For Asp Net Ajax is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 1 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 0 | 0.00 |
| 2022 | 0 | 0.00 |
| 2021 | 1 | 9.80 |
| 2020 | 0 | 0.00 |
| 2019 | 1 | 0.00 |
It may take a day or so for new Telerik Ui For Asp Net Ajax vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Progress Telerik Ui For Asp Net Ajax Security Vulnerabilities
Unsafe Reflection in Telerik UI for AJAX v2011.2.712–2025.1.218 – DoS Crash
CVE-2025-3600
- May 14, 2025
In Progress® Telerik® UI for AJAX, versions 2011.2.712 to 2025.1.218, an unsafe reflection vulnerability exists that may lead to an unhandled exception resulting in a crash of the hosting process and denial of service.
An issue was discovered in Progress Telerik UI for ASP.NET AJAX 2021.1.224
CVE-2021-28141
9.8 - Critical
- March 11, 2021
An issue was discovered in Progress Telerik UI for ASP.NET AJAX 2021.1.224. It allows unauthorized access to MicrosoftAjax.js through the Telerik.Web.UI.WebResource.axd file. This may allow the attacker to gain unauthorized access to the server and execute code. To exploit, one must use the parameter _TSM_HiddenField_ and inject a command at the end of the URI. NOTE: the vendor states that this is not a vulnerability. The request's output does not indicate that a "true" command was executed on the server, and the request's output does not leak any private source code or data from the server
AuthZ
Path traversal in RadChart in Telerik UI for ASP.NET AJAX
CVE-2019-19790
- December 13, 2019
Path traversal in RadChart in Telerik UI for ASP.NET AJAX allows a remote attacker to read and delete an image with extension .BMP, .EXIF, .GIF, .ICON, .JPEG, .PNG, .TIFF, or .WMF on the server through a specially crafted request. NOTE: RadChart was discontinued in 2014 in favor of RadHtmlChart. All RadChart versions were affected. To avoid this vulnerability, you must remove RadChart's HTTP handler from a web.config (its type is Telerik.Web.UI.ChartHttpHandler).
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Progress Telerik Ui For Asp Net Ajax or by Progress? Click the Watch button to subscribe.