The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Telerik UI for ASP.NET AJAX

jQuery Core: Cross Site Scripting via HtmlPrefilter Regex
An attacker can trigger a Cross Site Scripting via HtmlPrefilter Regex of jQuery Core, in order to run JavaScript code in the context of the web site...
20200601, 20200602, 20200603, 20200604, 20200605, 6217392, 6253319, 6344075, 6367943, CERTFR-2020-AVI-310, CERTFR-2020-AVI-335, CERTFR-2020-AVI-797, cpujan2021, cpujul2020, cpuoct2020, CVE-2020-11022, CVE-2020-11023, DRUPAL-SA-CORE-2020-002, DRUPAL-SA-CORE-2020-003, DSA-2020-262, DSA-2020-270, DSA-4693-1, FEDORA-2020-0b32a59b54, FEDORA-2020-11be4b36d4, FEDORA-2020-7dddce530c, FEDORA-2020-8a15713da2, FEDORA-2020-fbb94073a1, K02453220, K66544153, KM03758436, NPM-1518, openSUSE-SU-2020:1060-1, openSUSE-SU-2020:1106-1, openSUSE-SU-2020:1888-1, OSA-2020-14, RHSA-2020:3936-01, RHSA-2020:4670-01, RHSA-2020:4847-01, TNS-2020-10, VIGILANCE-VUL-32007
Telerik UI for ASP.NET AJAX: read-write access via RadChart
An attacker can bypass access restrictions via RadChart of Telerik UI for ASP.NET AJAX, in order to read or alter data...
CVE-2019-19790, VIGILANCE-VUL-31162
Telerik UI for ASP.NET AJAX: code execution via RadAsyncUpload JavaScriptSerializer Deserialization
An attacker can use a vulnerability via RadAsyncUpload JavaScriptSerializer Deserialization of Telerik UI for ASP.NET AJAX, in order to run code...
CVE-2019-18935, VIGILANCE-VUL-31141
jQuery Core: privilege escalation via Object.prototype Pollution
An attacker can bypass restrictions via Object.prototype Pollution of jQuery Core, in order to escalate his privileges...
bulletinoct2019, cpuapr2020, cpujan2020, cpujul2019, cpujul2020, cpuoct2019, cpuoct2020, CST-7312, CVE-2019-11358, DLA-1797-1, DLA-2118-1, DRUPAL-SA-CORE-2019-005, DRUPAL-SA-CORE-2019-006, DSA-4460-1, EZSA-2019-005, FEDORA-2019-2a0ce0c58c, FEDORA-2019-a06dffab1c, FEDORA-2019-f563e66380, NTAP-20190919-0001, openSUSE-SU-2019:1839-1, openSUSE-SU-2019:1872-1, RHSA-2019:1456-01, RHSA-2020:3936-01, RHSA-2020:4670-01, RHSA-2020:4847-01, SA44601, Synology-SA-19:19, VIGILANCE-VUL-29030
Telerik Extensions for ASP.NET MVC: file reading
A local attacker can read a file of Telerik Extensions for ASP.NET MVC, in order to obtain sensitive information...
CVE-2018-17060, VIGILANCE-VUL-27444
Telerik UI for ASP.NET AJAX: vulnerability via FileExplorer
A vulnerability via FileExplorer of Telerik UI for ASP.NET AJAX was announced...
VIGILANCE-VUL-25106
Telerik UI for ASP.NET AJAX: file upload via Direct Object Reference
An attacker can upload a malicious file via RadAsyncUpload on Telerik UI for ASP.NET AJAX, in order for example to upload a Trojan...
CVE-2017-11357, VIGILANCE-VUL-23607
Telerik UI for ASP.NET AJAX: file upload via RadAsyncUpload
An attacker can upload a malicious file on Telerik UI for ASP.NET AJAX, in order for example to upload a Trojan...
CVE-2017-11317, VIGILANCE-VUL-23606
Telerik UI for ASP.NET AJAX: cryptographic keys disclosure
An attacker can exploit a misuse of cryptographic tools in Telerik UI for ASP.NET AJAX, in order to get secret keys...
CVE-2017-9248, VIGILANCE-VUL-23127, VU#838200
Our database contains other pages. You can request a free trial to read them.

Display information about Telerik UI for ASP.NET AJAX: