In Progress® Telerik® Reporting versions prior to 18.1.24.709, a code execution attack is possible through object injection via an insecure type resolution vulnerability.
References
Configurations
History
25 Apr 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Nov 2024, 09:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.telerik.com/reporting/knowledge-base/unsafe-reflection-CVE-2024-6096 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
26 Jul 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
First Time |
Progress
Progress telerik Reporting |
|
CPE | cpe:2.3:a:progress:telerik_reporting:*:*:*:*:*:*:*:* | |
References | () https://docs.telerik.com/reporting/knowledge-base/unsafe-reflection-CVE-2024-6096 - Vendor Advisory | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
24 Jul 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-24 14:15
Updated : 2025-04-25 23:15
NVD link : CVE-2024-6096
Mitre link : CVE-2024-6096
CVE.ORG link : CVE-2024-6096
JSON object : View
Products Affected
progress
- telerik_reporting
CWE
CWE-470
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')