
CVE-2024-0832 – Privilege Elevation via Telerik Reporting Installer
https://notcve.org/view.php?id=CVE-2024-0832
31 Jan 2024 — In Telerik Reporting versions prior to 2024 R1, a privilege elevation vulnerability has been identified in the applications installer component. In an environment where an existing Telerik Reporting install is present, a lower privileged user has the ability to manipulate the installation package to elevate their privileges on the underlying operating system. En las versiones de Telerik Reporting anteriores a 2024 R1, se identificó una vulnerabilidad de elevación de privilegios en el componente del instalad... • https://docs.telerik.com/reporting/knowledge-base/legacy-installer-vulnerability • CWE-269: Improper Privilege Management •

CVE-2024-0219 – Privilege Elevation via Telerik JustDecompile Installer
https://notcve.org/view.php?id=CVE-2024-0219
31 Jan 2024 — In Telerik JustDecompile versions prior to 2024 R1, a privilege elevation vulnerability has been identified in the applications installer component. In an environment where an existing Telerik JustDecompile install is present, a lower privileged user has the ability to manipulate the installation package to elevate their privileges on the underlying operating system. En las versiones de Telerik JustDecompile anteriores a 2024 R1, se identificó una vulnerabilidad de elevación de privilegios en el componente ... • https://docs.telerik.com/devtools/justdecompile/knowledge-base/legacy-installer-vulnerability • CWE-269: Improper Privilege Management •

CVE-2023-40052 – Progress Application Server (PAS) for OpenEdge Denial of Service
https://notcve.org/view.php?id=CVE-2023-40052
18 Jan 2024 — This issue affects Progress Application Server (PAS) for OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0 . An attacker who can produce a malformed web request may cause the crash of a PASOE agent potentially disrupting the thread activities of many web application clients. Multiple of these DoS attacks could lead to the flooding of invalid requests as compared to the server’s remaining ability to process valid requests. Este problema afecta a Progre... • https://community.progress.com/s/article/Important-Progress-OpenEdge-Product-Alert-for-Progress-Application-Server-for-OpenEdge-PASOE-Denial-of-Service-Vulnerability-in-WEB-Transport • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2023-40051 – Progress Application Server (PAS) for OpenEdge File Upload via Directory Traversal
https://notcve.org/view.php?id=CVE-2023-40051
18 Jan 2024 — This issue affects Progress Application Server (PAS) for OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0. An attacker can formulate a request for a WEB transport that allows unintended file uploads to a server directory path on the system running PASOE. If the upload contains a payload that can further exploit the server or its network, the launch of a larger scale attack may be possible. Este problema afecta a Progress Application Server (PAS) para... • https://community.progress.com/s/article/Important-Progress-OpenEdge-Critical-Alert-for-Progress-Application-Server-in-OpenEdge-PASOE-Arbitrary-File-Upload-Vulnerability-in-WEB-Transport • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2024-0396 – Missing Server-Side Input Validation in HTTP Parameter
https://notcve.org/view.php?id=CVE-2024-0396
17 Jan 2024 — In Progress MOVEit Transfer versions released before 2022.0.10 (14.0.10), 2022.1.11 (14.1.11), 2023.0.8 (15.0.8), 2023.1.3 (15.1.3), an input validation issue was discovered. An authenticated user can manipulate a parameter in an HTTPS transaction. The modified transaction could lead to computational errors within MOVEit Transfer and potentially result in a denial of service. En las versiones de Progress MOVEit Transfer lanzadas antes de 2022.0.10 (14.0.10), 2022.1.11 (14.1.11), 2023.0.8 (15.0.8), 2023.1.3 ... • https://community.progress.com/s/article/MOVEit-Transfer-Service-Pack-January-2024 • CWE-20: Improper Input Validation •

CVE-2023-6784 – Potential Use of the Sitefinity System for Distribution of Phishing Emails
https://notcve.org/view.php?id=CVE-2023-6784
20 Dec 2023 — A malicious user could potentially use the Sitefinity system for the distribution of phishing emails. Un usuario malintencionado podría utilizar el sistema Sitefinity para la distribución de correos electrónicos de phishing. • https://community.progress.com/s/article/Sitefinity-Security-Advisory-for-Addressing-Security-Vulnerability-CVE-2023-6784-December-2023 • CWE-20: Improper Input Validation •

CVE-2023-6368 – WhatsUp Gold Unauthenticated Access to an API Endpoint
https://notcve.org/view.php?id=CVE-2023-6368
14 Dec 2023 — In WhatsUp Gold versions released before 2023.1, an API endpoint was found to be missing an authentication mechanism. It is possible for an unauthenticated attacker to enumerate information related to a registered device being monitored by WhatsUp Gold. En las versiones de WhatsUp Gold lanzadas antes de 2023.1, se descubrió que a un endpoint de API le faltaba un mecanismo de autenticación. Es posible que un atacante no autenticado enumere información relacionada con un dispositivo registrado que está siendo... • https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-December-2023 • CWE-306: Missing Authentication for Critical Function CWE-862: Missing Authorization •

CVE-2023-6595 – WhatsUp Gold Unauthenticated Access to an API Endpoint
https://notcve.org/view.php?id=CVE-2023-6595
14 Dec 2023 — In WhatsUp Gold versions released before 2023.1, an API endpoint was found to be missing an authentication mechanism. It is possible for an unauthenticated attacker to enumerate ancillary credential information stored within WhatsUp Gold. En las versiones de WhatsUp Gold lanzadas antes de 2023.1, se descubrió que a un endpoint de API le faltaba un mecanismo de autenticación. Es posible que un atacante no autenticado enumere información de credenciales auxiliares almacenada en WhatsUp Gold. • https://github.com/sharmashreejaa/CVE-2023-6595 • CWE-306: Missing Authentication for Critical Function CWE-862: Missing Authorization •

CVE-2023-6367 – WhatsUp Gold Stored Cross-Site Scripting (XSS) via Roles
https://notcve.org/view.php?id=CVE-2023-6367
14 Dec 2023 — In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within Roles. If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser. En las versiones de WhatsUp Gold lanzadas antes de la 2023.1, se identificó una vulnerabilidad de Cross-Site Scripting (XSS) almacenadas. Es p... • https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-December-2023 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-6366 – WhatsUp Gold Stored Cross-Site Scripting (XSS) via Alert Center
https://notcve.org/view.php?id=CVE-2023-6366
14 Dec 2023 — In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within Alert Center. If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser. En las versiones de WhatsUp Gold lanzadas antes de la 2023.1, se identificó una vulnerabilidad de Cross-Site Scripting (XSS) almacenada... • https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-December-2023 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •