CVE-2015-2264
https://notcve.org/view.php?id=CVE-2015-2264
Multiple untrusted search path vulnerabilities in (1) EQATEC.Analytics.Monitor.Win32_vc100.dll and (2) EQATEC.Analytics.Monitor.Win32_vc100-x64.dll in Telerik Analytics Monitor Library before 3.2.125 allow local users to gain privileges via a Trojan horse (a) csunsapi.dll, (b) swift.dll, (c) nfhwcrhk.dll, or (d) surewarehook.dll file in an unspecified directory. Múltiples vulnerabilidades de ruta de búsqueda no confiable en (1) EQATEC.Analytics.Monitor.Win32_vc100.dll y (2) EQATEC.Analytics.Monitor.Win32_vc100-x64.dll en Telerik Analytics Monitor Library anterior a 3.2.125 permiten a usuarios locales ganar privilegios a través de un fichero (a) csunsapi.dll, (b) swift.dll, (c) nfhwcrhk.dll, o (d) surewarehook.dll troyano en un directorio no especificado. • http://www.kb.cert.org/vuls/id/794095 •
CVE-2014-2217
https://notcve.org/view.php?id=CVE-2014-2217
Absolute path traversal vulnerability in the RadAsyncUpload control in the RadControls in Telerik UI for ASP.NET AJAX before Q3 2012 SP2 allows remote attackers to write to arbitrary files, and consequently execute arbitrary code, via a full pathname in the UploadID metadata value. Vulnerabilidad de salto en las rutas absolutas en el control RadAsyncUpload en RadControls en Telerik UI de ASP.NET AJAX anterior a Q3 2012 SP2 permite a atacantes remotos escribir en archivos arbitrarios, y consecuentemente ejecutar código arbitrario, a través del nombre de ruta completo en el valor del metadato UploadID • http://itq.nl/arbitrary-file-write-in-telerik-ui-for-asp-net-ajax • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2014-4958
https://notcve.org/view.php?id=CVE-2014-4958
Cross-site scripting (XSS) vulnerability in Telerik UI for ASP.NET AJAX RadEditor control 2014.1.403.35, 2009.3.1208.20, and other versions allows remote attackers to inject arbitrary web script or HTML via CSS expressions in style attributes. Vulnerabilidad de XSS en Telerik UI para ASP.NET AJAX RadEditor control 2014.1.403.35, 2009.3.1208.20 y otras versiones permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de expresiones CCS en atributos de estilo. • http://blogs.telerik.com/blogs/14-09-24/securing-radeditor-content-and-preventing-xss-attacks http://maverickblogging.com/disclosing-cve-2014-4958-stored-attribute-based-cross-site-scripting-xss-vulnerability-in-telerik-ui-for-asp-net-ajax-radeditor-control http://packetstormsecurity.com/files/128414/Telerik-ASP.NET-AJAX-RadEditor-Control-2014.1.403.35-XSS.html http://www.securityfocus.com/archive/1/533537/30/0/threaded • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •