No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 27 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Feb 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:progress:telerik_ui_for_asp.net_ajax:*:*:*:*:*:*:*:* |
Thu, 26 Feb 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Progress
Progress telerik Ui For Asp.net Ajax |
|
| Vendors & Products |
Progress
Progress telerik Ui For Asp.net Ajax |
Wed, 25 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Progress® Telerik® UI for AJAX, versions prior to 2026.1.225, an insufficient entropy vulnerability exists in RadAsyncUpload, where a predictable temporary identifier, based on timestamp and filename, can enable collisions and file content tampering. | |
| Title | Insufficient Entropy Vulnerability in Telerik UI for ASP.NET AJAX | |
| Weaknesses | CWE-331 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2026-02-27T17:06:16.616Z
Reserved: 2026-02-20T16:20:51.770Z
Link: CVE-2026-2878
Updated: 2026-02-27T17:06:13.052Z
Status : Analyzed
Published: 2026-02-25T15:20:54.293
Modified: 2026-02-26T15:23:31.757
Link: CVE-2026-2878
No data.
OpenCVE Enrichment
Updated: 2026-02-26T13:16:02Z