[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

423868

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31456 Download | Alert*

The host is installed with JetBrains IntelliJ IDEA 2019.2 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to handle an XSLT debugger plugin misconfiguration. Successful exploitation could allow attackers to perform arbitrary file read operations over the network.

The host is installed with JetBrains IntelliJ IDEA before 2020.2 and is prone to an improper authentication vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. On successful exploitation, HTTP links could be used for several remote repositories instead of HTTPS.

The host is installed with JetBrains IntelliJ IDEA before 2020.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle potentially insecure de-serialization of the workspace model. Successful exploitation could allow attackers to cause local code execution.

The host is installed with JetBrains IntelliJ IDEA 2020.3.3 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle insufficient checks. On successful exploitation, local code execution could be possible because of insufficient checks when getting the project from VCS.

The host is installed with JetBrains IntelliJ IDEA before 2020.3.3 and is prone to an XML external entity vulnerability vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with JetBrains IntelliJ IDEA before 2021.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unbounded resource allocation. Successful exploitation could allow attackers to .

The host is installed with JetBrains IntelliJ IDEA before 2021.3.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to protect credentials. Successful exploitation could allow attackers to get passwords from protected fields.

The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to an improper handling of unicode encoding vulnerability. A flaw is present in the application, which fails to properly handle a notification mechanism issue. Successful exploitation could allow attackers to trick the app to send insufficient notification about using unicode directionality formatting characters.

The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to properly handle a custom pandoc path. Successful exploitation could allow attackers to cause local code execution.

The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to properly handle the HTML descriptions in custom JSON schemas. Successful exploitation could allow attackers to cause local code execution.


Pages:      Start    1586    1587    1588    1589    1590    1591    1592    1593    1594    1595    1596    1597    1598    1599    ..   3145

© SecPod Technologies