[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195386 Download | Alert*

The host is installed with JetBrains IntelliJ IDEA before 2022.2.2 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle the installer. Successful exploitation could cause EXE search order hijacking.

The host is installed with JetBrains IntelliJ IDEA before 2022.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the built-in web server. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with JetBrains IntelliJ IDEA before 2022.3 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to handle the built-in web server. Successful exploitation allows an attacker to read arbitrary files.

The host is installed with JetBrains IntelliJ IDEA before 2022.3 and is prone to an XML External Entity (XXE) vulnerability. A flaw is present in the application, which fails to handle unspecified vector. Successful exploitation allows attackers to cause an XXE attack leading to SSRF via requests to custom plugin repositories was possible.

The host is installed with JetBrains IntelliJ IDEA before 2022.3.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle "Validate JSP File" action. Successful exploitation allows attackers to cause unspecified impact.

The host is installed with JetBrains IntelliJ IDEA before 2022.3.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle code templates. Successful exploitation allows attackers to cause SSTI attacks.

The host is installed with JetBrains PhpStorm before 2023.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to add source code to debug logs.

The host is installed with JetBrains PhpStorm before 2023.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to add source code to debug logs.

The host is installed with vm2 before 3.9.15 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issue in the sandbox protections. Successful exploitation could allow attackers to bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.

The host is installed with vm2 before 3.9.15 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issue in the sandbox protections. Successful exploitation could allow attackers to bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.


Pages:      Start    7951    7952    7953    7954    7955    7956    7957    7958    7959    7960    7961    7962    7963    7964    ..   19538

© SecPod Technologies