[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 9274 Download | Alert*

In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.

The host is installed with JetBrains IntelliJ IDEA before 2022.3.1 and is prone to a cleartext storage of sensitive information vulnerability. A flaw is present in the application, which fails to properly handle the "Validate JSP File" action. Successful exploitation could allow attackers to download required JAR files using the HTTP protocol.

The host is installed with JetBrains IntelliJ IDEA before 2021.3.1 and is prone to a local code execution vulnerability. A flaw is present in the application, which fails to properly handle the RLO (right-to-left override) characters. Successful exploitation could allow attackers to execute code.

The host is installed with JetBrains IntelliJ IDEA before 2021.2.4 and is prone to a local code execution vulnerability. A flaw is present in the application, which fails to properly handle an issue when opening a project. Successful exploitation could allow attackers to execute code without the user's permission.

The host is installed with JetBrains IntelliJ IDEA before 2019.1 and is prone to a cleartext storage of sensitive information. A flaw is present in the application, which fails to properly handle a certain remote server configuration. Successful exploitation could allow attackers to cause cleartext storage of secrets.

The host is installed with JetBrains IntelliJ IDEA 2018.1.x and before 2018.1.8, 2018.2.x before 2018.2.8, 2018.3.x before 2018.3.5, or 2019.0.x before 2019.1 and is prone to a cleartext storage of sensitive information. A flaw is present in the application, which fails to properly handle a certain application server configuration. Successful exploitation could allow attackers to cause cleartext s ...

The host is installed with JetBrains IntelliJ IDEA 2018.1.x and before 2018.1.8, 2018.2.x before 2018.2.8, or 2018.3.x before 2018.3.5 and is prone to a cleartext storage of sensitive information. A flaw is present in the application, which fails to properly handle a certain application server configuration. Successful exploitation could allow attackers to cause cleartext storage of secrets.

The host is installed with JetBrains IntelliJ IDEA 2018.3 before 2018.3.4, or 2019.0.x before 2019.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a Spring Boot run configuration with the default setting. Successful exploitation allows remote attackers to execute code when the configuration is running.

The host is installed with JetBrains IntelliJ IDEA before 2019.2 and is prone to a local user privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to cause arbitrary code execution.

The host is installed with JetBrains IntelliJ IDEA before 2019.2 and is prone to an MITM attack vulnerability. A flaw is present in the application, which fails to properly handle a cleartext http connection. Successful exploitation could allow attackers to cause an MITM attack.


Pages:      Start    248    249    250    251    252    253    254    255    256    257    258    259    260    261    ..   927

© SecPod Technologies