[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 9522 Download | Alert*

The host is installed with Jenkins LTS through 2.387.3 or Jenkins rolling through 2.399 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application, which fails to handle POST requests. Successful exploitation could allow attackers to trick a user into sending a POST request to an unexpected endpoint by opening a context menu.

In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.

The host is installed with JetBrains IntelliJ IDEA before 2022.3.1 and is prone to a cleartext storage of sensitive information vulnerability. A flaw is present in the application, which fails to properly handle the "Validate JSP File" action. Successful exploitation could allow attackers to download required JAR files using the HTTP protocol.

The host is installed with JetBrains IntelliJ IDEA before 2021.3.1 and is prone to a local code execution vulnerability. A flaw is present in the application, which fails to properly handle the RLO (right-to-left override) characters. Successful exploitation could allow attackers to execute code.

The host is installed with JetBrains IntelliJ IDEA before 2021.2.4 and is prone to a local code execution vulnerability. A flaw is present in the application, which fails to properly handle an issue when opening a project. Successful exploitation could allow attackers to execute code without the user's permission.

The host is installed with JetBrains IntelliJ IDEA before 2019.1 and is prone to a cleartext storage of sensitive information. A flaw is present in the application, which fails to properly handle a certain remote server configuration. Successful exploitation could allow attackers to cause cleartext storage of secrets.

The host is installed with JetBrains IntelliJ IDEA 2018.1.x and before 2018.1.8, 2018.2.x before 2018.2.8, 2018.3.x before 2018.3.5, or 2019.0.x before 2019.1 and is prone to a cleartext storage of sensitive information. A flaw is present in the application, which fails to properly handle a certain application server configuration. Successful exploitation could allow attackers to cause cleartext s ...

The host is installed with JetBrains IntelliJ IDEA 2018.1.x and before 2018.1.8, 2018.2.x before 2018.2.8, or 2018.3.x before 2018.3.5 and is prone to a cleartext storage of sensitive information. A flaw is present in the application, which fails to properly handle a certain application server configuration. Successful exploitation could allow attackers to cause cleartext storage of secrets.

The host is installed with JetBrains IntelliJ IDEA 2018.3 before 2018.3.4, or 2019.0.x before 2019.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a Spring Boot run configuration with the default setting. Successful exploitation allows remote attackers to execute code when the configuration is running.

The host is installed with JetBrains IntelliJ IDEA before 2019.2 and is prone to a local user privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to cause arbitrary code execution.


Pages:      Start    332    333    334    335    336    337    338    339    340    341    342    343    344    345    ..   952

© SecPod Technologies