Download
| Alert*
oval:org.secpod.oval:def:74615
JetBrains IntelliJ IDEA is installed oval:org.secpod.oval:def:99525 The host is installed with JetBrains IntelliJ IDEA before 2022.3.1 and is prone to a cleartext storage of sensitive information vulnerability. A flaw is present in the application, which fails to properly handle the "Validate JSP File" action. Successful exploitation could allow attackers to downloa ... oval:org.secpod.oval:def:99516 The host is installed with JetBrains IntelliJ IDEA 2018.1.x and before 2018.1.8, 2018.2.x before 2018.2.8, 2018.3.x before 2018.3.4, or 2018.3.5 before 2018.3.7 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle the run configu ... oval:org.secpod.oval:def:99519 The host is installed with JetBrains IntelliJ IDEA 2018.3 before 2018.3.4, or 2019.0.x before 2019.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a Spring Boot run configuration with the default setting. Successful ex ... oval:org.secpod.oval:def:99520 The host is installed with JetBrains IntelliJ IDEA 2018.1.x and before 2018.1.8, 2018.2.x before 2018.2.8, or 2018.3.x before 2018.3.5 and is prone to a cleartext storage of sensitive information. A flaw is present in the application, which fails to properly handle a certain application server confi ... oval:org.secpod.oval:def:99521 The host is installed with JetBrains IntelliJ IDEA 2018.1.x and before 2018.1.8, 2018.2.x before 2018.2.8, 2018.3.x before 2018.3.5, or 2019.0.x before 2019.1 and is prone to a cleartext storage of sensitive information. A flaw is present in the application, which fails to properly handle a certain ... oval:org.secpod.oval:def:82373 The host is installed with JetBrains IntelliJ IDEA before 2021.3.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to protect credentials. Successful exploitation could allow attackers to get passwords from protected fields. oval:org.secpod.oval:def:82374 The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to an improper handling of unicode encoding vulnerability. A flaw is present in the application, which fails to properly handle a notification mechanism issue. Successful exploitation could allow attackers to trick the app ... oval:org.secpod.oval:def:82375 The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to properly handle a custom pandoc path. Successful exploitation could allow attackers to cause local code execution. oval:org.secpod.oval:def:82376 The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to properly handle the HTML descriptions in custom JSON schemas. Successful exploitation could allow attackers to cause local code execut ... oval:org.secpod.oval:def:82377 The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to properly handle the workspace settings. Successful exploitation could allow attackers to cause local code execution. oval:org.secpod.oval:def:82378 The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to a HTML injection vulnerability. A flaw is present in the application, which fails to properly neutralize the special elements in output used by a downstream component. Successful exploitation could allow attackers to ca ... oval:org.secpod.oval:def:82379 The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to a reflected cross-site scripting vulnerability. A flaw is present in the application, which fails to properly neutralize the input during web page generation. Successful exploitation could allow attackers to cause refle ... oval:org.secpod.oval:def:82380 The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to an origin validation error vulnerability. A flaw is present in the application, which fails to properly handle an origin checks issue. Successful exploitation could allow attackers to tamper the origin checks in the int ... oval:org.secpod.oval:def:82381 The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to properly handle the links in quick documentation. Successful exploitation could allow attackers to cause local code execution. oval:org.secpod.oval:def:84634 The host is installed with JetBrains IntelliJ IDEA before 2022.2 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to properly handle issues in Vagrant executables. Successful exploitation could allow attackers to cause local code execution. oval:org.secpod.oval:def:84635 The host is installed with JetBrains IntelliJ IDEA before 2022.2 and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to properly validate email address. Successful exploitation could allow attackers to cause unspecified impact. oval:org.secpod.oval:def:88809 The host is installed with JetBrains IntelliJ IDEA before 2023.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. On successful exploitation, file content could be disclosed via an external st ... oval:org.secpod.oval:def:88810 The host is installed with JetBrains IntelliJ IDEA before 2023.1 and is prone to an insufficient verification of data authenticity vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. On successful exploitation, in some cases, Gradle and ... oval:org.secpod.oval:def:88811 The host is installed with JetBrains IntelliJ IDEA before 2023.1 and is prone to an insecure default initialization of resource vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. On successful exploitation, the bundled version of Chromi ... oval:org.secpod.oval:def:88812 The host is installed with JetBrains IntelliJ IDEA before 2023.1 and is prone to an insufficiently protected credentials vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. On successful exploitation, the NTLM hash could leak through an ... oval:org.secpod.oval:def:99517 The host is installed with JetBrains IntelliJ IDEA before 2019.2 and is prone to an MITM attack vulnerability. A flaw is present in the application, which fails to properly handle a cleartext http connection. Successful exploitation could allow attackers to cause an MITM attack. oval:org.secpod.oval:def:99518 The host is installed with JetBrains IntelliJ IDEA before 2019.2 and is prone to a local user privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to cause arbitrary code execution. oval:org.secpod.oval:def:99522 The host is installed with JetBrains IntelliJ IDEA before 2019.1 and is prone to a cleartext storage of sensitive information. A flaw is present in the application, which fails to properly handle a certain remote server configuration. Successful exploitation could allow attackers to cause cleartext ... oval:org.secpod.oval:def:99523 The host is installed with JetBrains IntelliJ IDEA before 2021.2.4 and is prone to a local code execution vulnerability. A flaw is present in the application, which fails to properly handle an issue when opening a project. Successful exploitation could allow attackers to execute code without the use ... oval:org.secpod.oval:def:99524 The host is installed with JetBrains IntelliJ IDEA before 2021.3.1 and is prone to a local code execution vulnerability. A flaw is present in the application, which fails to properly handle the RLO (right-to-left override) characters. Successful exploitation could allow attackers to execute code. |