[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26831 Download | Alert*

The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to properly handle the HTML descriptions in custom JSON schemas. Successful exploitation could allow attackers to cause local code execution.

The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to properly handle the workspace settings. Successful exploitation could allow attackers to cause local code execution.

The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to a HTML injection vulnerability. A flaw is present in the application, which fails to properly neutralize the special elements in output used by a downstream component. Successful exploitation could allow attackers to cause HTML injection into IDE messages.

The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to a reflected cross-site scripting vulnerability. A flaw is present in the application, which fails to properly neutralize the input during web page generation. Successful exploitation could allow attackers to cause reflected XSS via error messages in internal web server.

The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to an origin validation error vulnerability. A flaw is present in the application, which fails to properly handle an origin checks issue. Successful exploitation could allow attackers to tamper the origin checks in the internal web server.

The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to properly handle the links in quick documentation. Successful exploitation could allow attackers to cause local code execution.

The host is installed with JetBrains PhpStorm before 2023.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to add source code to debug logs.

The host is installed with vm2 before 3.9.15 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle issue in the sandbox protections. Successful exploitation could allow attackers to bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.

The host is installed with Docker Desktop 4.17.x and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the Artifactory Integration falling back to sending registry credentials over plain HTTP instead of HTTPS. Successful exploitation could allow attackers to perform a targeted network sniffing attack which can lead to a disclosure of s ...

The host is installed with 3CX DesktopApp 18.12.407 or 18.12.416 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an embedded malicious code. Successful exploitation could allow attackers to run a complex supply chain attack and pick who would be downloading the next stages of the malware.


Pages:      Start    1291    1292    1293    1294    1295    1296    1297    1298    1299    1300    1301    1302    1303    1304    ..   2683

© SecPod Technologies