[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254802

 
 

909

 
 

198617

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 7916 Download | Alert*

The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to properly handle the HTML descriptions in custom JSON schemas. Successful exploitation could allow attackers to cause local code execution.

The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to properly handle a custom pandoc path. Successful exploitation could allow attackers to cause local code execution.

The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to an improper handling of unicode encoding vulnerability. A flaw is present in the application, which fails to properly handle a notification mechanism issue. Successful exploitation could allow attackers to trick the app to send insufficient notification about using unicode directionality formatting characters.

The host is installed with JetBrains IntelliJ IDEA before 2021.3.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to protect credentials. Successful exploitation could allow attackers to get passwords from protected fields.

The host is installed with JetBrains IntelliJ IDEA before 2021.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unbounded resource allocation. Successful exploitation could allow attackers to .

The host is installed with JetBrains IntelliJ IDEA before 2020.3.3 and is prone to an XML external entity vulnerability vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to obtain sensitive information.

The host is installed with JetBrains IntelliJ IDEA 2020.3.3 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle insufficient checks. On successful exploitation, local code execution could be possible because of insufficient checks when getting the project from VCS.

The host is installed with JetBrains IntelliJ IDEA before 2020.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle potentially insecure de-serialization of the workspace model. Successful exploitation could allow attackers to cause local code execution.

The host is installed with JetBrains IntelliJ IDEA before 2020.2 and is prone to an improper authentication vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. On successful exploitation, HTTP links could be used for several remote repositories instead of HTTPS.

The host is installed with JetBrains IntelliJ IDEA 2019.2 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to handle an XSLT debugger plugin misconfiguration. Successful exploitation could allow attackers to perform arbitrary file read operations over the network.


Pages:      Start    732    733    734    735    736    737    738    739    740    741    742    743    744    745    ..   791

© SecPod Technologies