The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to properly handle the HTML descriptions in custom JSON schemas. Successful exploitation could allow attackers to cause local code execution.
The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to properly handle a custom pandoc path. Successful exploitation could allow attackers to cause local code execution.
The host is installed with JetBrains IntelliJ IDEA before 2022.1 and is prone to an improper handling of unicode encoding vulnerability. A flaw is present in the application, which fails to properly handle a notification mechanism issue. Successful exploitation could allow attackers to trick the app to send insufficient notification about using unicode directionality formatting characters.
The host is installed with JetBrains IntelliJ IDEA before 2021.3.3 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to protect credentials. Successful exploitation could allow attackers to get passwords from protected fields.
The host is installed with JetBrains IntelliJ IDEA before 2021.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unbounded resource allocation. Successful exploitation could allow attackers to .
The host is installed with JetBrains IntelliJ IDEA before 2020.3.3 and is prone to an XML external entity vulnerability vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to obtain sensitive information.
The host is installed with JetBrains IntelliJ IDEA 2020.3.3 and is prone to arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle insufficient checks. On successful exploitation, local code execution could be possible because of insufficient checks when getting the project from VCS.
The host is installed with JetBrains IntelliJ IDEA before 2020.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle potentially insecure de-serialization of the workspace model. Successful exploitation could allow attackers to cause local code execution.
The host is installed with JetBrains IntelliJ IDEA before 2020.2 and is prone to an improper authentication vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. On successful exploitation, HTTP links could be used for several remote repositories instead of HTTPS.
The host is installed with JetBrains IntelliJ IDEA 2019.2 and is prone to an arbitrary file read vulnerability. A flaw is present in the application, which fails to handle an XSLT debugger plugin misconfiguration. Successful exploitation could allow attackers to perform arbitrary file read operations over the network.