CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
In JetBrains YouTrack before 2020.4.6808, the YouTrack administrator wasn't able to access attachments. |
In JetBrains YouTrack before 2020.4.4701, permissions for attachments actions were checked improperly. |
In JetBrains YouTrack before 2020.6.1767, an issue's existence could be disclosed via YouTrack command execution. |
In JetBrains YouTrack before 2020.4.4701, improper resource access checks were made. |
In JetBrains YouTrack before 2020.4.4701, CSRF via attachment upload was possible. |
In JetBrains PhpStorm before 2020.3, source code could be added to debug logs. |
In JetBrains Ktor before 1.4.2, weak cipher suites were enabled by default. |
In JetBrains Ktor before 1.4.3, HTTP Request Smuggling was possible. |
In JetBrains Ktor before 1.5.0, a birthday attack on SessionStorage key was possible. |
In JetBrains Hub before 2020.1.12669, information disclosure via the public API was possible. |
In JetBrains Hub before 2020.1.12629, an authenticated user can delete 2FA settings of any other user. |
In JetBrains IntelliJ IDEA before 2020.3, potentially insecure deserialization of the workspace model could lead to local code execution. |
In JetBrains Hub before 2020.1.12629, an open redirect was possible. |
In JetBrains IntelliJ IDEA before 2020.2, HTTP links were used for several remote repositories instead of HTTPS. |
In JetBrains Code With Me before 2020.3, an attacker on the local network, knowing a session ID, could get access to the encrypted traffic. |
In JetBrains IntelliJ IDEA 2019.2, an XSLT debugger plugin misconfiguration allows arbitrary file read operations over the network. This issue was fixed in 2019.3. |
JetBrains YouTrack 2019.2 before 2019.2.59309 was vulnerable to XSS via an issue description. |
In JetBrains YouTrack before 2019.2.59309, SMTP/Jabber settings could be accessed using backups. |
In JetBrains TeamCity before 2019.2, several user-level pages were vulnerable to XSS. |
JetBrains TeamCity before 2019.2 was vulnerable to a stored XSS attack by a user with the developer role. |