CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
In JetBrains TeamCity 2018.2 through 2019.2.1, a project administrator was able to see scrambled password parameters used in a project. The issue was resolved in 2019.2.2. |
In JetBrains Space through 2020-04-22, the password authentication implementation was insecure. |
In JetBrains Space through 2020-04-22, the session timeout period was configured improperly. |
In JetBrains PyCharm 2019.2.5 and 2019.3 on Windows, Apple Notarization Service credentials were included. This is fixed in 2019.2.6 and 2019.3.3. |
JetBrains YouTrack before 2020.1.659 was vulnerable to DoS that could be caused by attaching a malformed TIFF file to an issue. |
In JetBrains YouTrack before 2020.1.659, DB export was accessible to read-only administrators. |
In JetBrains Hub before 2020.1.12099, content spoofing in the Hub OAuth error message was possible. |
In JetBrains IntelliJ IDEA before 2020.1, the license server could be resolved to an untrusted host in some cases. |
In JetBrains TeamCity before 2019.2.1, a user without appropriate permissions was able to import settings from the settings.kts file. |
In JetBrains TeamCity before 2019.2.1, the application state is kept alive after a user ends his session. |
In JetBrains TeamCity before 2019.2.2, password values were shown in an unmasked format on several pages. |
In JetBrains TeamCity before 2019.1.4, a project administrator was able to retrieve some TeamCity server settings. |
In JetBrains GoLand before 2019.3.2, the plugin repository was accessed via HTTP instead of HTTPS. |
JetBrains Space through 2020-04-22 allows stored XSS in Chats. |
In several versions of JetBrains IntelliJ IDEA Ultimate, creating Task Servers configurations leads to saving a cleartext unencrypted record of the server credentials in the IDE configuration files. The issue has been fixed in the following versions: 2019.1, 2018.3.5, 2018.2.8, and 2018.1.8. |
In several versions of JetBrains IntelliJ IDEA Ultimate, creating run configurations for cloud application servers leads to saving a cleartext unencrypted record of the server credentials in the IDE configuration files. If the Settings Repository plugin was then used and configured to synchronize IDE settings using a public repository, these credentials were published to this repository. The issue has been fixed in the following versions: 2019.1, 2018.3.5, 2018.2.8, and 2018.1.8. |
In several JetBrains IntelliJ IDEA versions, creating remote run configurations of JavaEE application servers leads to saving a cleartext record of the server credentials in the IDE configuration files. The issue has been fixed in the following versions: 2018.3.5, 2018.2.8, 2018.1.8. |
In several JetBrains IntelliJ IDEA versions, a Spring Boot run configuration with the default setting allowed remote attackers to execute code when the configuration is running, because a JMX server listens on all interfaces (instead of listening on only the localhost interface). This issue has been fixed in the following versions: 2019.1, 2018.3.4, 2018.2.8, 2018.1.8, and 2017.3.7. |
In JetBrains Upsource before 2020.1, information disclosure is possible because of an incorrect user matching algorithm. |
In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location. |