| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| In several versions of JetBrains IntelliJ IDEA Ultimate, creating Task Servers configurations leads to saving a cleartext unencrypted record of the server credentials in the IDE configuration files. The issue has been fixed in the following versions: 2019.1, 2018.3.5, 2018.2.8, and 2018.1.8. |
| In several versions of JetBrains IntelliJ IDEA Ultimate, creating run configurations for cloud application servers leads to saving a cleartext unencrypted record of the server credentials in the IDE configuration files. If the Settings Repository plugin was then used and configured to synchronize IDE settings using a public repository, these credentials were published to this repository. The issue has been fixed in the following versions: 2019.1, 2018.3.5, 2018.2.8, and 2018.1.8. |
| In several JetBrains IntelliJ IDEA versions, creating remote run configurations of JavaEE application servers leads to saving a cleartext record of the server credentials in the IDE configuration files. The issue has been fixed in the following versions: 2018.3.5, 2018.2.8, 2018.1.8. |
| In several JetBrains IntelliJ IDEA versions, a Spring Boot run configuration with the default setting allowed remote attackers to execute code when the configuration is running, because a JMX server listens on all interfaces (instead of listening on only the localhost interface). This issue has been fixed in the following versions: 2019.1, 2018.3.4, 2018.2.8, 2018.1.8, and 2017.3.7. |
| In JetBrains Upsource before 2020.1, information disclosure is possible because of an incorrect user matching algorithm. |
| In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location. |
| JetBrains Ktor framework before version 1.2.6 was vulnerable to HTTP Response Splitting. |
| JetBrains IDETalk plugin before version 193.4099.10 allows XXE |
| In JetBrains YouTrack before 2019.2.55152, removing tags from the issues list without the corresponding permission was possible. |
| In JetBrains Toolbox App before 1.15.5666 for Windows, privilege escalation was possible. |
| In JetBrains TeamCity before 2019.1.2, a non-destructive operation could be performed by a user without the corresponding permissions. |
| In JetBrains TeamCity before 2019.1.2, secure values could be exposed to users with the "View build runtime parameters and data" permission. |
| In JetBrains TeamCity before 2019.1.4, reverse tabnabbing was possible on several pages. |
| In JetBrains TeamCity before 2019.1.4, insecure Java Deserialization could potentially allow remote code execution. |
| In JetBrains TeamCity before 2019.1.2, access could be gained to the history of builds of a deleted build configuration under some circumstances. |
| JetBrains MPS before 2019.2.2 exposed listening ports to the network. |
| JetBrains IntelliJ IDEA before 2019.2 allows local user privilege escalation, potentially leading to arbitrary code execution. |
| In JetBrains Hub versions earlier than 2019.1.11738, username enumeration was possible through password recovery. |
| JetBrains ReSharper installers for versions before 2019.2 had a DLL Hijacking vulnerability. |
| In JetBrains YouTrack through 2019.2.56594, stored XSS was found on the issue page. |