Filtered by vendor Jetbrains
Subscribe
Total
469 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-15822 | 1 Jetbrains | 1 Youtrack | 2024-11-21 | 7.5 HIGH | 7.3 HIGH |
In JetBrains YouTrack before 2020.2.10514, SSRF is possible because URL filtering can be escaped. | |||||
CVE-2020-15821 | 1 Jetbrains | 1 Youtrack | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
In JetBrains YouTrack before 2020.2.6881, a user without permission is able to create an article draft. | |||||
CVE-2020-15820 | 1 Jetbrains | 1 Youtrack | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
In JetBrains YouTrack before 2020.2.6881, the markdown parser could disclose hidden file existence. | |||||
CVE-2020-15819 | 1 Jetbrains | 1 Youtrack | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
JetBrains YouTrack before 2020.2.10643 was vulnerable to SSRF that allowed scanning internal ports. | |||||
CVE-2020-15818 | 1 Jetbrains | 1 Youtrack | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
In JetBrains YouTrack before 2020.2.8527, the subtasks workflow could disclose issue existence. | |||||
CVE-2020-15817 | 1 Jetbrains | 1 Youtrack | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
In JetBrains YouTrack before 2020.1.1331, an external user could execute commands against arbitrary issues. | |||||
CVE-2020-11938 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 4.0 MEDIUM | 4.9 MEDIUM |
In JetBrains TeamCity 2018.2 through 2019.2.1, a project administrator was able to see scrambled password parameters used in a project. The issue was resolved in 2019.2.2. | |||||
CVE-2020-11796 | 1 Jetbrains | 1 Space | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
In JetBrains Space through 2020-04-22, the password authentication implementation was insecure. | |||||
CVE-2020-11795 | 1 Jetbrains | 1 Space | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In JetBrains Space through 2020-04-22, the session timeout period was configured improperly. | |||||
CVE-2020-11694 | 2 Jetbrains, Microsoft | 2 Pycharm, Windows | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In JetBrains PyCharm 2019.2.5 and 2019.3 on Windows, Apple Notarization Service credentials were included. This is fixed in 2019.2.6 and 2019.3.3. | |||||
CVE-2020-11693 | 1 Jetbrains | 1 Youtrack | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
JetBrains YouTrack before 2020.1.659 was vulnerable to DoS that could be caused by attaching a malformed TIFF file to an issue. | |||||
CVE-2020-11692 | 1 Jetbrains | 1 Youtrack | 2024-11-21 | 4.0 MEDIUM | 2.7 LOW |
In JetBrains YouTrack before 2020.1.659, DB export was accessible to read-only administrators. | |||||
CVE-2020-11691 | 1 Jetbrains | 1 Hub | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In JetBrains Hub before 2020.1.12099, content spoofing in the Hub OAuth error message was possible. | |||||
CVE-2020-11690 | 1 Jetbrains | 1 Intellij Idea | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
In JetBrains IntelliJ IDEA before 2020.1, the license server could be resolved to an untrusted host in some cases. | |||||
CVE-2020-11689 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
In JetBrains TeamCity before 2019.2.1, a user without appropriate permissions was able to import settings from the settings.kts file. | |||||
CVE-2020-11688 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In JetBrains TeamCity before 2019.2.1, the application state is kept alive after a user ends his session. | |||||
CVE-2020-11687 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In JetBrains TeamCity before 2019.2.2, password values were shown in an unmasked format on several pages. | |||||
CVE-2020-11686 | 1 Jetbrains | 1 Teamcity | 2024-11-21 | 4.0 MEDIUM | 2.7 LOW |
In JetBrains TeamCity before 2019.1.4, a project administrator was able to retrieve some TeamCity server settings. | |||||
CVE-2020-11685 | 1 Jetbrains | 1 Goland | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
In JetBrains GoLand before 2019.3.2, the plugin repository was accessed via HTTP instead of HTTPS. | |||||
CVE-2020-11416 | 1 Jetbrains | 1 Space | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
JetBrains Space through 2020-04-22 allows stored XSS in Chats. |