Filtered by vendor Jetbrains Subscriptions
Total 359 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-37051 1 Jetbrains 13 Aqua, Clion, Datagrip and 10 more 2024-06-18 7.5 High
GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4
CVE-2024-23917 1 Jetbrains 1 Teamcity 2024-06-05 9.8 Critical
In JetBrains TeamCity before 2023.11.3 authentication bypass leading to RCE was possible
CVE-2024-27198 1 Jetbrains 1 Teamcity 2024-06-04 9.8 Critical
In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
CVE-2024-24943 1 Jetbrains 1 Toolbox 2024-06-04 5.5 Medium
In JetBrains Toolbox App before 2.2 a DoS attack was possible via a malicious SVG image
CVE-2024-24939 1 Jetbrains 1 Rider 2024-06-04 5.3 Medium
In JetBrains Rider before 2023.3.3 logging of environment variables containing secret values was possible
CVE-2024-31138 1 Jetbrains 1 Teamcity 2024-04-08 5.4 Medium
In JetBrains TeamCity before 2024.03 xSS was possible via Agent Distribution settings
CVE-2024-31137 1 Jetbrains 1 Teamcity 2024-04-08 6.1 Medium
In JetBrains TeamCity before 2024.03 reflected XSS was possible via Space connection configuration
CVE-2024-31135 1 Jetbrains 1 Teamcity 2024-04-08 6.1 Medium
In JetBrains TeamCity before 2024.03 open redirect was possible on the login page
CVE-2024-24936 1 Jetbrains 1 Teamcity 2024-02-09 5.3 Medium
In JetBrains TeamCity before 2023.11.2 access control at the S3 Artifact Storage plugin endpoint was missed
CVE-2024-24937 1 Jetbrains 1 Teamcity 2024-02-09 5.4 Medium
In JetBrains TeamCity before 2023.11.2 stored XSS via agent distribution was possible
CVE-2024-24938 1 Jetbrains 1 Teamcity 2024-02-09 5.3 Medium
In JetBrains TeamCity before 2023.11.2 limited directory traversal was possible in the Kotlin DSL documentation
CVE-2024-24941 1 Jetbrains 1 Intellij Idea 2024-02-09 5.3 Medium
In JetBrains IntelliJ IDEA before 2023.3.3 a plugin for JetBrains Space was able to send an authentication token to an inappropriate URL
CVE-2024-24942 1 Jetbrains 1 Teamcity 2024-02-09 5.3 Medium
In JetBrains TeamCity before 2023.11.3 path traversal allowed reading data within JAR archives
CVE-2024-24940 1 Jetbrains 1 Intellij Idea 2024-02-07 4.3 Medium
In JetBrains IntelliJ IDEA before 2023.3.3 path traversal was possible when unpacking archives
CVE-2024-22370 1 Jetbrains 1 Youtrack 2024-01-12 5.4 Medium
In JetBrains YouTrack before 2023.3.22666 stored XSS via markdown was possible
CVE-2023-51655 1 Jetbrains 1 Intellij Idea 2023-12-29 9.8 Critical
In JetBrains IntelliJ IDEA before 2023.3.2 code execution was possible in Untrusted Project mode via a malicious plugin repository specified in the project configuration
CVE-2023-50871 1 Jetbrains 1 Youtrack 2023-12-19 4.3 Medium
In JetBrains YouTrack before 2023.3.22268 authorization check for inline comments inside thread replies was missed
CVE-2023-50870 1 Jetbrains 1 Teamcity 2023-12-19 8.8 High
In JetBrains TeamCity before 2023.11.1 a CSRF on login was possible
CVE-2022-48429 1 Jetbrains 1 Hub 2023-11-07 5.4 Medium
In JetBrains Hub before 2022.3.15573, 2022.2.15572, 2022.1.15583 reflected XSS in dashboards was possible
CVE-2020-29582 2 Jetbrains, Oracle 4 Kotlin, Communications Cloud Native Core Network Slice Selection Function, Communications Cloud Native Core Policy and 1 more 2023-11-07 5.3 Medium
In JetBrains Kotlin before 1.4.21, a vulnerable Java API was used for temporary file and folder creation. An attacker was able to read data from such files and list directories due to insecure permissions.