JetBrains

IntelliJ IDEA

56 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0%
  • Veröffentlicht 03.07.2019 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:52:29

In several versions of JetBrains IntelliJ IDEA Ultimate, creating Task Servers configurations leads to saving a cleartext unencrypted record of the server credentials in the IDE configuration files. The issue has been fixed in the following versions:...

  • EPSS 0%
  • Veröffentlicht 03.07.2019 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:52:28

In several versions of JetBrains IntelliJ IDEA Ultimate, creating run configurations for cloud application servers leads to saving a cleartext unencrypted record of the server credentials in the IDE configuration files. If the Settings Repository plu...

  • EPSS 0%
  • Veröffentlicht 03.07.2019 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:52:22

In several JetBrains IntelliJ IDEA versions, creating remote run configurations of JavaEE application servers leads to saving a cleartext record of the server credentials in the IDE configuration files. The issue has been fixed in the following versi...

  • EPSS 0.01%
  • Veröffentlicht 03.07.2019 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:51:09

In several JetBrains IntelliJ IDEA versions, a Spring Boot run configuration with the default setting allowed remote attackers to execute code when the configuration is running, because a JMX server listens on all interfaces (instead of listening on ...

  • EPSS 0.02%
  • Veröffentlicht 03.07.2019 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:24

In several JetBrains IntelliJ IDEA Ultimate versions, an Application Server run configuration (for Tomcat, Jetty, Resin, or CloudBees) with the default setting allowed a remote attacker to execute code when the configuration is running, because a JMX...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 03.08.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:33:45

IntelliJ IDEA XML parser was found vulnerable to XML External Entity attack, an attacker can exploit the vulnerability by implementing malicious code on both Androidmanifest.xml.