![]() ![]() In JetBrains IntelliJ IDEA before 2022.3 an XXE attack leading to SSRF via requests to custom plugin repositories was possible. In JetBrains IntelliJ IDEA before 2022.3 a DYLIB injection on macOS was possible. In JetBrains IntelliJ IDEA before 2022.3.1 the "Validate JSP File" action used the HTTP protocol to download required JAR files. In JetBrains IntelliJ IDEA before 2022.3.1 code Templates were vulnerable to SSTI attacks. In JetBrains IntelliJ IDEA before 2023.1 file content could be disclosed via an external stylesheet path in Markdown preview. In JetBrains IntelliJ IDEA before 2023.1 in some cases, Gradle and Maven projects could be imported without the “Trust Project” confirmation. In JetBrains IntelliJ IDEA before 2023.1 the bundled version of Chromium wasn't sandboxed. In JetBrains IntelliJ IDEA before 2023.1 the NTLM hash could leak through an API method used in the IntelliJ IDEA built-in web server. In JetBrains IntelliJ IDEA before 2023.1.4 license dialog could be suppressed in certain cases Published: J9:15:09 AM -0400 ![]() In JetBrains IntelliJ IDEA before 2023.2 plugin for Space was requesting excessive permissions Published: J9:15:10 AM -0400 ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |