Vulnerabilities > Jetbrains
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-12-20 | CVE-2024-56348 | Incorrect Authorization vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2024.12 improper access control allowed viewing details of unauthorized agents | 4.3 |
2024-12-20 | CVE-2024-56349 | Missing Authorization vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2024.12 improper access control allowed unauthorized users to modify build logs | 5.3 |
2024-12-20 | CVE-2024-56350 | Incorrect Authorization vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2024.12 build credentials allowed unauthorized viewing of projects | 4.3 |
2024-12-20 | CVE-2024-56351 | Insufficient Session Expiration vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2024.12 access tokens were not revoked after removing user roles | 8.8 |
2024-12-20 | CVE-2024-56352 | Cross-site Scripting vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2024.12 stored XSS was possible via image name on the agent details page | 5.4 |
2024-12-20 | CVE-2024-56353 | Improper Cross-boundary Removal of Sensitive Data vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2024.12 backup file exposed user credentials and session cookies | 6.5 |
2024-12-20 | CVE-2024-56354 | Insufficiently Protected Credentials vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2024.12 password field value were accessible to users with view settings permission | 4.9 |
2024-12-20 | CVE-2024-56355 | Cross-site Scripting vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2024.12 missing Content-Type header in RemoteBuildLogController response could lead to XSS | 5.4 |
2024-12-20 | CVE-2024-56356 | XXE vulnerability in Jetbrains Teamcity In JetBrains TeamCity before 2024.12 insecure XMLParser configuration could lead to potential XXE attack | 7.1 |
2024-10-28 | CVE-2024-50573 | Missing Authorization vulnerability in Jetbrains HUB In JetBrains Hub before 2024.3.47707 improper access control allowed users to generate permanent tokens for unauthorized services | 5.4 |