JetBrains IntelliJ IDEA 13.1.4

CPE Details

JetBrains IntelliJ IDEA 13.1.4
13.1.4
2019-07-18
11h59 +00:00
2019-07-18
11h59 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:jetbrains:intellij_idea:13.1.4:*:*:*:*:*:*:*

Informations

Vendor

jetbrains

Product

intellij_idea

Version

13.1.4

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-46970 2024-09-16 10h32 +00:00 In JetBrains IntelliJ IDEA before 2024.1 hTML injection via the project name was possible
6.1
Medium
CVE-2024-37051 2024-06-10 15h58 +00:00 GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4
9.3
Critical
CVE-2024-24941 2024-02-06 09h21 +00:00 In JetBrains IntelliJ IDEA before 2023.3.3 a plugin for JetBrains Space was able to send an authentication token to an inappropriate URL
6.1
Medium
CVE-2024-24940 2024-02-06 09h21 +00:00 In JetBrains IntelliJ IDEA before 2023.3.3 path traversal was possible when unpacking archives
4.3
Medium
CVE-2023-51655 2023-12-21 09h57 +00:00 In JetBrains IntelliJ IDEA before 2023.3.2 code execution was possible in Untrusted Project mode via a malicious plugin repository specified in the project configuration
9.8
Critical
CVE-2023-39261 2023-07-26 12h14 +00:00 In JetBrains IntelliJ IDEA before 2023.2 plugin for Space was requesting excessive permissions
7.8
High
CVE-2023-38069 2023-07-12 12h48 +00:00 In JetBrains IntelliJ IDEA before 2023.1.4 license dialog could be suppressed in certain cases
3.3
Low
CVE-2022-48433 2023-03-29 12h07 +00:00 In JetBrains IntelliJ IDEA before 2023.1 the NTLM hash could leak through an API method used in the IntelliJ IDEA built-in web server.
7.5
High
CVE-2022-48432 2023-03-29 12h07 +00:00 In JetBrains IntelliJ IDEA before 2023.1 the bundled version of Chromium wasn't sandboxed.
8.8
High
CVE-2022-48431 2023-03-29 12h07 +00:00 In JetBrains IntelliJ IDEA before 2023.1 in some cases, Gradle and Maven projects could be imported without the “Trust Project” confirmation.
7.8
High
CVE-2022-48430 2023-03-29 12h07 +00:00 In JetBrains IntelliJ IDEA before 2023.1 file content could be disclosed via an external stylesheet path in Markdown preview.
7.5
High
CVE-2022-47896 2022-12-22 10h25 +00:00 In JetBrains IntelliJ IDEA before 2022.3.1 code Templates were vulnerable to SSTI attacks.
7.8
High
CVE-2022-47895 2022-12-22 10h25 +00:00 In JetBrains IntelliJ IDEA before 2022.3.1 the "Validate JSP File" action used the HTTP protocol to download required JAR files.
7.5
High
CVE-2022-46828 2022-12-08 17h37 +00:00 In JetBrains IntelliJ IDEA before 2022.3 a DYLIB injection on macOS was possible.
7.8
High
CVE-2022-46827 2022-12-08 17h37 +00:00 In JetBrains IntelliJ IDEA before 2022.3 an XXE attack leading to SSRF via requests to custom plugin repositories was possible.
5.5
Medium
CVE-2022-46826 2022-12-08 17h37 +00:00 In JetBrains IntelliJ IDEA before 2022.3 the built-in web server allowed an arbitrary file to be read by exploiting a path traversal vulnerability.
6.2
Medium
CVE-2022-46825 2022-12-08 17h37 +00:00 In JetBrains IntelliJ IDEA before 2022.3 the built-in web server leaked information about open projects.
4
Medium
CVE-2022-46824 2022-12-08 17h37 +00:00 In JetBrains IntelliJ IDEA before 2022.2.4 a buffer overflow in the fsnotifier daemon on macOS was possible.
7.8
High
CVE-2022-40978 2022-09-19 14h05 +00:00 The installer of JetBrains IntelliJ IDEA before 2022.2.2 was vulnerable to EXE search order hijacking
7.8
High
CVE-2022-37010 2022-07-28 08h25 +00:00 In JetBrains IntelliJ IDEA before 2022.2 email address validation in the "Git User Name Is Not Defined" dialog was missed
3.6
Low
CVE-2022-37009 2022-07-28 08h25 +00:00 In JetBrains IntelliJ IDEA before 2022.2 local code execution via a Vagrant executable was possible
7.8
High
CVE-2022-29819 2022-04-28 07h55 +00:00 In JetBrains IntelliJ IDEA before 2022.1 local code execution via links in Quick Documentation was possible
7.7
High
CVE-2022-29818 2022-04-28 07h55 +00:00 In JetBrains IntelliJ IDEA before 2022.1 origin checks in the internal web server were flawed
7.1
High
CVE-2022-29817 2022-04-28 07h55 +00:00 In JetBrains IntelliJ IDEA before 2022.1 reflected XSS via error messages in internal web server was possible
6.1
Medium
CVE-2022-29816 2022-04-28 07h55 +00:00 In JetBrains IntelliJ IDEA before 2022.1 HTML injection into IDE messages was possible
3.2
Low
CVE-2022-29815 2022-04-28 07h55 +00:00 In JetBrains IntelliJ IDEA before 2022.1 local code execution via workspace settings was possible
6.9
Medium
CVE-2022-29814 2022-04-28 07h55 +00:00 In JetBrains IntelliJ IDEA before 2022.1 local code execution via HTML descriptions in custom JSON schemas was possible
7.7
High
CVE-2022-29813 2022-04-28 07h55 +00:00 In JetBrains IntelliJ IDEA before 2022.1 local code execution via custom Pandoc path was possible
6.9
Medium
CVE-2022-29812 2022-04-28 07h55 +00:00 In JetBrains IntelliJ IDEA before 2022.1 notification mechanisms about using Unicode directionality formatting characters were insufficient
2.3
Low
CVE-2022-28651 2022-04-05 15h55 +00:00 In JetBrains IntelliJ IDEA before 2021.3.3 it was possible to get passwords from protected fields
8.4
High
CVE-2022-24346 2022-02-25 13h36 +00:00 In JetBrains IntelliJ IDEA before 2021.3.1, local code execution via RLO (Right-to-Left Override) characters was possible.
7.8
High
CVE-2022-24345 2022-02-25 13h36 +00:00 In JetBrains IntelliJ IDEA before 2021.2.4, local code execution (without permission from a user) upon opening a project was possible.
7.8
High
CVE-2021-30504 2021-05-11 09h32 +00:00 In JetBrains IntelliJ IDEA before 2021.1, DoS was possible because of unbounded resource allocation.
7.5
High
CVE-2021-29263 2021-05-11 09h30 +00:00 In JetBrains IntelliJ IDEA 2020.3.3, local code execution was possible because of insufficient checks when getting the project from VCS.
7.8
High
CVE-2021-30006 2021-05-11 09h24 +00:00 In IntelliJ IDEA before 2020.3.3, XXE was possible, leading to information disclosure.
7.5
High
CVE-2021-25758 2021-02-03 14h16 +00:00 In JetBrains IntelliJ IDEA before 2020.3, potentially insecure deserialization of the workspace model could lead to local code execution.
7.8
High
CVE-2021-25756 2021-02-03 14h14 +00:00 In JetBrains IntelliJ IDEA before 2020.2, HTTP links were used for several remote repositories instead of HTTPS.
5.3
Medium
CVE-2020-27622 2020-11-16 14h11 +00:00 In JetBrains IntelliJ IDEA before 2020.2, the built-in web server could expose information about the IDE version.
5.3
Medium
CVE-2020-11690 2020-04-22 11h52 +00:00 In JetBrains IntelliJ IDEA before 2020.1, the license server could be resolved to an untrusted host in some cases.
9.8
Critical
CVE-2020-7914 2020-01-31 11h02 +00:00 In JetBrains IntelliJ IDEA 2019.2, an XSLT debugger plugin misconfiguration allows arbitrary file read operations over the network. This issue was fixed in 2019.3.
7.5
High
CVE-2020-7905 2020-01-30 16h03 +00:00 Ports listened to by JetBrains IntelliJ IDEA before 2019.3 were exposed to the network.
7.5
High
CVE-2020-7904 2020-01-30 16h01 +00:00 In JetBrains IntelliJ IDEA before 2019.3, some Maven repositories were accessed via HTTP instead of HTTPS.
7.4
High
CVE-2019-18361 2019-10-31 13h37 +00:00 JetBrains IntelliJ IDEA before 2019.2 allows local user privilege escalation, potentially leading to arbitrary code execution.
5.3
Medium
CVE-2019-14954 2019-10-01 11h22 +00:00 JetBrains IntelliJ IDEA before 2019.2 was resolving the markdown plantuml artifact download link via a cleartext http connection.
5.9
Medium
CVE-2019-9873 2019-07-03 16h43 +00:00 In several versions of JetBrains IntelliJ IDEA Ultimate, creating Task Servers configurations leads to saving a cleartext unencrypted record of the server credentials in the IDE configuration files. The issue has been fixed in the following versions: 2019.1, 2018.3.5, 2018.2.8, and 2018.1.8.
9.8
Critical
CVE-2017-8316 2018-08-03 15h00 +00:00 IntelliJ IDEA XML parser was found vulnerable to XML External Entity attack, an attacker can exploit the vulnerability by implementing malicious code on both Androidmanifest.xml.
7.5
High