Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
rider vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-1401
SQL injection vulnerability in verify.asp in Asp-rider allows remote malicious users to execute arbitrary SQL statements and bypass authentication via the username parameter.
Asp-rider Asp-rider
1 EDB exploit
NA
CVE-2005-3931
SQL injection vulnerability in default.asp in ASP-Rider 1.6 allows remote malicious users to execute arbitrary SQL commands via the HTTP referer.
Asp-rider Asp-rider 1.6
1 EDB exploit
NA
CVE-2006-0439
Text Rider 2.4 stores sensitive data in the data directory under the web document root with insufficient access control, which allows remote malicious users to obtain usernames and password hashes by directly accessing data/userlist.txt.
Text Rider Text Rider 2.4
NA
CVE-2006-0440
Text Rider 2.4 allows malicious users to bypass authentication and upload files without providing a valid password by obtaining the MD5 hash of the password (possibly via another vulnerability that reads it from a data file), then including the hash in a cookie.
Text Rider Text Rider 2.4
7.8
CVSSv3
CVE-2019-14960
JetBrains Rider prior to 2019.1.2 was using an unsigned JetBrains.Rider.Unity.Editor.Plugin.Repacked.dll file.
Jetbrains Rider
7.8
CVSSv3
CVE-2022-37396
In JetBrains Rider prior to 2022.2 Trust and Open Project dialog could be bypassed, leading to local code execution
Jetbrains Rider
5.3
CVSSv3
CVE-2024-24939
In JetBrains Rider prior to 2023.3.3 logging of environment variables containing secret values was possible
Jetbrains Rider
7.5
CVSSv3
CVE-2020-7906
In JetBrains Rider versions 2019.3 EAP2 up to and including 2019.3 EAP7, there were unsigned binaries provided by the Windows installer. This issue was fixed in release version 2019.3.
Jetbrains Rider 2019.3.0
7.7
CVSSv3
CVE-2022-29821
In JetBrains Rider prior to 2022.1 local code execution via links in ReSharper Quick Documentation was possible
Jetbrains Pycharm
8.8
CVSSv3
CVE-2014-125001
A vulnerability classified as critical has been found in Cardo Systems Scala Rider Q3. Affected is the file /cardo/api of the Cardo-Updater. Unauthenticated remote code execution with root permissions is possible. Firewalling or disabling the service is recommended.
Cardosystems Scala Rider Q3 Firmware -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2024-34413
CVE-2024-34089
CVE-2024-33408
local
SQL
CVE-2024-0402
CVE-2024-33910
CVE-2024-31848
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started