Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): resharper
- Search Type: Search All
- CPE Name Search: false
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2025-23385 |
In JetBrains ReSharper before 2024.3.4, 2024.2.8, and 2024.1.7, Rider before 2024.3.4, 2024.2.8, and 2024.1.7, dotTrace before 2024.3.4, 2024.2.8, and 2024.1.7, ETW Host Service before 16.43, Local Privilege Escalation via the ETW Host Service was possible Published: January 28, 2025; 11:15:41 AM -0500 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2022-29821 |
In JetBrains Rider before 2022.1 local code execution via links in ReSharper Quick Documentation was possible Published: April 28, 2022; 6:15:08 AM -0400 |
V4.0:(not available) V3.1: 7.7 HIGH V2.0: 4.4 MEDIUM |
CVE-2019-16407 |
JetBrains ReSharper installers for versions before 2019.2 had a DLL Hijacking vulnerability. Published: October 02, 2019; 3:15:15 PM -0400 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0: 4.4 MEDIUM |
CVE-2018-14878 |
JetBrains dotPeek before 2018.2 and ReSharper Ultimate before 2018.1.4 allow attackers to execute code by decompiling a compiled .NET object (such as a DLL or EXE file) with a specific file, because of Deserialization of Untrusted Data. Published: August 13, 2018; 1:29:01 PM -0400 |
V4.0:(not available) V3.0: 7.8 HIGH V2.0: 6.8 MEDIUM |