In JetBrains RubyMine before 2021.1.1, code execution without user confirmation was possible for untrusted projects.
In JetBrains Code With Me bundled to the compatible IDEs before version 2021.1, the client could execute code in read-only mode.
In JetBrains TeamCity before 2023.05.2 a token with limited permissions could be used to gain full account access
In JetBrains Hub before 2024.3.55417 privilege escalation was possible via LDAP authentication mapping
In JetBrains TeamCity before 2024.12 access tokens were not revoked after removing user roles
In JetBrains Kotlin from 1.4-M1 to 1.4-RC (as Kotlin 1.3.7x is not affected by the issue. Fixed version is 1.4.0) there is a script-cache privilege escalation vulnerability due to kotlin-main-kts cached scripts in the system temp directory, which is shared by all users by default.
In JetBrains TeamCity before 2022.04.2 build parameter injection was possible
In JetBrains YouTrack before 2020.1.1331, an external user could execute commands against arbitrary issues.