Known Vulnerabilities for Redmine by Redmine

Listed below are 10 of the newest known vulnerabilities associated with "Redmine" by "Redmine".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-42326 Redmine before 4.1.5 and 4.2.x before 4.2.3 may disclose the names of users on activity views due to an insufficient access f... 5.3 - MEDIUM 2021-10-12 2022-06-28
CVE-2021-37156 Redmine 4.2.0 and 4.2.1 allow existing user sessions to continue upon enabling two-factor authentication for the user's accou... 7.5 - HIGH 2021-08-05 2021-08-12
CVE-2021-31866 Redmine before 4.0.9 and 4.1.x before 4.1.3 allows an attacker to learn the values of internal authentication keys by observi... 5.3 - MEDIUM 2021-04-28 2021-06-01
CVE-2021-31865 Redmine before 4.0.9, 4.1.x before 4.1.3, and 4.2.x before 4.2.1 allows users to circumvent the allowed filename extensions o... 5.3 - MEDIUM 2021-04-28 2022-07-12
CVE-2021-31864 Redmine before 4.0.9, 4.1.x before 4.1.3, and 4.2.x before 4.2.1 allows attackers to bypass the add_issue_notes permission re... 5.3 - MEDIUM 2021-04-28 2022-07-12
CVE-2021-31863 Insufficient input validation in the Git repository integration of Redmine before 4.0.9, 4.1.x before 4.1.3, and 4.2.x before... 7.5 - HIGH 2021-04-28 2021-06-01
CVE-2021-30164 Redmine before 4.0.8 and 4.1.x before 4.1.2 allows attackers to bypass the add_issue_notes permission requirement by leveragi... 9.8 - CRITICAL 2021-04-06 2021-06-02
CVE-2021-30163 Redmine before 4.0.8 and 4.1.x before 4.1.2 allows attackers to discover the names of private projects if issue-journal detai... 7.5 - HIGH 2021-04-06 2022-06-28
CVE-2021-29274 Redmine 4.1.x before 4.1.2 allows XSS because an issue's subject is mishandled in the auto complete tip. 6.1 - MEDIUM 2021-03-29 2021-03-30
CVE-2020-36306 Redmine before 4.0.7 and 4.1.x before 4.1.1 has XSS via the back_url field. 6.1 - MEDIUM 2021-04-06 2021-06-01

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationRedmineRedmine4.0.4AllAllAll
ApplicationRedmineRedmine4.0.3AllAllAll
ApplicationRedmineRedmine4.0.2AllAllAll
ApplicationRedmineRedmine4.0.1AllAllAll
ApplicationRedmineRedmine4.0.0AllAllAll
ApplicationRedmineRedmine3.4.9AllAllAll
ApplicationRedmineRedmine3.4.8AllAllAll
ApplicationRedmineRedmine3.4.7AllAllAll
ApplicationRedmineRedmine3.4.6AllAllAll
ApplicationRedmineRedmine3.4.5AllAllAll
ApplicationRedmineRedmine3.4.4AllAllAll
ApplicationRedmineRedmine3.4.3AllAllAll
ApplicationRedmineRedmine3.4.2AllAllAll
ApplicationRedmineRedmine3.4.11AllAllAll
ApplicationRedmineRedmine3.4.10AllAllAll
ApplicationRedmineRedmine3.4.1AllAllAll
ApplicationRedmineRedmine3.4.0AllAllAll
ApplicationRedmineRedmine3.3.9AllAllAll
ApplicationRedmineRedmine3.3.8AllAllAll
ApplicationRedmineRedmine3.3.7AllAllAll

Popular searches for Redmine

Overview - Redmine

www.redmine.org

Overview - Redmine Redmine

redmine.rubyforge.org Redmine GNU General Public License Online and offline Database Web application Cross-platform software Ruby on Rails Project management Internet forum Shareware Software framework Wiki Open-source software Documentation User (computing) Plug-in (computing) Superuser Software release life cycle Freenode Internet Relay Chat

© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report