📦 Redmine
by Redmine
🔍 What is Redmine?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows attackers to bypass the 'add_issue_notes' permission requirement in Redmine by exploiting the Issues API. Attackers can add unauthorized comments to issues even without prope...
This vulnerability allows authenticated Redmine users to read arbitrary local files accessible by the application server process due to insufficient input validation in Git repository integration. It ...