Page 9 of 47 results (0.009 seconds)

CVSS: 4.3EPSS: 0%CPEs: 52EXPL: 0

Cross-site scripting (XSS) vulnerability in Redmine before 1.3.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Una vulnerabilidad de ejecución de comandos en sitios cruzados (XSS) en Redmine antes de v1.3.2 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de vectores no especificados. • http://jvn.jp/en/jp/JVN93406632/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2012-000025 http://www.redmine.org/versions/42 http://www.securityfocus.com/bid/52447 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 3%CPEs: 52EXPL: 0

Redmine before 1.3.2 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set attributes in the (1) Comment, (2) Document, (3) IssueCategory, (4) MembersController, (5) Message, (6) News, (7) TimeEntry, (8) Version, (9) Wiki, (10) UserPreference, or (11) Board model via a modified URL, related to a "mass assignment" vulnerability, a different vulnerability than CVE-2012-0327. Redmine antes de v1.3.2 no restringe adecuadamente el uso de un hash para proporcionar los valores de los atributos de un modelo, lo que permite a atacantes remotos establecer los atributos en los modelos (1) Comment, (2) Document, (3) IssueCategory, (4) MembersController, (5) Message, (6) News, (7) TimeEntry, (8) Version, (9) Wiki, (10) UserPreference, or (11) Board, a través de una URL modificada, en relación con una vulnerabilidad de "asignacion en masa". Se trata de una vulnerabilidad diferente a CVE-2012-0327. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Honeywell HMIWeb. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the ActiveX control defined within the HSCDSPRenderDll.dll file. • http://www.redmine.org/boards/2/topics/29343 http://www.redmine.org/issues/10390 http://www.redmine.org/versions/42 • CWE-255: Credentials Management Errors •

CVSS: 4.3EPSS: 1%CPEs: 7EXPL: 3

Cross-site scripting (XSS) vulnerability in app/views/layouts/base.rhtml in Redmine 1.0.1 through 1.1.1 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to projects/hg-helloworld/news/. NOTE: some of these details are obtained from third party information. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en app/views/layouts/base.rhtml de Redmine 1.0.1 hasta la 1.1.1. Permite a usuarios remotos inyectar codigo de script web o código HTML de su elección a través de PATH_INFO de projects/hg-helloworld/news/. NOTA: algunos de estos detalles han sido obtenidos de información de terceras partes. • https://www.exploit-db.com/exploits/35572 http://osvdb.org/71564 http://secunia.com/advisories/43999 http://securityreason.com/securityalert/8211 http://www.mavitunasecurity.com/XSS-vulnerability-in-Redmine http://www.redmine.org/news/53 http://www.securityfocus.com/archive/1/517355/100/0/threaded http://www.securityfocus.com/bid/47193 http://www.vupen.com/english/advisories/2011/0895 https://exchange.xforce.ibmcloud.com/vulnerabilities/66612 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 29EXPL: 1

Redmine 0.8.7 and earlier uses the title tag before defining the character encoding in a meta tag, which allows remote attackers to conduct cross-site scripting (XSS) attacks and inject arbitrary script via UTF-7 encoded values in the title parameter to a new issue page, which may be interpreted as script by Internet Explorer 7 and 8. Redmine 0.8.7 y versiones anteriores usa la etiqueta título antes de definir el caracter de codificación en una etiqueta META lo que permite a atacantes remotos realizar ataques de secuencias de comandos en sitios cruzados (XSS) e inyectar secuencias de comandos de su elección mediante valores con codificación UTF-7 en el parámetro título para una página de nueva emisión, lo que puede ser interpratado como un script por Internet Explorer 7 y 8. • http://www.exploit-db.com/exploits/10554 http://www.securityfocus.com/bid/37425 https://exchange.xforce.ibmcloud.com/vulnerabilities/54947 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 0%CPEs: 27EXPL: 0

Cross-site request forgery (CSRF) vulnerability in Redmine 0.8.5 and earlier allows remote attackers to hijack the authentication of users for requests that delete a ticket via unspecified vectors. Vulnerabilidad de falsificación de petición en sitios cruzados en Redmine v0.8.5 y anteriores permite a atacantes remotos secuestras las autenticación de los usuarios para peticiones que borren un ticket a través de vectores inespecificos. • http://jvn.jp/en/jp/JVN87341298/index.html http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000074.html http://rubyforge.org/frs/shownotes.php?release_id=41440 http://secunia.com/advisories/37420 http://www.redmine.org/wiki/redmine/Changelog#v087-2009-11-15 http://www.securityfocus.com/bid/37066 http://www.vupen.com/english/advisories/2009/3291 https://exchange.xforce.ibmcloud.com/vulnerabilities/54334 • CWE-352: Cross-Site Request Forgery (CSRF) •