Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2011-2711
Deferred
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-03 Aug, 2011 | 00:55
Updated At-11 Apr, 2025 | 00:51

Cross-site scripting (XSS) vulnerability in the print_fileinfo function in ui-diff.c in cgit 0.9.0.2 and earlier allows remote authenticated users to inject arbitrary web script or HTML via the filename associated with the rename hint.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.03.5LOW
AV:N/AC:M/Au:S/C:N/I:P/A:N
CPE Matches

lars_hjemli
lars_hjemli
>>cgit>>Versions up to 0.9.0.2(inclusive)
cpe:2.3:a:lars_hjemli:cgit:*:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.1
cpe:2.3:a:lars_hjemli:cgit:0.1:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.2
cpe:2.3:a:lars_hjemli:cgit:0.2:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.3
cpe:2.3:a:lars_hjemli:cgit:0.3:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.4
cpe:2.3:a:lars_hjemli:cgit:0.4:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.5
cpe:2.3:a:lars_hjemli:cgit:0.5:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.6
cpe:2.3:a:lars_hjemli:cgit:0.6:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.6.1
cpe:2.3:a:lars_hjemli:cgit:0.6.1:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.6.2
cpe:2.3:a:lars_hjemli:cgit:0.6.2:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.6.3
cpe:2.3:a:lars_hjemli:cgit:0.6.3:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.7
cpe:2.3:a:lars_hjemli:cgit:0.7:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.7.1
cpe:2.3:a:lars_hjemli:cgit:0.7.1:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.7.2
cpe:2.3:a:lars_hjemli:cgit:0.7.2:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.8
cpe:2.3:a:lars_hjemli:cgit:0.8:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.8.1
cpe:2.3:a:lars_hjemli:cgit:0.8.1:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.8.1.1
cpe:2.3:a:lars_hjemli:cgit:0.8.1.1:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.8.2
cpe:2.3:a:lars_hjemli:cgit:0.8.2:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.8.2.1
cpe:2.3:a:lars_hjemli:cgit:0.8.2.1:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.8.2.2
cpe:2.3:a:lars_hjemli:cgit:0.8.2.2:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.8.3
cpe:2.3:a:lars_hjemli:cgit:0.8.3:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.8.3.1
cpe:2.3:a:lars_hjemli:cgit:0.8.3.1:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.8.3.2
cpe:2.3:a:lars_hjemli:cgit:0.8.3.2:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.8.3.3
cpe:2.3:a:lars_hjemli:cgit:0.8.3.3:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.8.3.4
cpe:2.3:a:lars_hjemli:cgit:0.8.3.4:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.8.3.5
cpe:2.3:a:lars_hjemli:cgit:0.8.3.5:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.9
cpe:2.3:a:lars_hjemli:cgit:0.9:*:*:*:*:*:*:*
lars_hjemli
lars_hjemli
>>cgit>>0.9.0.1
cpe:2.3:a:lars_hjemli:cgit:0.9.0.1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://hjemli.net/git/cgit/commit/?h=stable&id=bebe89d7c11a92bf206bf6e528c51ffa8ecbc0d5secalert@redhat.com
Patch
http://hjemli.net/pipermail/cgit/2011-July/000276.htmlsecalert@redhat.com
Patch
http://secunia.com/advisories/45358secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/45541secalert@redhat.com
N/A
http://www.openwall.com/lists/oss-security/2011/07/22/2secalert@redhat.com
Patch
http://www.openwall.com/lists/oss-security/2011/07/22/6secalert@redhat.com
N/A
http://www.openwall.com/lists/oss-security/2011/07/22/7secalert@redhat.com
Patch
http://www.openwall.com/lists/oss-security/2011/07/24/3secalert@redhat.com
Patch
http://www.openwall.com/lists/oss-security/2011/07/24/4secalert@redhat.com
Patch
http://www.osvdb.org/74050secalert@redhat.com
Patch
http://www.securityfocus.com/bid/48866secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=725042secalert@redhat.com
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/68754secalert@redhat.com
N/A
https://hermes.opensuse.org/messages/10998459secalert@redhat.com
N/A
http://hjemli.net/git/cgit/commit/?h=stable&id=bebe89d7c11a92bf206bf6e528c51ffa8ecbc0d5af854a3a-2127-422b-91ae-364da2661108
Patch
http://hjemli.net/pipermail/cgit/2011-July/000276.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
http://secunia.com/advisories/45358af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/45541af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2011/07/22/2af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.openwall.com/lists/oss-security/2011/07/22/6af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2011/07/22/7af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.openwall.com/lists/oss-security/2011/07/24/3af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.openwall.com/lists/oss-security/2011/07/24/4af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.osvdb.org/74050af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securityfocus.com/bid/48866af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=725042af854a3a-2127-422b-91ae-364da2661108
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/68754af854a3a-2127-422b-91ae-364da2661108
N/A
https://hermes.opensuse.org/messages/10998459af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found