Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0D84A35-4355-4BBB-BC67-A455EDC8A213", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.4.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "DDC30651-790E-48C9-B979-5948B72B92CA", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.4.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "3C0B5127-B5F9-490D-90E6-79963555472B", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CE030856-57FE-4FA0-BE88-5D038C24E927", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FB2B3EC5-713F-4996-8532-DBCEE7D32481", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.4.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "CACB3D53-D2B4-4105-816A-3B286C57B229", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "376563D6-9847-4596-8E7F-A1B4E4437DA9", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "CF01B401-CDAF-4853-B582-EC13A352A4B2", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "59FFB800-D27D-4B7F-A895-C757B18B3201", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "2BE342C5-6E49-4755-BC09-FAA51523199C", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "F7F5F040-4B36-45FA-B730-98E4F0BB59BF", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F4D61AB-0779-4D26-8024-8A3826D92D0F", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A3AF44C7-111A-47C1-AF0C-F02BBA9A8534", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D8EFA68C-DDF6-4261-B179-8AADC40ED9CD", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "A69631D8-3ED7-414B-AF55-AD94361E1948", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "D18DFB35-684E-493F-8ED8-F3C9A0A0BD29", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "552DC1C8-906D-4687-BD5E-4E5E6157920A", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.6:beta1:*:*:*:*:*:*", "matchCriteriaId": "13656B17-85C2-4EEE-AB94-FCAB8388098F", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.6:beta2:*:*:*:*:*:*", "matchCriteriaId": "A5E7A2FA-0221-46EC-A4DA-B11223DF46D4", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "8FC0F7F7-0880-4CFD-8B9B-C17C35C78B45", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "47E83142-5F28-47EB-AAD8-84922853D560", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1DD81D2-BCAD-4230-BD02-C38F7EE8AF17", "vulnerable": true}, {"criteria": "cpe:2.3:a:kde:kde_sc:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "F2F3E300-B7D7-4A3F-8DEF-4BBD9E98DBE5", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the KHTMLPart::htmlError function in khtml/khtml_part.cpp in Konqueror in KDE SC 4.4.0 through 4.6.1 allows remote attackers to inject arbitrary web script or HTML via the URI in a URL corresponding to an unavailable web site."}, {"lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en la funci\u00f3n KHTMLPart::htmlError en khtml/khtml_part.cpp en Konqueror en KDE SC v4.4.0 hasta v4.6.1, permite a usuarios remotos inyectar script o HTML de su elecci\u00f3n a trav\u00e9s de URI en una URL correspondiente a una sitio web no disponible."}], "id": "CVE-2011-1168", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2011-04-18T18:55:00.970", "references": [{"source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/44065"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/44108"}, {"source": "secalert@redhat.com", "url": "http://securityreason.com/securityalert/8208"}, {"source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1025322"}, {"source": "secalert@redhat.com", "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.329727"}, {"source": "secalert@redhat.com", "tags": ["Exploit", "Vendor Advisory"], "url": "http://www.kde.org/info/security/advisory-20110411-1.txt"}, {"source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:075"}, {"source": "secalert@redhat.com", "tags": ["Exploit"], "url": "http://www.nth-dimension.org.uk/pub/NDSA20110321.txt.asc"}, {"source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/517432/100/0/threaded"}, {"source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/517433/100/0/threaded"}, {"source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/47304"}, {"source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1110-1"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2011/0927"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2011/0928"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2011/0990"}, {"source": "secalert@redhat.com", "tags": ["Exploit"], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695398"}, {"source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66697"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/44065"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/44108"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8208"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1025322"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.329727"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Vendor Advisory"], "url": "http://www.kde.org/info/security/advisory-20110411-1.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:075"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://www.nth-dimension.org.uk/pub/NDSA20110321.txt.asc"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/517432/100/0/threaded"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/517433/100/0/threaded"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/47304"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1110-1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2011/0927"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2011/0928"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2011/0990"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695398"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66697"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}