JVN#77947437: RSSOwl vulnerable to arbitrary script execution
2012-05-25T00:00:00
ID JVN:77947437 Type jvn Reporter Japan Vulnerability Notes Modified 2012-05-30T00:00:00
Description
## Description
RSSOwl is an RSS/Atom feed reader. RSSOwl is vulnerable to arbitrary script execution due to the improper processing during HTML page output based on feed information.
## Impact
An arbitrary script may be executed on the user's web browser.
## Solution
Update the software
Update to the latest version according to the information provided by the developer.
## Products Affected
RSSOwl versions prior to 2.1.1
{"id": "JVN:77947437", "bulletinFamily": "info", "title": "JVN#77947437: RSSOwl vulnerable to arbitrary script execution", "description": "\n ## Description\n\nRSSOwl is an RSS/Atom feed reader. RSSOwl is vulnerable to arbitrary script execution due to the improper processing during HTML page output based on feed information.\n\n ## Impact\n\nAn arbitrary script may be executed on the user's web browser. \n\n\n ## Solution\n\n**Update the software** \nUpdate to the latest version according to the information provided by the developer. \n\n\n ## Products Affected\n\n * RSSOwl versions prior to 2.1.1 \n\n", "published": "2012-05-25T00:00:00", "modified": "2012-05-30T00:00:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "href": "http://jvn.jp/en/jp/JVN77947437/index.html", "reporter": "Japan Vulnerability Notes", "references": [], "cvelist": ["CVE-2012-1252"], "type": "jvn", "lastseen": "2019-05-29T17:21:46", "edition": 4, "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2012-1252"]}], "modified": "2019-05-29T17:21:46", "rev": 2}, "score": {"value": 5.0, "vector": "NONE", "modified": "2019-05-29T17:21:46", "rev": 2}, "vulnersScore": 5.0}, "scheme": null}