<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: New web browser security information</title>
	<atom:link href="http://www.webdevout.net/tidings/2006/05/07/new-web-browser-security-information/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.webdevout.net/tidings/2006/05/07/new-web-browser-security-information/</link>
	<description>Updates on the march of progress. A weblog about web design, standards, web browsers, and the overall health of the Web.</description>
	<lastBuildDate>Wed, 14 Dec 2011 14:45:24 +0000</lastBuildDate>
	<generator>http://wordpress.org/?v=2.8.4</generator>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
		<item>
		<title>By: David Hammond</title>
		<link>http://www.webdevout.net/tidings/2006/05/07/new-web-browser-security-information/comment-page-1/#comment-510</link>
		<dc:creator>David Hammond</dc:creator>
		<pubDate>Tue, 16 May 2006 07:37:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.webdevout.net/tidings/2006/05/07/new-web-browser-security-information/#comment-510</guid>
		<description>In the security summary page, &quot;In the wild&quot; vulnerabilities are those that were publicly known before a patch was available. Those values are not related to public exploits.</description>
		<content:encoded><![CDATA[<p>In the security summary page, &#8220;In the wild&#8221; vulnerabilities are those that were publicly known before a patch was available. Those values are not related to public exploits.</p>
<p class="postdetails"><em>Posted using Mozilla Firefox 1.5.0.3 on Linux.</em></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: FreewheelinFrank</title>
		<link>http://www.webdevout.net/tidings/2006/05/07/new-web-browser-security-information/comment-page-1/#comment-454</link>
		<dc:creator>FreewheelinFrank</dc:creator>
		<pubDate>Sat, 13 May 2006 06:33:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.webdevout.net/tidings/2006/05/07/new-web-browser-security-information/#comment-454</guid>
		<description>Thanks David,

When you talk about vulnerabilities discovered in the wild, are these exploits being used to auto-install spyware, such as the recent CreateTextRange vulnerability in IE?

I don&#039;t remember reading any reports of Firefox being exposed to such attacks. What is the source of these data?

Cheers,

FwF</description>
		<content:encoded><![CDATA[<p>Thanks David,</p>
<p>When you talk about vulnerabilities discovered in the wild, are these exploits being used to auto-install spyware, such as the recent CreateTextRange vulnerability in <abbr title="Internet Explorer">IE</abbr>?</p>
<p>I don&#8217;t remember reading any reports of Firefox being exposed to such attacks. What is the source of these data?</p>
<p>Cheers,</p>
<p>FwF</p>
<p class="postdetails"><em>Posted using Mozilla Firefox 1.5.0.3 on Windows.</em></p>
]]></content:encoded>
	</item>
</channel>
</rss>
