<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Dangerous bug fixed in wget</title>
	<atom:link href="http://www.epanorama.net/blog/2014/10/30/dangerous-bug-fixed-in-wget/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2014/10/30/dangerous-bug-fixed-in-wget/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 21 Apr 2026 12:02:34 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/10/30/dangerous-bug-fixed-in-wget/comment-page-1/#comment-1274959</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 30 Oct 2014 08:57:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=28098#comment-1274959</guid>
		<description><![CDATA[The vulnerability is publicly identified as CVE-2014-4877.]]></description>
		<content:encoded><![CDATA[<p>The vulnerability is publicly identified as CVE-2014-4877.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/10/30/dangerous-bug-fixed-in-wget/comment-page-1/#comment-1274958</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 30 Oct 2014 08:57:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=28098#comment-1274958</guid>
		<description><![CDATA[The NO-NAME vuln: w g e t mess patched without a fancy brand
Directory overwrite bug threatens all *nix boxen
http://www.theregister.co.uk/2014/10/30/no_poodle_for_you_wget_vuln_patched_without_fancy_brand/]]></description>
		<content:encoded><![CDATA[<p>The NO-NAME vuln: w g e t mess patched without a fancy brand<br />
Directory overwrite bug threatens all *nix boxen<br />
<a href="http://www.theregister.co.uk/2014/10/30/no_poodle_for_you_wget_vuln_patched_without_fancy_brand/" rel="nofollow">http://www.theregister.co.uk/2014/10/30/no_poodle_for_you_wget_vuln_patched_without_fancy_brand/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
