<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to Critical Security update in FileZilla 2.2.23</title><link>https://sourceforge.net/p/filezilla/news/2006/05/critical-security-update-in-filezilla-2223/</link><description>Recent changes to Critical Security update in FileZilla 2.2.23</description><atom:link href="https://sourceforge.net/p/filezilla/news/2006/05/critical-security-update-in-filezilla-2223/feed.rss" rel="self"/><language>en</language><lastBuildDate>Wed, 10 Oct 2012 16:53:05 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/filezilla/news/2006/05/critical-security-update-in-filezilla-2223/feed.rss" rel="self" type="application/rss+xml"/><item><title>Critical Security update in FileZilla 2.2.23</title><link>https://sourceforge.net/p/filezilla/news/2006/05/critical-security-update-in-filezilla-2223/</link><description>FileZilla 2.2.23 fixes a critical security vulnerability. Due to a buffer overflow remote code execution might have been possible if connecting to malicious servers.
An update to FileZilla 2.2.23 is highly recommended. 

You can download the updated version from http://sourceforge.net/project/showfiles.php?group_id=21558&amp;amp;package_id=15149</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tim Kosse</dc:creator><pubDate>Wed, 10 Oct 2012 16:53:05 -0000</pubDate><guid>https://sourceforge.netf2569aeb500f2bb4d161b6bbad3a5c8db71aefda</guid></item></channel></rss>