<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Web Development and Website Design North Wales, Colwyn Bay, Bangor and Chester &#187; itechwebdesign</title>
	<atom:link href="http://www.itechwebdesign.co.uk/author/itechwebdesign/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.itechwebdesign.co.uk</link>
	<description>I-Tech Web Design specialises in “Professional Website Design in North Wales”. We have the flexibility to work with clients in the way that best meets their objectives – Our success is directly linked to your success.</description>
	<lastBuildDate>Thu, 23 Feb 2017 18:58:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.1.41</generator>
	<item>
		<title>Joomla! Security News</title>
		<link>http://www.itechwebdesign.co.uk/joomla-security-news/</link>
		<comments>http://www.itechwebdesign.co.uk/joomla-security-news/#comments</comments>
		<pubDate>Fri, 08 Nov 2013 11:07:01 +0000</pubDate>
		<dc:creator><![CDATA[itechwebdesign]]></dc:creator>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Technical]]></category>

		<guid isPermaLink="false">http://www.itechwebdesign.co.uk/?p=1241</guid>
		<description><![CDATA[[20131101] Core XSS Vulnerability [20131102] Core XSS Vulnerability [20131103] Core XSS Vulnerability [20131101] Core XSS Vulnerability in Joomla Posted: 06 Nov 2013 10:47 AM PST     Project: Joomla!     SubProject: All     Severity: High     Versions: 2.5.14 and earlier 2.5.x versions. 3.1.5 and earlier 3.x versions.     Exploit type: XSS Vulnerability     Reported Date: 2013-October-25 [&#8230;]]]></description>
				<content:encoded><![CDATA[<ol>
<li>[20131101] Core XSS Vulnerability</li>
<li>[20131102] Core XSS Vulnerability</li>
<li>[20131103] Core XSS Vulnerability</li>
</ol>
<h2>[20131101] Core XSS Vulnerability in Joomla</h2>
<p>Posted: 06 Nov 2013 10:47 AM PST</p>
<ul>
<li>    Project: Joomla!</li>
<li>    SubProject: All</li>
<li>    Severity: High</li>
<li>    Versions: 2.5.14 and earlier 2.5.x versions. 3.1.5 and earlier 3.x versions.</li>
<li>    Exploit type: XSS Vulnerability</li>
<li>    Reported Date: 2013-October-25</li>
<li>    Fixed Date: 2013-November-06</li>
<li>    CVE Number:</li>
</ul>
<p><strong>Description</strong></p>
<p>Inadequate filtering leads to XSS vulnerability in com_contact.</p>
<p><strong>Affected Installs</strong></p>
<p>Joomla! version 2.5.14 and earlier 2.5.x versions; and version 3.1.5 and earlier 3.0.x versions.</p>
<p><strong>Solution</strong></p>
<p>Upgrade to version 2.5.15, 3.1.6 or 3.2.</p>
<p><strong>Contact</strong></p>
<p>The JSST at the Joomla! Security Center.<br />
Reported By: Osanda Malith</p>
<h2>[20131102] Core XSS Vulnerability in Joomla</h2>
<p>Posted: 06 Nov 2013 10:47 AM PST</p>
<ul>
<li>    Project: Joomla!</li>
<li>    SubProject: All</li>
<li>    Severity: Moderate</li>
<li>    Versions: 2.5.14 and earlier 2.5.x versions. 3.1.5 and earlier 3.x versions.</li>
<li>    Exploit type: XSS Vulnerability</li>
<li>    Reported Date: 2013-October-06</li>
<li>    Fixed Date: 2013-November-06</li>
<li>    CVE Number:</li>
</ul>
<p><strong>Description</strong></p>
<p>Inadequate filtering leads to XSS vulnerability in com_contact, com_weblinks, com_newsfeeds.</p>
<p><strong>Affected Installs</strong></p>
<p>Joomla! version 2.5.14 and earlier 2.5.x versions; and version 3.1.5 and earlier 3.0.x versions.</p>
<p><strong>Solution</strong></p>
<p>Upgrade to version 2.5.15, 3.1.6 or 3.2.</p>
<p><strong>Contact</strong></p>
<p>The JSST at the Joomla! Security Center.<br />
Reported By: Osanda Malith</p>
<h3>[20131103] Core XSS Vulnerability in Joomla</h3>
<p>Posted: 06 Nov 2013 10:47 AM PST</p>
<ul>
<li>    Project: Joomla!</li>
<li>    SubProject: All</li>
<li>    Severity: Moderate</li>
<li>    Versions: 2.5.14 and earlier 2.5.x versions. 3.1.5 and earlier 3.x versions.</li>
<li>    Exploit type: XSS Vulnerability</li>
<li>    Reported Date: 2013-October-26</li>
<li>    Fixed Date: 2013-November-06</li>
<li>    CVE Number:</li>
</ul>
<p><strong>Description</strong></p>
<p>Inadequate filtering leads to XSS vulnerability in com_contact.</p>
<p><strong>Affected Installs</strong></p>
<p>Joomla! version 2.5.14 and earlier 2.5.x versions; and version 3.1.5 and earlier 3.0.x versions.</p>
<p><strong>Solution</strong></p>
<p>Upgrade to version 2.5.15, 3.1.6 or 3.2.</p>
<p><strong>Contact</strong></p>
<p>The JSST at the Joomla! Security Center.<br />
Reported By: Osanda Malith</p>
]]></content:encoded>
			<wfw:commentRss>http://www.itechwebdesign.co.uk/joomla-security-news/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Microsoft Security Bulletin: Cumulative Security Update for Internet Explorer (2862772)</title>
		<link>http://www.itechwebdesign.co.uk/microsoft-security-bulletin-cumulative-security-update-for-internet-explorer-2862772/</link>
		<comments>http://www.itechwebdesign.co.uk/microsoft-security-bulletin-cumulative-security-update-for-internet-explorer-2862772/#comments</comments>
		<pubDate>Wed, 14 Aug 2013 13:59:18 +0000</pubDate>
		<dc:creator><![CDATA[itechwebdesign]]></dc:creator>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Technical]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Security]]></category>
		<category><![CDATA[Microsoft Security Bulletin]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Unicode]]></category>

		<guid isPermaLink="false">http://www.itechwebdesign.co.uk/?p=1225</guid>
		<description><![CDATA[This Microsoft security update resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>This Microsoft security update resolves eleven privately reported vulnerabilities in <strong>Internet Explorer</strong>.</p>
<p>The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using <strong>Internet Explorer</strong>.</p>
<p>An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p>
<p><strong>Maximum Severity Rating and Vulnerability Impact:</strong> Critical &#8211; Remote Code Execution</p>
<p><strong>Restart Requirement:</strong> Requires restart</p>
<p><strong>Affected Software:</strong> Microsoft Windows, <strong>Internet Explorer</strong></p>
<p>&nbsp;</p>
<h1>Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution</h1>
<p>This security update resolves a privately reported vulnerability in the <strong>Unicode Scripts Processor</strong> included in Microsoft Windows.</p>
<p>The vulnerability could allow remote code execution if a user viewed a specially crafted document or webpage with an application that supports embedded OpenType fonts.</p>
<p>An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p>
<p><strong>Maximum Severity Rating and Vulnerability Impact:</strong> Critical &#8211; Remote Code Execution</p>
<p><strong>Restart Requirement:</strong> May require restart</p>
<p><strong>Affected Software:</strong> Microsoft Windows<strong></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.itechwebdesign.co.uk/microsoft-security-bulletin-cumulative-security-update-for-internet-explorer-2862772/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
