FeedReader 2.9

FeedReader - (Freeware)



FeedReader is a multitasking RSS reader that can recover simultaneous information flow from multiple sources.

FeedReader is software that allows you to organize and add as many RSS feeds as you like and manage RSS and ATOM formats. Simple to use, it has a simple interface that allows you to comfortably read all the news from your favorite sites. This is light and practical application and is available in nineteen languages,which allows it to be used on five continents .

Feedreader automatically downloads updates from your favorite Web sites. So, it eliminates the need for you to constantly monitor multiple Web pages, while allowing you to immediately identify and retrieve new articles - no matter how long you've been away from your desk.

With loading and quick navigation, FeedReader quickly becomes an indispensable always be aware of the latest news and tools allow you to expand your skills and your knowledge if you thirst for culture. Its handling is very fast because it has a very clean interface with which the user becomes familiar quickly.

Title:
FeedReader 2.9
File Size:
1.5 MB
Requirements:
Windows 2000 / XP / Vista / Windows7 / XP64 / Vista64 / Windows7 64 / Windows8 / Windows8 64
Language:
en-us
License:
Freeware
Date Added:
17 Apr 2006
Publisher:
FeedReader
Homepage:
http://www.feedreader.com
MD5 Checksum:
110F21A25C0F70332082C9F81706998F

# This release fixes several security vulnerabilities in the VMware DHCP server that could enable a malicious web page to gain system-level privileges.
Thanks to Neel Mehta and Ryan Smith of the IBM Internet Security Systems X-Force for discovering and researching these vulnerabilities.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the following names to these issues: CVE-2007-0061, CVE-2007-0062, CVE-2007-0063.
# This release fixes a security vulnerability that could allow a guest operating system user with administrative privileges to cause memory corruption in a host process, and thus potentially execute arbitrary code on the host. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the following name to this issue: CVE-2007-4496.
Thanks to Rafal Wojtczvk of McAfee for identifying and reporting this issue.
# This release fixes a security vulnerability that could allow a guest operating system user without administrator privileges to cause a host process to become unresponsive or exit unexpectedly, making the guest operating system unusable. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the following name to this issue: CVE-2007-4497.
Thanks to Rafal Wojtczvk of McAfee for identifying and reporting this issue.
# This release fixes a security vulnerability that could allow a malicious remote user to exploit the library file IntraProcessLogging.dll to overwrite files in a system.
Thanks to the Goodfellas Security Research Team for discovering and researching these vulnerabilities.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the following name to this issue: CVE-2007-4059.
# This release fixes a security vulnerability that could allow a malicious remote user to exploit the library file vielib.dll to overwrite files in a system.
Thanks to the Goodfellas Security Research Team for discovering and researching these vulnerabilities.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the following names to this issue: CVE-2007-4155.
# This release fixes a problem that prevented VMware Player from launching. This problem was accompanied by the error message VMware Player unrecoverable error: (player) Exception 0xc0000005 (access violation) has occurred. This problem could result in a security vulnerability from images stored in virtual machines downloaded by the user.
# This release fixes a security vulnerability in which VMware Player was starting registered Windows services such as the Authorization service with "bare" (unquoted) paths, such as c:program filesvmware.... Applications and services in Windows must be started with a quoted path. This vulnerability could allow a malicious user to escalate user privileges.
Thanks to Foundstone for discovering this vulnerability.




Screenshots

Related software





User Rating:

4.8/5 from 45 users