<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Adobe zero-day vulnerability security advisory in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/adobe-zero-day-vulnerability-security-advisory/m-p/45818#M33669</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;Adobe released a security advisory (&lt;A href="http://www.adobe.com/support/security/advisories/apsa10-05.html"&gt;APSA10-05&lt;/A&gt;) today about a zero-day "critical" vulnerability in Adobe Flash Player, Adobe Reader and Acrobat that can be exploited remotely. For details regarding affected versions and OS, please refer to Adobe's security advisory.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;We are doing an emergency content release (expected to be out by tomorrow) to protect against related exploits. Stay tuned.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Thanks,&lt;BR /&gt;Sandeep &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 29 Oct 2010 00:19:15 GMT</pubDate>
    <dc:creator>migration</dc:creator>
    <dc:date>2010-10-29T00:19:15Z</dc:date>
    <item>
      <title>Adobe zero-day vulnerability security advisory</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adobe-zero-day-vulnerability-security-advisory/m-p/45818#M33669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;Adobe released a security advisory (&lt;A href="http://www.adobe.com/support/security/advisories/apsa10-05.html"&gt;APSA10-05&lt;/A&gt;) today about a zero-day "critical" vulnerability in Adobe Flash Player, Adobe Reader and Acrobat that can be exploited remotely. For details regarding affected versions and OS, please refer to Adobe's security advisory.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;We are doing an emergency content release (expected to be out by tomorrow) to protect against related exploits. Stay tuned.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Thanks,&lt;BR /&gt;Sandeep &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Oct 2010 00:19:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adobe-zero-day-vulnerability-security-advisory/m-p/45818#M33669</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2010-10-29T00:19:15Z</dc:date>
    </item>
    <item>
      <title>Re: Adobe zero-day vulnerability security advisory</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adobe-zero-day-vulnerability-security-advisory/m-p/45819#M33670</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Content release 214 has been posted which contains signature for protecting against critical Adobe zero-day vulnerability that was made public yesterday. Please refer to release notes for more details.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Sandeep &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Oct 2010 19:47:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adobe-zero-day-vulnerability-security-advisory/m-p/45819#M33670</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2010-10-29T19:47:49Z</dc:date>
    </item>
  </channel>
</rss>

