<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ruby on Rails vulnerability CVE-2013-0156 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ruby-on-rails-vulnerability-cve-2013-0156/m-p/10162#M7458</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When can we expect a content release to address the Ruby on Rails vulnerability CVE-2013-0156?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 17 Jan 2013 15:08:07 GMT</pubDate>
    <dc:creator>w_h_789</dc:creator>
    <dc:date>2013-01-17T15:08:07Z</dc:date>
    <item>
      <title>Ruby on Rails vulnerability CVE-2013-0156</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ruby-on-rails-vulnerability-cve-2013-0156/m-p/10162#M7458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When can we expect a content release to address the Ruby on Rails vulnerability CVE-2013-0156?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jan 2013 15:08:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ruby-on-rails-vulnerability-cve-2013-0156/m-p/10162#M7458</guid>
      <dc:creator>w_h_789</dc:creator>
      <dc:date>2013-01-17T15:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: Ruby on Rails vulnerability CVE-2013-0156</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ruby-on-rails-vulnerability-cve-2013-0156/m-p/10163#M7459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Content team is working on providing coverage. I've requested ETA and will relay upon receipt of an update. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jan 2013 15:19:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ruby-on-rails-vulnerability-cve-2013-0156/m-p/10163#M7459</guid>
      <dc:creator>gswcowboy</dc:creator>
      <dc:date>2013-01-17T15:19:13Z</dc:date>
    </item>
    <item>
      <title>Re: Ruby on Rails vulnerability CVE-2013-0156</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ruby-on-rails-vulnerability-cve-2013-0156/m-p/10164#M7460</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Per our Content Team, coverage for this specific CVE was provided and will be deployed in version 352 (Tuesday evening of next week)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 14:27:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ruby-on-rails-vulnerability-cve-2013-0156/m-p/10164#M7460</guid>
      <dc:creator>gswcowboy</dc:creator>
      <dc:date>2013-01-23T14:27:16Z</dc:date>
    </item>
  </channel>
</rss>

