<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Another Adobe security update in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Another-Adobe-security-update/m-p/23610#M1390</link>
    <description>&lt;P&gt;Do you use Adobe ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know I do, and the patches just keep coming.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Adobe has released yet another update to fix yet another critical vulnerability in Flash, Campaign and ColdFusion. That's three major software tools.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And yet again, the patches fix issues that allow attackers to run arbitrary code, and this time, on Windows, Mac, Linux and Chrome OS. that's a nice bunch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If like us, you have thousands of machines which use an effected version of flash, you know you are in for a fun time figuring out how to update everyone fast.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Look for CVE-2019-7845.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best of luck !&lt;/P&gt;</description>
    <pubDate>Thu, 13 Jun 2019 05:49:02 GMT</pubDate>
    <dc:creator>MikeGlassman</dc:creator>
    <dc:date>2019-06-13T05:49:02Z</dc:date>
    <item>
      <title>Another Adobe security update</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Another-Adobe-security-update/m-p/23610#M1390</link>
      <description>&lt;P&gt;Do you use Adobe ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know I do, and the patches just keep coming.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Adobe has released yet another update to fix yet another critical vulnerability in Flash, Campaign and ColdFusion. That's three major software tools.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And yet again, the patches fix issues that allow attackers to run arbitrary code, and this time, on Windows, Mac, Linux and Chrome OS. that's a nice bunch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If like us, you have thousands of machines which use an effected version of flash, you know you are in for a fun time figuring out how to update everyone fast.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Look for CVE-2019-7845.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best of luck !&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2019 05:49:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Another-Adobe-security-update/m-p/23610#M1390</guid>
      <dc:creator>MikeGlassman</dc:creator>
      <dc:date>2019-06-13T05:49:02Z</dc:date>
    </item>
    <item>
      <title>Re: Another Adobe security update</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Another-Adobe-security-update/m-p/23821#M1398</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Most of the Adobe solutions we have are on end-user systems, and since I have to deal with vulnerability&amp;nbsp;alerts about Linux, Microsoft, Cisco, Apache, Juniper, Orable, SQL, and so on, Adobe isn't so much of a pain...&amp;nbsp; &lt;img id="manwink" class="emoticon emoticon-manwink" src="https://community.isc2.org/i/smilies/16x16_man-wink.png" alt="Man Wink" title="Man Wink" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 19:47:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Another-Adobe-security-update/m-p/23821#M1398</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2019-06-17T19:47:46Z</dc:date>
    </item>
  </channel>
</rss>

