<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet title="XSL_formatting" type="text/xsl" href="/static/rss/intro.xsl" ?>
  
<rss version="2.0">
    <channel>
        <title>Security Advisories</title>
        <link>http://security.salesforce.com</link>
        <description>undefined</description>
        <lastBuildDate>Wed, 15 Apr 2026 20:10:29 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <item>
            <title><![CDATA[[Security Update] Security Advisory: Ongoing Response to Social Engineering Threats]]></title>
            <link>https://status.salesforce.com/generalmessages/20000224</link>
            <guid>https://status.salesforce.com/generalmessages/20000224</guid>
            <pubDate>Thu, 02 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[ We are aware of recent extortion attempts by threat actors, which we have investigated in partnership with external experts and authorities. Our findings indicate these attempts relate to past or unsubstantiated incidents, and we remain engaged with affected customers to provide support.]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Advisory] Salesloft App Connections to Salesforce Disabled]]></title>
            <link>https://help.salesforce.com/s/articleView?id=005134951&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=005134951&amp;type=1</guid>
            <pubDate>Thu, 28 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[ Salesforce has disabled all integrations between Salesforce and Salesloft technologies, including the Drift app, as a precautionary measure. Organizations will not be able to connect to Salesforce via any Salesloft apps until further notice.
]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Advisory] Ongoing Security Response to Third-Party App Incident]]></title>
            <link>https://help.salesforce.com/s/articleView?id=005134951&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=005134951&amp;type=1</guid>
            <pubDate>Wed, 27 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[ Salesforce has disabled the connection between the Drift app by Salesloft and Salesforce after identifying a security incident. This issue did not stem from a vulnerability within the core Salesforce platform.

]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Advisory] Security Advisory Confirmation Required For Agentforce Actions]]></title>
            <link>https://help.salesforce.com/s/articleView?id=005133036&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=005133036&amp;type=1</guid>
            <pubDate>Mon, 25 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Agentforce] To enhance security against prompt injection risks in Agentforce and Einstein Generative AI, Salesforce is changing the “isConfirmationRequired” setting for “AddCaseComment”, “CancelOrder”, “CreateCase”, “CreateCaseEnhancedData”, “FinalizeNewDeliveryTime”, “FinalizeReservation”, “ResetPassword”, and “ResetSecurePassword” actions, ensuring Human-in-the-loop (HITL) confirmation before actioning. 

We are applying this proactive security measure to all Agentforce Standard actions to help reduce the risk of prompt injections. As a result, Service Agents will more frequently ask you to confirm an action before it is executed. We recommend customers configure their custom actions to require confirmation before completing any sensitive actions.











]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVE's for various vulnerabilities impacting some versions of Tableau Server and Tableau Desktop]]></title>
            <link>https://help.salesforce.com/s/articleView?id=005132575&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=005132575&amp;type=1</guid>
            <pubDate>Fri, 22 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Salesforce Security identified and resolved multiple vulnerabilities in Tableau Server as part of a proactive security assessment. Fixes for these issues were included in the July Maintenance Release, published on July 22, 2025. The CVE's are listed below.

CVE-2025-26496
CVE-2025-26497
CVE-2025-26498
CVE-2025-52450
CVE-2025-52451
]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Advisory] Confirmation Required For Agentforce Verified Contact and Customer Contact Actions]]></title>
            <link>https://help.salesforce.com/s/articleView?id=005132147&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=005132147&amp;type=1</guid>
            <pubDate>Thu, 14 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Agentforce] To enhance security against prompt injection risks in Agentforce and Einstein Generative AI, Salesforce is changing the “isConfirmationRequired” setting for “UpdateCustomerContact” and “UpdateVerifiedContact” actions, ensuring Human-in-the-loop (HITL) confirmation before updates. This proactive measure, part of our ongoing commitment to Trust, aims to reduce the likelihood and impact of prompt injection attacks. 
]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Advisory] Protect Your Salesforce Environment from Social Engineering Threats]]></title>
            <link>https://help.salesforce.com/s/articleView?id=005131463&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=005131463&amp;type=1</guid>
            <pubDate>Thu, 07 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Experience Cloud, Hyperforce, Sales Cloud, Salesforce Platform, Service Cloud] Security Advisory: As social engineering and phishing threats continue to rise, our top priority is to help customers strengthen their security posture.  We encourage all customers to review our blog post on the topic, which gathers some of the key resources to protect your environment against these types of attacks.]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVE's for various vulnerabilities impacting some versions of Tableau Server]]></title>
            <link>https://help.salesforce.com/s/articleView?id=005105043&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=005105043&amp;type=1</guid>
            <pubDate>Fri, 25 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] On June 26, 2025, an email was sent to all active Tableau Server accounts' portal administrators and security contacts regarding various vulnerabilities addressed in the June Maintenance Release, published on June 26, 2025.

This issue affects Tableau Server versions: before 2025.1.3, before 2024.2.12, before 2023.3.19.

The CVE's are listed below: 

CVE-2025-52446 

CVE-2025-52447 

CVE-2025-52448 

CVE-2025-52449 

CVE-2025-52452  

CVE-2025-52453 

CVE-2025-52454 

CVE-2025-52455 

]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Update] Security issue regarding Aura Controllers]]></title>
            <link>https://help.salesforce.com/s/articleView?id=005093502&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=005093502&amp;type=1</guid>
            <pubDate>Mon, 16 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[ Salesforce is aware of recent media reports regarding a security issue involving the Aura Controller.  We take these matters seriously and conduct ongoing system scans to proactively identify and address potential vulnerabilities. Protecting our customers and their data is our top priority.

Based on currently available information, we have not identified any evidence of exploitation related to this issue. Salesforce has already implemented a fix, and no customer action is required at this time.

Customers with additional questions are encouraged to contact Salesforce Support.



]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVEs affecting Flexcard and Data Mapper components of Omnistudio]]></title>
            <link>https://help.salesforce.com/s/articleView?id=004980323&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=004980323&amp;type=1</guid>
            <pubDate>Tue, 10 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Salesforce Platform] Salesforce is aware of the media reports of the security vulnerabilities affecting Omnistudio, CVEs 2025-43698, 2025-43700, 2025-43701, 2025-43699 and 2025-43697, which impact the Flexcard and Data Mapper components of Omnistudio.]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Update] Email Functionality Restrictions for Trial Signups from Salesforce.com]]></title>
            <link>https://help.salesforce.com/s/articleView?id=004633792&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=004633792&amp;type=1</guid>
            <pubDate>Tue, 08 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Salesforce Platform] Effective March 4, 2025 for Starter and ProSuite, March 5, 2025 for Service Enterprise Edition and Unlimited Edition, and March 20, 2025 for Sales Enterprise and Unlimited, the email functionality will be disabled for Trial Orgs provisioned through the Salesforce website during the standard 30 day evaluation period.]]></description>
        </item>
        <item>
            <title><![CDATA[[Security ] Take Action to Prevent Account Compromise ]]></title>
            <link>https://help.salesforce.com/s/articleView?id=004333226&amp;type=1&amp;language=en_US</link>
            <guid>https://help.salesforce.com/s/articleView?id=004333226&amp;type=1&amp;language=en_US</guid>
            <pubDate>Thu, 06 Feb 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Commerce Cloud, Marketing Cloud, Heroku, Tableau, Sales Cloud, Service Cloud, MuleSoft, Experience Cloud] User accounts without multi-factor authentication (MFA), IP restrictions, and/or that use weak credentials are at risk of being compromised by bad actors. See the Help article attached for an overview on how you can use customizable settings or implement Shield Event Monitoring to protect your user accounts. ]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Enhancements] Transition from RSA Key Exchanges to TLS 1.3]]></title>
            <link>https://help.salesforce.com/s/articleView?language=en_US&amp;id=002472175&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?language=en_US&amp;id=002472175&amp;type=1</guid>
            <pubDate>Thu, 23 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Sales Cloud, Service Cloud, Experience Cloud] Salesforce strongly recommends that customers transition from RSA key exchanges to TLS 1.3 to enhance the security and efficiency of network communications. ]]></description>
        </item>
        <item>
            <title><![CDATA[[Tableau Security Advisory ] Security Issue With Tableau Row Level Access Controls]]></title>
            <link>https://help.salesforce.com/s/articleView?id=003876261&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=003876261&amp;type=1</guid>
            <pubDate>Tue, 07 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau allows for row-level access controls to be implemented to database fields via a filter feature that designates whether a particular value is included or excluded in a query. As a result of a broken access control, in impacted versions, workbook fields with the filter compression feature enabled are exposed in data visualizations if new values are added to the fields after they were originally filtered. Tableau has disabled the filter compression feature by default in Tableau Cloud and Server for the November Maintenance release. 

 ]]></description>
        </item>
        <item>
            <title><![CDATA[[Tableau Security Advisory ] Security Issue Impacting Tableau Row Level Access Controls]]></title>
            <link>https://help.salesforce.com/s/articleView?id=003876261&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=003876261&amp;type=1</guid>
            <pubDate>Thu, 21 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Salesforce Security addressed a security issue impacting Tableau Cloud and Server workbooks in the August Maintenance release. We strongly encourage Tableau Server customers to apply the update associated with the major release, which can be downloaded from the Tableau Server Maintenance Release page.  Cloud customers do not need to take action as a patch was applied to Cloud instances on August 9, 2024. ]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Notification] User Email Functionality Temporary Outage]]></title>
            <link>https://help.salesforce.com/s/articleView?id=002953342&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=002953342&amp;type=1</guid>
            <pubDate>Fri, 18 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[[Salesforce Platform] To enhance the security functionality and help prevent abuse of free trial orgs, on October 8, 2024, we temporarily disabled user-initiated email functionality for Core CRM Product Trials  – this does not include Active customers or other Salesforce products.

]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] Local File Inclusion (LFI) vulnerability impacting some versions of Tableau Server]]></title>
            <link>https://help.salesforce.com/s/articleView?id=001497664&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=001497664&amp;type=1</guid>
            <pubDate>Fri, 04 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Salesforce Security discovered a vulnerability affecting the email notification functionality of Tableau's Flow Editor feature. As a result of this issue, an authenticated user could execute arbitrary commands on customers’ instances of Tableau Server. We assigned the CVSSv3 score as 9.1.]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVE-2023-46604]]></title>
            <link>https://kb.tableau.com/articles/Issue/remote-code-execution-rce-vulnerability-impacting-apache-activemq-clients</link>
            <guid>https://kb.tableau.com/articles/Issue/remote-code-execution-rce-vulnerability-impacting-apache-activemq-clients</guid>
            <pubDate>Mon, 01 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] On November 2, 2023, Salesforce Security was notified of CVE-2023-46604, a remote code execution (RCE) vulnerability impacting Apache ActiveMQ clients.]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] Local File Inclusion (LFI) vulnerability affecting on-prem Tableau Servers]]></title>
            <link>https://kb.tableau.com/articles/Issue/local-file-inclusion-lfi-vulnerability-impacting-some-versions-of-tableau-server</link>
            <guid>https://kb.tableau.com/articles/Issue/local-file-inclusion-lfi-vulnerability-impacting-some-versions-of-tableau-server</guid>
            <pubDate>Fri, 01 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] On May 11, 2023, a Local File Inclusion (LFI) security vulnerability was reported via our Advanced Server Access (ASA) Program.
]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVE-2023-46604]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000396859&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000396859&amp;type=1</guid>
            <pubDate>Fri, 02 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[ Salesforce is actively investigating CVE-2023-46604 for potential impact and implementing mitigations where necessary.  Salesforce will continue to follow its vulnerability management process, and should we discover evidence of unauthorized access to customer data, will notify impacted parties without undue delay.]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] Tableau Security Notification]]></title>
            <link>https://kb.tableau.com/articles/Issue/tableau-security-notification-server-side-request-forgery</link>
            <guid>https://kb.tableau.com/articles/Issue/tableau-security-notification-server-side-request-forgery</guid>
            <pubDate>Thu, 07 Sep 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Server-side request forgery vulnerability which could allow a malicious actor to authenticate into instances of Tableau Server to access customers’ hosted data.]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVE-2023-26136]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000395871&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000395871&amp;type=1</guid>
            <pubDate>Mon, 17 Jul 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[ JavaScript vulnerability affecting the Salesforce tough-cookie open-source NPM project, which could allow a malicious actor to attach cookie data to a global namespace.]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Update] Security Assessments]]></title>
            <link>https://kb.tableau.com/articles/issue/adv-2023-001-tabpy-unauthenticated-access-to-tableau-server</link>
            <guid>https://kb.tableau.com/articles/issue/adv-2023-001-tabpy-unauthenticated-access-to-tableau-server</guid>
            <pubDate>Wed, 28 Jun 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau Python Server (TabPy) installations may be configured to execute arbitrary python code without authentication. Products Affected: TabPy 2.8.0 and earlier.]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVE-2023-34362, CVE-2023-35036, CVE-2023-35708, CVE-2023-36932, CVE-2023-36933, CVE-2023-36934]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000395641&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000395641&amp;type=1</guid>
            <pubDate>Tue, 13 Jun 2023 09:00:00 GMT</pubDate>
            <description><![CDATA[ Vulnerabilities could lead to unauthorized access to the MOVEit file transfer product and environment. No impact to Salesforce customer data at this time. On June 16, an additional critical vulnerability (ending in 708) was announced. On July 5, CVEs ending in 932, 933, and 934 were announced.]]></description>
        </item>
        <item>
            <title><![CDATA[[Process Update] Security Assessments]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000394469&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000394469&amp;type=1</guid>
            <pubDate>Tue, 31 Jan 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[ Customers are no longer required to obtain prior approval before performing security assessments for Salesforce products.]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVE-2022-22128]]></title>
            <link>https://kb.tableau.com/articles/Issue/issue-affecting-tableau-server-administration-agent</link>
            <guid>https://kb.tableau.com/articles/Issue/issue-affecting-tableau-server-administration-agent</guid>
            <pubDate>Fri, 14 Oct 2022 11:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Issue affecting Tableau Server Administration Agent]]></description>
        </item>
        <item>
            <title><![CDATA[[ Vulnerability] Tableau security update]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000365859&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000365859&amp;type=1</guid>
            <pubDate>Wed, 22 Jun 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau Server logging Personal Access Tokens into internal log repositories]]></description>
        </item>
        <item>
            <title><![CDATA[[ Vulnerability] CVE-2022-22127]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000365493&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000365493&amp;type=1</guid>
            <pubDate>Mon, 23 May 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Broken access control vulnerability in Tableau Server]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Notification] Heroku security notification]]></title>
            <link>https://status.heroku.com/incidents/2413</link>
            <guid>https://status.heroku.com/incidents/2413</guid>
            <pubDate>Fri, 15 Apr 2022 10:45:00 GMT</pubDate>
            <description><![CDATA[[Heroku] GitHub repositories connected to Heroku issue]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] Spring4Shell Security Update]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000365020&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000365020&amp;type=1</guid>
            <pubDate>Wed, 30 Mar 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau, Slack, Service Cloud, Salesforce Einstein, Salesforce Platform, Sales Cloud, Quip, Pardot, MuleSoft, Marketing Cloud, Hyperforce, Heroku, Experience Cloud, Commerce Cloud, ClickSoftware] Spring4Shell vulnerability published in March 2022]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] Apache Log4j2 vulnerability]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000363736&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000363736&amp;type=1</guid>
            <pubDate>Fri, 10 Dec 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau, Service Cloud, Slack, Salesforce Einstein, Salesforce Platform, Sales Cloud, Quip, Pardot, MuleSoft, Marketing Cloud, Hyperforce, Heroku, Experience Cloud, ClickSoftware, Commerce Cloud] Apache Log4j2 vulnerability published on December 10, 2021]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Update] Nobelium Attacks Targeting Cloud Services, Supply Chains]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000363417&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000363417&amp;type=1</guid>
            <pubDate>Wed, 27 Oct 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[ Response to October 24, 2021, Microsoft blog post]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2021-017]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000363324&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000363324&amp;type=1</guid>
            <pubDate>Thu, 21 Oct 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Sensitive Information Exposure]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Update] Configuration of Salesforce Developer Experience Command Line Interface]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000363271&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000363271&amp;type=1</guid>
            <pubDate>Mon, 04 Oct 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[ Response to October 4, 2021, CERT Coordination Center note (VU#883754) ]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2021-016]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000363184&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000363184&amp;type=1</guid>
            <pubDate>Wed, 22 Sep 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Information Disclosure]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Notification] Oracle NetSuite and SAP SuccessFactors connectors issue]]></title>
            <link>https://kb.tableau.com/articles/issue/oracle-netsuite-and-sap-successfactors-connectors-used-in-tableau-gallery-may-be-storing-sensitive-data</link>
            <guid>https://kb.tableau.com/articles/issue/oracle-netsuite-and-sap-successfactors-connectors-used-in-tableau-gallery-may-be-storing-sensitive-data</guid>
            <pubDate>Mon, 16 Aug 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[ Oracle NetSuite and SAP SuccessFactors connectors used in Tableau Gallery may be storing sensitive data in a subset of Tableau On-Premise customers’ logging infrastructure  ]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Update] Configuration of Salesforce Sites and Communities Guest User Access Control Permissions]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000362826&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000362826&amp;type=1</guid>
            <pubDate>Wed, 11 Aug 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[ Response to August 10, 2021, Varonis blog post]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVE-2021-1630]]></title>
            <link>https://help.salesforce.com/articleView?id=000362693&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000362693&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 28 Jul 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[MuleSoft] XML external entity (XXE) vulnerability in Mule runtime]]></description>
        </item>
        <item>
            <title><![CDATA[[Ransomware] Kaseya Ransomware Attack]]></title>
            <link>https://help.salesforce.com/articleView?id=000359083&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000359083&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 07 Jul 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[ Kaseya VSA ransomware attack on July 2, 2021
]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2021-015]]></title>
            <link>https://help.salesforce.com/articleView?id=000358970&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000358970&amp;type=1&amp;mode=1</guid>
            <pubDate>Tue, 22 Jun 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Improper Data Cache Access Control When Using Initial SQL]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2021-013]]></title>
            <link>https://help.salesforce.com/articleView?id=000358015&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000358015&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 22 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Sensitive Information Logged]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] Codecov Bash Uploader Compromise]]></title>
            <link>https://help.salesforce.com/articleView?id=000358035&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000358035&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 15 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[ Bash Uploader users’ secrets compromised by threat actor]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2021-009]]></title>
            <link>https://help.salesforce.com/articleView?id=000357456&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000357456&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 25 Mar 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Information Disclosure]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] Microsoft Exchange Server vulnerabilities]]></title>
            <link>https://help.salesforce.com/articleView?id=000357525&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000357525&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 24 Mar 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[ Microsoft Exchange Server vulnerabilities published on March 2, 2021 ]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2021-010]]></title>
            <link>https://help.salesforce.com/articleView?id=000357424&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000357424&amp;type=1&amp;mode=1</guid>
            <pubDate>Tue, 23 Mar 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau Server Open Redirect]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2021-011]]></title>
            <link>https://help.salesforce.com/articleView?id=000357453&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000357453&amp;type=1&amp;mode=1</guid>
            <pubDate>Tue, 23 Mar 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Denial of Service Vulnerability in Tableau Server]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2021-012]]></title>
            <link>https://help.salesforce.com/articleView?id=000357454&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000357454&amp;type=1&amp;mode=1</guid>
            <pubDate>Tue, 23 Mar 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] HTML Injection in Emails]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVE-2021-1627]]></title>
            <link>https://help.salesforce.com/articleView?id=000357383&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000357383&amp;type=1&amp;mode=1</guid>
            <pubDate>Mon, 22 Mar 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[MuleSoft] Server Side Request Forgery in Mule runtime]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVE-2021-1626]]></title>
            <link>https://help.salesforce.com/articleView?id=000357382&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000357382&amp;type=1&amp;mode=1</guid>
            <pubDate>Mon, 22 Mar 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[MuleSoft] Remote Code Execution vulnerability in Mule runtime]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVE-2021-1628]]></title>
            <link>https://help.salesforce.com/articleView?id=000357384&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000357384&amp;type=1&amp;mode=1</guid>
            <pubDate>Mon, 22 Mar 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[MuleSoft] XML External Entity (XXE) vulnerability in Mule runtime]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2021-005]]></title>
            <link>https://help.salesforce.com/articleView?id=000356891&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356891&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 25 Feb 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau Server Logs Postgres Repository Password]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2021-007]]></title>
            <link>https://help.salesforce.com/articleView?id=000356889&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356889&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 25 Feb 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Database Password Logged in Debug Log]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2021-008]]></title>
            <link>https://help.salesforce.com/articleView?id=000356888&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356888&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 25 Feb 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Information Disclosure]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2021-006]]></title>
            <link>https://help.salesforce.com/articleView?id=000356890&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356890&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 25 Feb 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Not All Secrets Encrypted In Configuration]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2021-004]]></title>
            <link>https://help.salesforce.com/articleView?id=000356295&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356295&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 21 Jan 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Memory Corruption]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2021-003]]></title>
            <link>https://help.salesforce.com/articleView?id=000356296&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356296&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 21 Jan 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Authentication Bypass in IPv6 Networks]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2021-001]]></title>
            <link>https://help.salesforce.com/articleView?id=000356299&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356299&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 21 Jan 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Reflected Error Message Content Injection]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2021-002]]></title>
            <link>https://help.salesforce.com/articleView?id=000356297&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356297&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 21 Jan 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Information Disclosure]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2020-059]]></title>
            <link>https://help.salesforce.com/articleView?id=000356022&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356022&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 16 Dec 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau Fixes a Vulnerability in QtWebEngine]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability ] ADV-2020-060]]></title>
            <link>https://help.salesforce.com/articleView?id=000356023&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356023&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 16 Dec 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau Server Default Installation Weak Folder Permissions]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2020-061]]></title>
            <link>https://help.salesforce.com/articleView?id=000356024&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356024&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 16 Dec 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau Server Non-Default Installation Weak Folder Permissions]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] SolarWinds Software Compromise]]></title>
            <link>https://help.salesforce.com/articleView?id=000356007&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356007&amp;type=1&amp;mode=1</guid>
            <pubDate>Tue, 15 Dec 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[ Federal government and Fortune 500 companies compromised by supply chain attack]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVE-2020-6939]]></title>
            <link>https://help.salesforce.com/articleView?id=000355686&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000355686&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 19 Nov 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Unauthenticated API Endpoints]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2020-057]]></title>
            <link>https://help.salesforce.com/articleView?id=000355688&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000355688&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 19 Nov 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] File Path Disclosure of Temporary Files]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2020-056]]></title>
            <link>https://help.salesforce.com/articleView?id=000355687&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000355687&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 19 Nov 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Unauthenticated API Endpoints]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2020-058]]></title>
            <link>https://help.salesforce.com/articleView?id=000355713&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000355713&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 19 Nov 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Privilege Escalation in Tableau Products]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2020-053]]></title>
            <link>https://help.salesforce.com/articleView?id=000355523&amp;language=en_US&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000355523&amp;language=en_US&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 29 Oct 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Non-ASCII characters parsing error]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2020-052]]></title>
            <link>https://help.salesforce.com/articleView?id=000355522&amp;language=en_US&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000355522&amp;language=en_US&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 29 Oct 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau Server Allows External Web Pages In Web Zones]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2020-054]]></title>
            <link>https://help.salesforce.com/articleView?language=en_US&amp;type=1&amp;mode=1&amp;id=000355524</link>
            <guid>https://help.salesforce.com/articleView?language=en_US&amp;type=1&amp;mode=1&amp;id=000355524</guid>
            <pubDate>Thu, 29 Oct 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau Desktop stores plaintext secrets in configuration file]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2020-055]]></title>
            <link>https://help.salesforce.com/articleView?id=000355525&amp;language=en_US&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000355525&amp;language=en_US&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 29 Oct 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Database Credentials In Log Files]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2020-051]]></title>
            <link>https://help.salesforce.com/articleView?id=000355243&amp;language=en_US&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000355243&amp;language=en_US&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 30 Sep 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau Products Integer Overflow]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2020-046]]></title>
            <link>https://help.salesforce.com/articleView?id=000354775&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000354775&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 27 Aug 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau Server Sensitive Values In Logs]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2020-047]]></title>
            <link>https://help.salesforce.com/articleView?id=000354776&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000354776&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 27 Aug 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Some Permission Changes Don't Take Effect Until Server Restart]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2020-045]]></title>
            <link>https://help.salesforce.com/articleView?id=000354774&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000354774&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 27 Aug 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau Server Logs Contain Webhook URLs]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2020-044]]></title>
            <link>https://help.salesforce.com/articleView?id=000354773&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000354773&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 27 Aug 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] External Service Connection Fails To Validate Host Name]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2020-048]]></title>
            <link>https://help.salesforce.com/articleView?id=000354777&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000354777&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 27 Aug 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau Server Sensitive Values In Log File Location]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2020-049]]></title>
            <link>https://help.salesforce.com/articleView?id=000354778&amp;language=en_US&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000354778&amp;language=en_US&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 27 Aug 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Plaintext Data Source Secrets In Repository]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] ADV-2020-050]]></title>
            <link>https://help.salesforce.com/articleView?id=000354779&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000354779&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 27 Aug 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] REST API Returns a Site Configuration Value to Unauthenticated Users]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVE-2020-6938]]></title>
            <link>https://help.salesforce.com/articleView?id=000354158&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000354158&amp;type=1&amp;mode=1</guid>
            <pubDate>Tue, 07 Jul 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Sensitive information disclosure vulnerability in Tableau Server]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVE-2020-6937]]></title>
            <link>https://help.mulesoft.com/s/article/High-security-issue-affecting-Mule-runtimes-of-all-supported-versions-March-19th-2020</link>
            <guid>https://help.mulesoft.com/s/article/High-security-issue-affecting-Mule-runtimes-of-all-supported-versions-March-19th-2020</guid>
            <pubDate>Tue, 26 May 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[MuleSoft] Denial of Service vulnerability in Mule runtime]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Enhancements] COVID-19 Business Continuity Statement]]></title>
            <link>https://help.salesforce.com/articleView?id=000352932&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000352932&amp;type=1&amp;mode=1</guid>
            <pubDate>Tue, 17 Mar 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[ Salesforce has not experienced any significant business impacts]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVE-2019-15631]]></title>
            <link>https://help.salesforce.com/articleView?id=000351827&amp;language=en_US&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000351827&amp;language=en_US&amp;type=1&amp;mode=1</guid>
            <pubDate>Fri, 29 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[[MuleSoft] Remote Code Execution in Mule runtime and API Gateway]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVE-2019-15630]]></title>
            <link>https://help.mulesoft.com/s/article/Directory-traversal-vulnerability-affecting-runtimes-of-MuleSoft-customers-running-certain-use-cases-of-Mule-flows-and-API-Gateways</link>
            <guid>https://help.mulesoft.com/s/article/Directory-traversal-vulnerability-affecting-runtimes-of-MuleSoft-customers-running-certain-use-cases-of-Mule-flows-and-API-Gateways</guid>
            <pubDate>Fri, 30 Aug 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[[MuleSoft] Directory Traversal in MuleSoft Runtime]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Enhancements] Manage Security Contacts for Your Organization]]></title>
            <link>https://help.salesforce.com/articleView?id=000349483&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000349483&amp;type=1&amp;mode=1</guid>
            <pubDate>Mon, 01 Jul 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[ If your organization is impacted by an information security incident, your organization’s Security Contact(s) will be notified.]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Enhancements] Enhancements to Security of Community and Portal Users]]></title>
            <link>https://help.salesforce.com/articleView?id=000323376&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000323376&amp;type=1&amp;mode=1</guid>
            <pubDate>Mon, 13 May 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[ Potential impact to default sharing settings]]></description>
        </item>
        <item>
            <title><![CDATA[[Email Scam] Phishing Campaign]]></title>
            <link>https://help.salesforce.com/articleView?id=000318462&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000318462&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 28 Nov 2018 00:00:00 GMT</pubDate>
            <description><![CDATA[ Salesforce-themed phishing campaign]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] Salesforce Security Vulnerability]]></title>
            <link>https://help.salesforce.com/articleView?id=000312863&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000312863&amp;type=1&amp;mode=1</guid>
            <pubDate>Fri, 05 Oct 2018 00:00:00 GMT</pubDate>
            <description><![CDATA[ Security vulnerability impact on Salesforce Sites and Communities]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] Twitter Account Activity API]]></title>
            <link>https://help.salesforce.com/articleView?id=000312848&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000312848&amp;type=1&amp;mode=1</guid>
            <pubDate>Fri, 21 Sep 2018 00:00:00 GMT</pubDate>
            <description><![CDATA[ Vulnerability of Twitter Account Activity API]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability/Ransomware] MS17-010 Vulnerability (AKA EternalBlue)]]></title>
            <link>https://help.salesforce.com/articleView?id=000320088&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000320088&amp;type=1&amp;mode=1</guid>
            <pubDate>Tue, 27 Jun 2017 00:00:00 GMT</pubDate>
            <description><![CDATA[ Malware leveraging MS17-010 (AKA EternalBlue) Vulnerability]]></description>
        </item>
        <item>
            <title><![CDATA[[Malware] TrickBot / The Trick]]></title>
            <link>https://help.salesforce.com/articleView?id=000319415&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000319415&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 21 Jun 2017 00:00:00 GMT</pubDate>
            <description><![CDATA[ Malware may target Salesforce Users.]]></description>
        </item>
        <item>
            <title><![CDATA[[Ransomware] WannaCry Ransomware]]></title>
            <link>https://help.salesforce.com/articleView?id=000317521&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000317521&amp;type=1&amp;mode=1</guid>
            <pubDate>Mon, 15 May 2017 00:00:00 GMT</pubDate>
            <description><![CDATA[ Ransomware targeting Windows "Eternal Blue" vulnerability.]]></description>
        </item>
        <item>
            <title><![CDATA[[Email Scam] Google Docs Phishing Campaign]]></title>
            <link>https://trust.salesforce.com/en/security/stay-current-security/</link>
            <guid>https://trust.salesforce.com/en/security/stay-current-security/</guid>
            <pubDate>Wed, 03 May 2017 00:00:00 GMT</pubDate>
            <description><![CDATA[ Google Docs invitation containing a phishing link.]]></description>
        </item>
        <item>
            <title><![CDATA[[Service Provider Vulnerability] Cloudflare Vulnerability]]></title>
            <link>https://help.salesforce.com/articleView?id=000320268&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000320268&amp;type=1&amp;mode=1</guid>
            <pubDate>Mon, 27 Feb 2017 00:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare, an embedded content delivery network and internet security services provider, disclosed a security vulnerability in their edge servers, which could expose information such as HTTP cookies, authentication tokens, and HTTP POST bodies.]]></description>
        </item>
    </channel>
</rss>