<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet title="XSL_formatting" type="text/xsl" href="/static/rss/intro.xsl" ?>
  
<rss version="2.0">
    <channel>
        <title>Security Advisories</title>
        <link>http://security.salesforce.com</link>
        <description>undefined</description>
        <lastBuildDate>Fri, 17 Apr 2026 16:28:47 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <item>
            <title><![CDATA[[Security Update] Security Advisory: Ongoing Response to Social Engineering Threats]]></title>
            <link>https://status.salesforce.com/generalmessages/20000224</link>
            <guid>https://status.salesforce.com/generalmessages/20000224</guid>
            <pubDate>Thu, 02 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[ We are aware of recent extortion attempts by threat actors, which we have investigated in partnership with external experts and authorities. Our findings indicate these attempts relate to past or unsubstantiated incidents, and we remain engaged with affected customers to provide support.]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Advisory] Salesloft App Connections to Salesforce Disabled]]></title>
            <link>https://help.salesforce.com/s/articleView?id=005134951&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=005134951&amp;type=1</guid>
            <pubDate>Thu, 28 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[ Salesforce has disabled all integrations between Salesforce and Salesloft technologies, including the Drift app, as a precautionary measure. Organizations will not be able to connect to Salesforce via any Salesloft apps until further notice.
]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Advisory] Ongoing Security Response to Third-Party App Incident]]></title>
            <link>https://help.salesforce.com/s/articleView?id=005134951&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=005134951&amp;type=1</guid>
            <pubDate>Wed, 27 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[ Salesforce has disabled the connection between the Drift app by Salesloft and Salesforce after identifying a security incident. This issue did not stem from a vulnerability within the core Salesforce platform.

]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Advisory] Security Advisory Confirmation Required For Agentforce Actions]]></title>
            <link>https://help.salesforce.com/s/articleView?id=005133036&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=005133036&amp;type=1</guid>
            <pubDate>Mon, 25 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Agentforce] To enhance security against prompt injection risks in Agentforce and Einstein Generative AI, Salesforce is changing the “isConfirmationRequired” setting for “AddCaseComment”, “CancelOrder”, “CreateCase”, “CreateCaseEnhancedData”, “FinalizeNewDeliveryTime”, “FinalizeReservation”, “ResetPassword”, and “ResetSecurePassword” actions, ensuring Human-in-the-loop (HITL) confirmation before actioning. 

We are applying this proactive security measure to all Agentforce Standard actions to help reduce the risk of prompt injections. As a result, Service Agents will more frequently ask you to confirm an action before it is executed. We recommend customers configure their custom actions to require confirmation before completing any sensitive actions.











]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability] CVE's for various vulnerabilities impacting some versions of Tableau Server and Tableau Desktop]]></title>
            <link>https://help.salesforce.com/s/articleView?id=005132575&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=005132575&amp;type=1</guid>
            <pubDate>Fri, 22 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Salesforce Security identified and resolved multiple vulnerabilities in Tableau Server as part of a proactive security assessment. Fixes for these issues were included in the July Maintenance Release, published on July 22, 2025. The CVE's are listed below.

CVE-2025-26496
CVE-2025-26497
CVE-2025-26498
CVE-2025-52450
CVE-2025-52451
]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Advisory] Confirmation Required For Agentforce Verified Contact and Customer Contact Actions]]></title>
            <link>https://help.salesforce.com/s/articleView?id=005132147&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=005132147&amp;type=1</guid>
            <pubDate>Thu, 14 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Agentforce] To enhance security against prompt injection risks in Agentforce and Einstein Generative AI, Salesforce is changing the “isConfirmationRequired” setting for “UpdateCustomerContact” and “UpdateVerifiedContact” actions, ensuring Human-in-the-loop (HITL) confirmation before updates. This proactive measure, part of our ongoing commitment to Trust, aims to reduce the likelihood and impact of prompt injection attacks. 
]]></description>
        </item>
        <item>
            <title><![CDATA[[Security Advisory] Protect Your Salesforce Environment from Social Engineering Threats]]></title>
            <link>https://help.salesforce.com/s/articleView?id=005131463&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=005131463&amp;type=1</guid>
            <pubDate>Thu, 07 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Experience Cloud, Hyperforce, Sales Cloud, Salesforce Platform, Service Cloud] Security Advisory: As social engineering and phishing threats continue to rise, our top priority is to help customers strengthen their security posture.  We encourage all customers to review our blog post on the topic, which gathers some of the key resources to protect your environment against these types of attacks.]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] CVE per varie vulnerabilità che interessano alcune versioni di Tableau Server]]></title>
            <link>https://help.salesforce.com/s/articleView?id=005105043&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=005105043&amp;type=1</guid>
            <pubDate>Fri, 25 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Il 26 giugno 2025 è stata inviata un'email a tutti gli amministratori del portale e ai referenti della sicurezza degli account Tableau Server attivi in merito a svariate vulnerabilità affrontate nel rilascio di manutenzione di giugno, pubblicato il 26 giugno 2025. Questo problema interessa le versioni di Tableau Server: precedenti alla 2025.1.3, precedenti alla 2024.2.12, precedenti alla 2023.3.19. Le CVE sono elencate di seguito: CVE-2025-52446 CVE-2025-52447 CVE-2025-52448 CVE-2025-52449 CVE-2025-52452 CVE-2025-52453 CVE-2025-52454 CVE-2025-52455 

]]></description>
        </item>
        <item>
            <title><![CDATA[[Aggiornamento di sicurezza] Problema di sicurezza relativo ai controller Aura]]></title>
            <link>https://help.salesforce.com/s/articleView?id=005093502&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=005093502&amp;type=1</guid>
            <pubDate>Mon, 16 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[ Salesforce è a conoscenza delle recenti notizie riportate dai media relative a un problema di sicurezza che coinvolge il controller Aura. Prendiamo molto sul serio queste questioni ed eseguiamo analisi del sistema costanti per identificare e risolvere le vulnerabilità potenziali. La protezione dei nostri clienti e dei loro dati è la nostra priorità principale. In base alle informazioni disponibili al momento, non abbiamo individuato alcuna prova di sfruttamento correlata a questo problema. Salesforce ha già implementato una correzione e non è richiesto alcun intervento da parte del cliente per ora. Se i clienti hanno altre domande, sono invitati a contattare l'Assistenza Salesforce.



]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] CVE che interessano i componenti Flexcard e Mapper di dati di Omnistudio]]></title>
            <link>https://help.salesforce.com/s/articleView?id=004980323&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=004980323&amp;type=1</guid>
            <pubDate>Tue, 10 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Salesforce Platform] Salesforce è a conoscenza delle notizie riportate dai media sulle vulnerabilità di sicurezza che interessano Omnistudio, CVE 2025-43698, 2025-43700, 2025-43701, 2025-43699 e 2025-43697, e che hanno un impatto sui componenti Flexcard e Mapper di dati di Omnistudio.]]></description>
        </item>
        <item>
            <title><![CDATA[[Aggiornamento di sicurezza] Limitazioni alla funzionalità email per le registrazioni alle organizzazioni di prova da Salesforce.com]]></title>
            <link>https://help.salesforce.com/s/articleView?id=004633792&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=004633792&amp;type=1</guid>
            <pubDate>Tue, 08 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Salesforce Platform] A partire dal 4 marzo 2025 per Starter e ProSuite, dal 5 marzo 2025 per Service Enterprise Edition e Unlimited Edition e dal 20 marzo 2025 per Sales Enterprise e Unlimited, la funzionalità email sarà disabilitata per le organizzazioni di prova fornite tramite il sito Web Salesforce nel corso del periodo di valutazione standard di 30 giorni.]]></description>
        </item>
        <item>
            <title><![CDATA[[Sicurezza ] Intervieni per impedire la compromissione degli account ]]></title>
            <link>https://help.salesforce.com/s/articleView?id=004333226&amp;type=1&amp;language=en_US</link>
            <guid>https://help.salesforce.com/s/articleView?id=004333226&amp;type=1&amp;language=en_US</guid>
            <pubDate>Thu, 06 Feb 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Commerce Cloud, Marketing Cloud, Heroku, Tableau, Sales Cloud, Service Cloud, MuleSoft, Experience Cloud] Gli account utente privi dell'autenticazione a più fattori (MFA), delle limitazioni degli IP, e/o che utilizzano credenziali deboli sono a rischio di essere compromessi da utenti malintenzionati. Consulta l'articolo della Guida allegato per una panoramica su come utilizzare le impostazioni personalizzabili o su come implementare Monitoraggio evento per Shield per proteggere i tuoi account utente. ]]></description>
        </item>
        <item>
            <title><![CDATA[[Ottimizzazioni della sicurezza] Transizione dagli scambi di chiavi RSA a TLS 1.3]]></title>
            <link>https://help.salesforce.com/s/articleView?language=en_US&amp;id=002472175&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?language=en_US&amp;id=002472175&amp;type=1</guid>
            <pubDate>Thu, 23 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Sales Cloud, Service Cloud, Experience Cloud] Salesforce consiglia vivamente ai clienti di effettuare la transizione dagli scambi di chiavi RSA a TLS 1.3 per ottimizzare la sicurezza e l'efficienza delle comunicazioni di rete. ]]></description>
        </item>
        <item>
            <title><![CDATA[[Avvertenza sulla sicurezza Tableau ] Problema di sicurezza con i controlli dell'accesso a livello di riga in Tableau]]></title>
            <link>https://help.salesforce.com/s/articleView?id=003876261&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=003876261&amp;type=1</guid>
            <pubDate>Tue, 07 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau consente l'implementazione dei controlli dell'accesso a livello di riga nei campi di database tramite una funzione di filtro che indica se un particolare valore viene incluso o escluso in una query. A causa di un controllo dell'accesso non corretto, nelle versioni interessate, i campi delle cartelle di lavoro con la funzione di compressione dei filtri abilitata risultano esposti nelle visualizzazioni dei dati se vengono aggiunti nuovi valori ai campi dopo che erano stati originariamente filtrati. Tableau ha disabilitato per impostazione predefinita la compressione dei filtri in Tableau Cloud e Server per il rilascio di manutenzione di novembre. 

 ]]></description>
        </item>
        <item>
            <title><![CDATA[[Avvertenza sulla sicurezza Tableau ] Problema di sicurezza con impatto sui controlli dell'accesso a livello di riga in Tableau]]></title>
            <link>https://help.salesforce.com/s/articleView?id=003876261&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=003876261&amp;type=1</guid>
            <pubDate>Thu, 21 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Sicurezza Salesforce si è occupata di un problema di sicurezza che ha avuto un impatto sui workbook di Tableau Cloud e Server nel rilascio di manutenzione di agosto. Incoraggiamo i clienti Tableau Server ad applicare l'aggiornamento associato al rilascio principale, che può essere scaricato dalla pagina del rilascio di manutenzione di Tableau Server. I clienti Cloud non devono intraprendere alcuna azione in quanto il 9 agosto 2024 è stata applicata una patch alle istanze Cloud. ]]></description>
        </item>
        <item>
            <title><![CDATA[[Notifica di sicurezza] Interruzione temporanea della funzionalità di email per gli utenti]]></title>
            <link>https://help.salesforce.com/s/articleView?id=002953342&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=002953342&amp;type=1</guid>
            <pubDate>Fri, 18 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[[Salesforce Platform] Per ottimizzare la funzionalità di sicurezza e impedire l'abuso delle organizzazioni di prova gratuita, il giorno 8 ottobre 2024 abbiamo disabilitato temporaneamente la funzionalità di email avviata dagli utenti per i prodotti CRM Core in prova. Questo non include i clienti attivi o altri prodotti Salesforce.

]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] Vulnerabilità di tipo Local File Inclusion (LFI) che interessano alcune versioni di Tableau Server]]></title>
            <link>https://help.salesforce.com/s/articleView?id=001497664&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=001497664&amp;type=1</guid>
            <pubDate>Fri, 04 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Sicurezza Salesforce ha rilevato una vulnerabilità che interessa la funzionalità di notifica tramite email della funzione di editor dei flussi di Tableau. A causa di questa vulnerabilità, un utente autenticato potrebbe eseguire comandi arbitrari sulle istanze di Tableau Server dei clienti. Abbiamo assegnato un punteggio CVSSv3 pari a 9.1.]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] CVE-2023-46604]]></title>
            <link>https://kb.tableau.com/articles/Issue/remote-code-execution-rce-vulnerability-impacting-apache-activemq-clients</link>
            <guid>https://kb.tableau.com/articles/Issue/remote-code-execution-rce-vulnerability-impacting-apache-activemq-clients</guid>
            <pubDate>Mon, 01 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Il 2 novembre 2023, Sicurezza Salesforce è stata avvisata della vulnerabilità CVE-2023-46604, una vulnerabilità di tipo Remote Code Execution (RCE) che ha interessato i client Apache ActiveMQ.]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] Vulnerabilità di tipo Local File Inclusion (LFI), con ripercussioni sui server Tableau in locale]]></title>
            <link>https://kb.tableau.com/articles/Issue/local-file-inclusion-lfi-vulnerability-impacting-some-versions-of-tableau-server</link>
            <guid>https://kb.tableau.com/articles/Issue/local-file-inclusion-lfi-vulnerability-impacting-some-versions-of-tableau-server</guid>
            <pubDate>Fri, 01 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] L'11 maggio 2023 è stata segnalata una vulnerabilità di sicurezza di tipo Local File Inclusion (LFI) tramite il nostro programma Advanced Server Access (ASA).
]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] CVE-2023-46604]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000396859&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000396859&amp;type=1</guid>
            <pubDate>Fri, 02 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[ Salesforce sta indagando attivamente il potenziale impatto della vulnerabilità CVE-2023-46604 e sta implementando soluzioni di mitigazione dove necessario. Salesforce continuerà a seguire il processo di gestione della vulnerabilità e, nel caso scoprissimo prove di un accesso non autorizzato ai dati dei clienti, avviseremo immediatamente le parti interessate.]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] Notifica di sicurezza Tableau]]></title>
            <link>https://kb.tableau.com/articles/Issue/tableau-security-notification-server-side-request-forgery</link>
            <guid>https://kb.tableau.com/articles/Issue/tableau-security-notification-server-side-request-forgery</guid>
            <pubDate>Thu, 07 Sep 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Vulnerabilità server-side request forgery (letteralmente "falsificazione delle richieste lato server) che potrebbe consentire a un malintenzionato di autenticarsi a istanze di Tableau Server e accedere così ai dati dei clienti.]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] CVE-2023-26136]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000395871&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000395871&amp;type=1</guid>
            <pubDate>Mon, 17 Jul 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[ Vulnerabilità di JavaScript che ha ripercussioni sul progetto tough-cookie del prodotto NPM open-source che potrebbe consentire a un malintenzionato di allegare i dati dei cookie a uno spazio dei nomi globale.]]></description>
        </item>
        <item>
            <title><![CDATA[[Aggiornamento di sicurezza] Valutazioni di sicurezza]]></title>
            <link>https://kb.tableau.com/articles/issue/adv-2023-001-tabpy-unauthenticated-access-to-tableau-server</link>
            <guid>https://kb.tableau.com/articles/issue/adv-2023-001-tabpy-unauthenticated-access-to-tableau-server</guid>
            <pubDate>Wed, 28 Jun 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Le installazioni di Tableau Python Server (TabPy) possono essere configurate per eseguire codice python arbitrario senza autenticazione. Prodotti interessati: TabPy 2.8.0 e versioni precedenti.]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] CVE-2023-34362, CVE-2023-35036, CVE-2023-35708, CVE-2023-36932, CVE-2023-36933, CVE-2023-36934]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000395641&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000395641&amp;type=1</guid>
            <pubDate>Tue, 13 Jun 2023 09:00:00 GMT</pubDate>
            <description><![CDATA[ Le vulnerabilità potrebbero comportare l'accesso non autorizzato al prodotto e all'ambiente di trasferimento file MOVEit. Al momento non vi è alcun impatto sui dati dei clienti di Salesforce. Il 16 giugno è stata annunciata un'ulteriore vulnerabilità critica (che termina con 708). Il 5 luglio sono stati annunciati i CVE che terminano con 932, 933 e 934.]]></description>
        </item>
        <item>
            <title><![CDATA[[Aggiornamento del processo] Valutazioni di sicurezza]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000394469&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000394469&amp;type=1</guid>
            <pubDate>Tue, 31 Jan 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[ I clienti non sono più tenuti a ottenere l'approvazione preventiva prima di eseguire valutazioni di sicurezza per i prodotti Salesforce.]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] CVE-2022-22128]]></title>
            <link>https://kb.tableau.com/articles/Issue/issue-affecting-tableau-server-administration-agent</link>
            <guid>https://kb.tableau.com/articles/Issue/issue-affecting-tableau-server-administration-agent</guid>
            <pubDate>Fri, 14 Oct 2022 11:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Problema che interessa Administration Agent in Tableau Server]]></description>
        </item>
        <item>
            <title><![CDATA[[ Vulnerabilità] Aggiornamento di sicurezza Tableau]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000365859&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000365859&amp;type=1</guid>
            <pubDate>Wed, 22 Jun 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau Server registra i token di accesso personali nei repository di registro interni]]></description>
        </item>
        <item>
            <title><![CDATA[[ Vulnerabilità] CVE-2022-22127]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000365493&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000365493&amp;type=1</guid>
            <pubDate>Mon, 23 May 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Vulnerabilità di controllo degli accessi violata in Tableau Server]]></description>
        </item>
        <item>
            <title><![CDATA[[Notifica di sicurezza] Notifica di sicurezza Heroku]]></title>
            <link>https://status.heroku.com/incidents/2413</link>
            <guid>https://status.heroku.com/incidents/2413</guid>
            <pubDate>Fri, 15 Apr 2022 10:45:00 GMT</pubDate>
            <description><![CDATA[[Heroku] Repository GitHub collegati al problema di Heroku]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] Aggiornamento di sicurezza Spring4Shell]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000365020&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000365020&amp;type=1</guid>
            <pubDate>Wed, 30 Mar 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau, Slack, Service Cloud, Salesforce Einstein, Salesforce Platform, Sales Cloud, Quip, Pardot, MuleSoft, Marketing Cloud, Hyperforce, Heroku, Experience Cloud, Commerce Cloud, ClickSoftware] Vulnerabilità Spring4Shell pubblicata a marzo 2022]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] Vulnerabilità Apache Log4j2]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000363736&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000363736&amp;type=1</guid>
            <pubDate>Fri, 10 Dec 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau, Service Cloud, Slack, Salesforce Einstein, Salesforce Platform, Sales Cloud, Quip, Pardot, MuleSoft, Marketing Cloud, Hyperforce, Heroku, Experience Cloud, ClickSoftware, Commerce Cloud] Vulnerabilità Apache Log4j2 pubblicata il 10 dicembre 2021]]></description>
        </item>
        <item>
            <title><![CDATA[[Aggiornamento di sicurezza] Attacchi di Nobelium diretti contro servizi cloud, supply chain]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000363417&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000363417&amp;type=1</guid>
            <pubDate>Wed, 27 Oct 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[ Risposta al post sul blog Microsoft del 24 ottobre 2021]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2021-017]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000363324&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000363324&amp;type=1</guid>
            <pubDate>Thu, 21 Oct 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Divulgazione di informazioni sensibili]]></description>
        </item>
        <item>
            <title><![CDATA[[Aggiornamento di sicurezza] Configurazione dell'interfaccia della riga di comando di Salesforce Developer Experience]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000363271&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000363271&amp;type=1</guid>
            <pubDate>Mon, 04 Oct 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[ Risposta alla nota del 4 ottobre 2021 del centro di coordinamento del CERT (VU#883754) ]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2021-016]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000363184&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000363184&amp;type=1</guid>
            <pubDate>Wed, 22 Sep 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Divulgazione di informazioni]]></description>
        </item>
        <item>
            <title><![CDATA[[Notifica di sicurezza] Problema con i connettori Oracle NetSuite e SAP SuccessFactors]]></title>
            <link>https://kb.tableau.com/articles/issue/oracle-netsuite-and-sap-successfactors-connectors-used-in-tableau-gallery-may-be-storing-sensitive-data</link>
            <guid>https://kb.tableau.com/articles/issue/oracle-netsuite-and-sap-successfactors-connectors-used-in-tableau-gallery-may-be-storing-sensitive-data</guid>
            <pubDate>Mon, 16 Aug 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[ È possibile che i connettori Oracle NetSuite e SAP SuccessFactors utilizzati nella galleria di Tableau memorizzino dati sensibili in un sottoinsieme dell'infrastruttura di accesso dei clienti a Tableau on-premise  ]]></description>
        </item>
        <item>
            <title><![CDATA[[Aggiornamento di sicurezza] Configurazione delle autorizzazioni di controllo degli accessi degli utenti guest ai Siti Salesforce e alle comunità]]></title>
            <link>https://help.salesforce.com/s/articleView?id=000362826&amp;type=1</link>
            <guid>https://help.salesforce.com/s/articleView?id=000362826&amp;type=1</guid>
            <pubDate>Wed, 11 Aug 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[ Risposta al post sul blog Varonis del 10 agosto 2021]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] CVE-2021-1630]]></title>
            <link>https://help.salesforce.com/articleView?id=000362693&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000362693&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 28 Jul 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[MuleSoft] Vulnerabilità XML external entity (XXE) in Mule Runtime]]></description>
        </item>
        <item>
            <title><![CDATA[[Ransomware] Attacco ransomware a Kaseya]]></title>
            <link>https://help.salesforce.com/articleView?id=000359083&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000359083&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 07 Jul 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[ Attacco ransomware a Kaseya VSA del 2 luglio 2021
]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2021-015]]></title>
            <link>https://help.salesforce.com/articleView?id=000358970&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000358970&amp;type=1&amp;mode=1</guid>
            <pubDate>Tue, 22 Jun 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Controllo errato dell'accesso alla cache dati quando si utilizza Initial SQL]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2021-013]]></title>
            <link>https://help.salesforce.com/articleView?id=000358015&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000358015&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 22 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Registrazione di informazioni sensibili]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] Compromissione di Codecov Bash Uploader]]></title>
            <link>https://help.salesforce.com/articleView?id=000358035&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000358035&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 15 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[ I segreti degli utenti di Bash Uploader compromessi da un hacker]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2021-009]]></title>
            <link>https://help.salesforce.com/articleView?id=000357456&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000357456&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 25 Mar 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Divulgazione di informazioni]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] Vulnerabilità di Microsoft Exchange Server]]></title>
            <link>https://help.salesforce.com/articleView?id=000357525&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000357525&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 24 Mar 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[ Vulnerabilità di Microsoft Exchange Server pubblicate il 2 marzo 2021 ]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2021-010]]></title>
            <link>https://help.salesforce.com/articleView?id=000357424&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000357424&amp;type=1&amp;mode=1</guid>
            <pubDate>Tue, 23 Mar 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Open redirect in Tableau Server]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2021-011]]></title>
            <link>https://help.salesforce.com/articleView?id=000357453&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000357453&amp;type=1&amp;mode=1</guid>
            <pubDate>Tue, 23 Mar 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Vulnerabilità Denial of Service in Tableau Server]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2021-012]]></title>
            <link>https://help.salesforce.com/articleView?id=000357454&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000357454&amp;type=1&amp;mode=1</guid>
            <pubDate>Tue, 23 Mar 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] HTML Injection nelle email]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] CVE-2021-1627]]></title>
            <link>https://help.salesforce.com/articleView?id=000357383&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000357383&amp;type=1&amp;mode=1</guid>
            <pubDate>Mon, 22 Mar 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[MuleSoft] Server Side Request Forgery in Mule Runtime]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] CVE-2021-1626]]></title>
            <link>https://help.salesforce.com/articleView?id=000357382&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000357382&amp;type=1&amp;mode=1</guid>
            <pubDate>Mon, 22 Mar 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[MuleSoft] Vulnerabilità di esecuzione di codice remoto in Mule Runtime]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] CVE-2021-1628]]></title>
            <link>https://help.salesforce.com/articleView?id=000357384&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000357384&amp;type=1&amp;mode=1</guid>
            <pubDate>Mon, 22 Mar 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[MuleSoft] Vulnerabilità XML External Entity (XXE) in Mule Runtime]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2021-005]]></title>
            <link>https://help.salesforce.com/articleView?id=000356891&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356891&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 25 Feb 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau Server registra la password del repository Postgres]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2021-007]]></title>
            <link>https://help.salesforce.com/articleView?id=000356889&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356889&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 25 Feb 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Password del database registrata nel registro debug]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2021-008]]></title>
            <link>https://help.salesforce.com/articleView?id=000356888&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356888&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 25 Feb 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Divulgazione di informazioni]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2021-006]]></title>
            <link>https://help.salesforce.com/articleView?id=000356890&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356890&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 25 Feb 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Non tutti i segreti sono crittografati nella configurazione]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2021-004]]></title>
            <link>https://help.salesforce.com/articleView?id=000356295&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356295&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 21 Jan 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Danneggiamento della memoria]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2021-003]]></title>
            <link>https://help.salesforce.com/articleView?id=000356296&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356296&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 21 Jan 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Bypass dell'autenticazione nelle reti IPv6]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2021-001]]></title>
            <link>https://help.salesforce.com/articleView?id=000356299&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356299&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 21 Jan 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Iniezione di contenuti in messaggi di errore riflessi]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2021-002]]></title>
            <link>https://help.salesforce.com/articleView?id=000356297&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356297&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 21 Jan 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Divulgazione di informazioni]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2020-059]]></title>
            <link>https://help.salesforce.com/articleView?id=000356022&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356022&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 16 Dec 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau corregge una vulnerabilità in QtWebEngine]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità ] ADV-2020-060]]></title>
            <link>https://help.salesforce.com/articleView?id=000356023&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356023&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 16 Dec 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Autorizzazioni deboli per le cartelle nelle installazioni predefinite di Tableau Server]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2020-061]]></title>
            <link>https://help.salesforce.com/articleView?id=000356024&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356024&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 16 Dec 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Autorizzazioni deboli per le cartelle nelle installazioni non predefinite di Tableau Server]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] Compromissione del software SolarWinds]]></title>
            <link>https://help.salesforce.com/articleView?id=000356007&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000356007&amp;type=1&amp;mode=1</guid>
            <pubDate>Tue, 15 Dec 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[ Governo federale e aziende Fortune 500 compromessi da un attacco supply chain]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] CVE-2020-6939]]></title>
            <link>https://help.salesforce.com/articleView?id=000355686&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000355686&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 19 Nov 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Endpoint API non autenticati]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2020-057]]></title>
            <link>https://help.salesforce.com/articleView?id=000355688&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000355688&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 19 Nov 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Divulgazione dei percorsi dei file temporanei]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2020-056]]></title>
            <link>https://help.salesforce.com/articleView?id=000355687&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000355687&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 19 Nov 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Endpoint API non autenticati]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2020-058]]></title>
            <link>https://help.salesforce.com/articleView?id=000355713&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000355713&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 19 Nov 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Privilege escalation nei prodotti Tableau]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2020-053]]></title>
            <link>https://help.salesforce.com/articleView?id=000355523&amp;language=en_US&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000355523&amp;language=en_US&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 29 Oct 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Errore di analisi dei caratteri non ASCII]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2020-052]]></title>
            <link>https://help.salesforce.com/articleView?id=000355522&amp;language=en_US&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000355522&amp;language=en_US&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 29 Oct 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau Server consente le pagine Web esterne nelle aree Web]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2020-054]]></title>
            <link>https://help.salesforce.com/articleView?language=en_US&amp;type=1&amp;mode=1&amp;id=000355524</link>
            <guid>https://help.salesforce.com/articleView?language=en_US&amp;type=1&amp;mode=1&amp;id=000355524</guid>
            <pubDate>Thu, 29 Oct 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Tableau Desktop memorizza i segreti come testo non crittografato nel file di configurazione]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2020-055]]></title>
            <link>https://help.salesforce.com/articleView?id=000355525&amp;language=en_US&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000355525&amp;language=en_US&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 29 Oct 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Credenziali dei database nei file di registro]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2020-051]]></title>
            <link>https://help.salesforce.com/articleView?id=000355243&amp;language=en_US&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000355243&amp;language=en_US&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 30 Sep 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Integer overflow nei prodotti Tableau]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2020-046]]></title>
            <link>https://help.salesforce.com/articleView?id=000354775&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000354775&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 27 Aug 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Valori sensibili di Tableau Server nei registri]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2020-047]]></title>
            <link>https://help.salesforce.com/articleView?id=000354776&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000354776&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 27 Aug 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Alcune modifiche delle autorizzazioni hanno effetto solo dopo il riavvio del server]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2020-045]]></title>
            <link>https://help.salesforce.com/articleView?id=000354774&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000354774&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 27 Aug 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] I registri di Tableau Server contengono URL di Webhook]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2020-044]]></title>
            <link>https://help.salesforce.com/articleView?id=000354773&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000354773&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 27 Aug 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] La connessione a un servizio esterno non convalida il nome host]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2020-048]]></title>
            <link>https://help.salesforce.com/articleView?id=000354777&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000354777&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 27 Aug 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Valori sensibili di Tableau Server nella posizione del file di registro]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2020-049]]></title>
            <link>https://help.salesforce.com/articleView?id=000354778&amp;language=en_US&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000354778&amp;language=en_US&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 27 Aug 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Segreti della fonte di dati in testo non crittografato nel repository]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] ADV-2020-050]]></title>
            <link>https://help.salesforce.com/articleView?id=000354779&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000354779&amp;type=1&amp;mode=1</guid>
            <pubDate>Thu, 27 Aug 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] L'API REST restituisce un valore di configurazione del sito agli utenti non autenticati]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] CVE-2020-6938]]></title>
            <link>https://help.salesforce.com/articleView?id=000354158&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000354158&amp;type=1&amp;mode=1</guid>
            <pubDate>Tue, 07 Jul 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[Tableau] Vulnerabilità dovuta a divulgazione di informazioni sensibili in Tableau Server]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] CVE-2020-6937]]></title>
            <link>https://help.mulesoft.com/s/article/High-security-issue-affecting-Mule-runtimes-of-all-supported-versions-March-19th-2020</link>
            <guid>https://help.mulesoft.com/s/article/High-security-issue-affecting-Mule-runtimes-of-all-supported-versions-March-19th-2020</guid>
            <pubDate>Tue, 26 May 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[[MuleSoft] Vulnerabilità Denial of Service in Mule Runtime]]></description>
        </item>
        <item>
            <title><![CDATA[[Ottimizzazioni della sicurezza] Dichiarazione sulla continuità operativa durante il COVID-19]]></title>
            <link>https://help.salesforce.com/articleView?id=000352932&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000352932&amp;type=1&amp;mode=1</guid>
            <pubDate>Tue, 17 Mar 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[ Salesforce non ha rilevato impatti significativi sulle attività aziendali]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] CVE-2019-15631]]></title>
            <link>https://help.salesforce.com/articleView?id=000351827&amp;language=en_US&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000351827&amp;language=en_US&amp;type=1&amp;mode=1</guid>
            <pubDate>Fri, 29 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[[MuleSoft] Esecuzione di codice remoto in Mule Runtime e gateway API]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] CVE-2019-15630]]></title>
            <link>https://help.mulesoft.com/s/article/Directory-traversal-vulnerability-affecting-runtimes-of-MuleSoft-customers-running-certain-use-cases-of-Mule-flows-and-API-Gateways</link>
            <guid>https://help.mulesoft.com/s/article/Directory-traversal-vulnerability-affecting-runtimes-of-MuleSoft-customers-running-certain-use-cases-of-Mule-flows-and-API-Gateways</guid>
            <pubDate>Fri, 30 Aug 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[[MuleSoft] Directory traversal in MuleSoft Runtime]]></description>
        </item>
        <item>
            <title><![CDATA[[Ottimizzazioni della sicurezza] Gestione dei referenti sicurezza per l'organizzazione]]></title>
            <link>https://help.salesforce.com/articleView?id=000349483&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000349483&amp;type=1&amp;mode=1</guid>
            <pubDate>Mon, 01 Jul 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[ Se l'organizzazione è vittima di una violazione della sicurezza delle informazioni, i referenti sicurezza dell'organizzazione saranno informati.]]></description>
        </item>
        <item>
            <title><![CDATA[[Ottimizzazioni della sicurezza] Ottimizzazioni della sicurezza degli utenti delle comunità e del Portale]]></title>
            <link>https://help.salesforce.com/articleView?id=000323376&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000323376&amp;type=1&amp;mode=1</guid>
            <pubDate>Mon, 13 May 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[ Impatto potenziale sulle impostazioni di condivisione predefinite]]></description>
        </item>
        <item>
            <title><![CDATA[[Messaggi ingannevoli] Campagna di phishing]]></title>
            <link>https://help.salesforce.com/articleView?id=000318462&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000318462&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 28 Nov 2018 00:00:00 GMT</pubDate>
            <description><![CDATA[ Campagna di phishing che sfrutta il marchio Salesforce]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] Vulnerabilità nella sicurezza Salesforce]]></title>
            <link>https://help.salesforce.com/articleView?id=000312863&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000312863&amp;type=1&amp;mode=1</guid>
            <pubDate>Fri, 05 Oct 2018 00:00:00 GMT</pubDate>
            <description><![CDATA[ Impatto di una vulnerabilità nella sicurezza sui Siti Salesforce e sulle comunità]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità] API Attività dell'account di Twitter]]></title>
            <link>https://help.salesforce.com/articleView?id=000312848&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000312848&amp;type=1&amp;mode=1</guid>
            <pubDate>Fri, 21 Sep 2018 00:00:00 GMT</pubDate>
            <description><![CDATA[ Vulnerabilità dell'API Attività dell'account di Twitter]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerability/Ransomware] Vulnerabilità MS17-010 (alias EternalBlue)]]></title>
            <link>https://help.salesforce.com/articleView?id=000320088&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000320088&amp;type=1&amp;mode=1</guid>
            <pubDate>Tue, 27 Jun 2017 00:00:00 GMT</pubDate>
            <description><![CDATA[ Malware che sfrutta la vulnerabilità MS17-010 (alias EternalBlue)]]></description>
        </item>
        <item>
            <title><![CDATA[[Malware] TrickBot / The Trick]]></title>
            <link>https://help.salesforce.com/articleView?id=000319415&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000319415&amp;type=1&amp;mode=1</guid>
            <pubDate>Wed, 21 Jun 2017 00:00:00 GMT</pubDate>
            <description><![CDATA[ Il malware può prendere di mira gli utenti di Salesforce.]]></description>
        </item>
        <item>
            <title><![CDATA[[Ransomware] WannaCry Ransomware]]></title>
            <link>https://help.salesforce.com/articleView?id=000317521&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000317521&amp;type=1&amp;mode=1</guid>
            <pubDate>Mon, 15 May 2017 00:00:00 GMT</pubDate>
            <description><![CDATA[ Ransomware che sfrutta la vulnerabilità "Eternal Blue" di Windows.]]></description>
        </item>
        <item>
            <title><![CDATA[[Messaggi ingannevoli] Campagna di phishing Documenti Google]]></title>
            <link>https://trust.salesforce.com/en/security/stay-current-security/</link>
            <guid>https://trust.salesforce.com/en/security/stay-current-security/</guid>
            <pubDate>Wed, 03 May 2017 00:00:00 GMT</pubDate>
            <description><![CDATA[ Invito ad accedere a Documenti Google contenente un link di phishing.]]></description>
        </item>
        <item>
            <title><![CDATA[[Vulnerabilità del provider di servizi] Vulnerabilità di Cloudflare]]></title>
            <link>https://help.salesforce.com/articleView?id=000320268&amp;type=1&amp;mode=1</link>
            <guid>https://help.salesforce.com/articleView?id=000320268&amp;type=1&amp;mode=1</guid>
            <pubDate>Mon, 27 Feb 2017 00:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare, azienda che fornisce Content Delivery Network embedded e servizi di sicurezza per Internet, ha reso pubblica una vulnerabilità della sicurezza nei suoi server edge che potrebbe esporre informazioni come cookie HTTP, token di autenticazione e corpi HTTP POST.]]></description>
        </item>
    </channel>
</rss>