<?xml version="1.0"?>
<rss version="2.0">
  <channel>
    <title>ColdFusion 7 Security Patches</title>
    <link>http://www.merlinmanager.com/</link>
    <description>ColdFusion 7 Security Patches</description>
    <language>en-us</language>

	
    <item>
      <title>APSB10-05 Security update for Flash Remoting</title>
      <link>http://kb2.adobe.com/cps/822/cpsid_82241.html</link>
      <description><![CDATA[ColdFusion 9.0, 8.0.x and 7.0.2 are affected with the issue mentioned in the security bulletin APSB10-05 for BlazeDS. This technote provides fixes for the security issue along with the installation instructions.]]></description>
	  <category>Manual</category>
	  <category>7.0.2</category>
      <pubDate>Fri, 19 Feb 2010 05:00:40 GMT</pubDate>
      <guid>http://kb2.adobe.com/cps/822/cpsid_82241.html</guid>
    </item>
	
    <item>
      <title>APSB06-14 ColdFusion cross-site scripting in error page</title>
      <link>http://kb2.adobe.com/support/coldfusion/ts/documents/dcf966be/hf701-64586.zip</link>
      <description><![CDATA[http://www.adobe.com/support/security/bulletins/apsb06-14.html\r\n\r\nA specially crafted URL can be used to create a cross-site scripting attack via a ColdFusion error page.]]></description>
	  <category>Auto</category>
	  <category>7.0.1</category>
      <pubDate>Tue, 12 Sep 2006 20:00:00 GMT</pubDate>
      <guid>http://adobe.com/support/security/bulletins/apsb06-14.html</guid>
    </item>
	
    <item>
      <title>APSB08-21 Update available for potential ColdFusion 8 privilege escalation issue</title>
      <link>http://www.adobe.com/support/security/bulletins/downloads/hf702-73122.jar</link>
      <description><![CDATA[http://www.adobe.com/support/security/bulletins/apsb08-21.html\r\n\r\nA vulnerability in ColdFusion could allow a lower-privileged user to bypass sandbox security and access sensitive information, and could potentially lead to a privilege escalation attack. This issue is particularly applicable to ColdFusion servers in a shared hosting environment. This issue is not remotely exploitable.\r\n]]></description>
	  <category>Auto</category>
	  <category>7.0.2</category>
      <pubDate>Wed, 05 Nov 2008 15:00:00 GMT</pubDate>
      <guid>http://www.adobe.com/support/security/bulletins/apsb08-21.html</guid>
    </item>
	
    <item>
      <title>APSB08-06 Update available for potential ColdFusion MX 7 and ColdFusion 8 Cross Site Scripting security issue</title>
      <link>http://www.adobe.com/support/coldfusion/ts/documents/kb403212/hf702-70734.zip</link>
      <description><![CDATA[http://www.adobe.com/support/security/bulletins/apsb08-06.html\r\n\r\nA potential vulnerability in ColdFusion MX7 and ColdFusion 8 could allow an attacker to execute cross-site scripting attack. This issue is specific to ColdFusion and Windows IIS 6 installations.]]></description>
	  <category>Auto</category>
	  <category>7.0</category>
      <pubDate>Tue, 11 Mar 2008 15:00:00 GMT</pubDate>
      <guid>http://www.adobe.com/support/security/bulletins/apsb08-06.html</guid>
    </item>
	
    <item>
      <title>APSB08-07 Update available for ColdFusion MX 7 and ColdFusion 8 Cross-Site Scripting issue</title>
      <link>http://www.adobe.com/support/coldfusion/ts/documents/kb403202/hf702-70749.zip</link>
      <description><![CDATA[http://www.adobe.com/support/security/bulletins/apsb08-07.html\r\n\r\nA vulnerability in ColdFusion 8 and ColdFusion MX 7 could allow an attacker to bypass ColdFusion�s cross-site scripting protection for certain ColdFusion applications. Only ColdFusion applications where the Application.cfm or Application.cfc contains the setEncoding function would be vulnerable to this attack.]]></description>
	  <category>Auto</category>
	  <category>7.0</category>
      <pubDate>Tue, 11 Mar 2008 15:00:00 GMT</pubDate>
      <guid>http://www.adobe.com/support/security/bulletins/apsb08-07.html</guid>
    </item>
	
    <item>
      <title>APSB08-08 Update available for ColdFusion MX 7 and ColdFusion 8 logs invalid admin interface log-in attempts</title>
      <link>http://www.adobe.com/support/security/bulletins/apsb08-08.html</link>
      <description><![CDATA[http://www.adobe.com/support/security/bulletins/apsb08-08.html\r\n\r\nA design error in ColdFusion 8 and ColdFusion MX 7 could make it more likely that an attacker could attempt to log in to the admin interface undetected since failed log-in attempts were not previously logged.]]></description>
	  <category>Manual</category>
	  <category>7.0</category>
      <pubDate>Tue, 11 Mar 2008 20:00:00 GMT</pubDate>
      <guid>http://www.adobe.com/support/security/bulletins/apsb08-08.html</guid>
    </item>
	
    <item>
      <title>APSB07-19 Update available for ColdFusion MX 7 and ColdFusion 8 potential session hijacking issue</title>
      <link>http://www.adobe.com/support/coldfusion/ts/documents/kb402805/hf702-70523.zip</link>
      <description><![CDATA[http://www.adobe.com/support/security/bulletins/apsb07-19.html\r\n\r\nAn error in ColdFusion MX7 and ColdFusion 8 applications could allow an attacker to hijack user sessions. This issue does not apply to customers using J2EE session management.]]></description>
	  <category>Auto</category>
	  <category>7.0</category>
      <pubDate>Fri, 23 Nov 2007 15:00:00 GMT</pubDate>
      <guid>http://www.adobe.com/support/security/bulletins/apsb07-19.html</guid>
    </item>
	
    <item>
      <title>APSB07-08 Workaround available for Linux and Solaris ColdFusion MX 7 file permissions vulnerability</title>
      <link>http://www.adobe.com/support/security/bulletins/apsb07-08.html</link>
      <description><![CDATA[http://www.adobe.com/support/security/bulletins/apsb07-08.html\r\n\r\nThe file and folder permissions for the Linux and Solaris version of ColdFusion MX 7 can permit non-privileged users to change key program files. Adobe recommends that Linux and Solaris ColdFusion MX 7 customers apply the workaround described below.]]></description>
	  <category>Manual</category>
	  <category>7.0</category>
      <pubDate>Tue, 10 Apr 2007 15:00:00 GMT</pubDate>
      <guid>http://www.adobe.com/support/security/bulletins/apsb07-08.html</guid>
    </item>
	
    <item>
      <title>APSB07-06 Patch available for ColdFusion MX 7 cross-site scripting protection bypass</title>
      <link>http://download.macromedia.com/pub/security/bulletins/apsb07-06/hf702-65115.zip</link>
      <description><![CDATA[http://www.adobe.com/support/security/bulletins/apsb07-06.html\r\n\r\nA potential vulnerability in ColdFusion could allow an attacker to bypass ColdFusion�s cross-site scripting protection. This issue will not occur if a sitewide error handler is defined in the settings page of ColdFusion administrator. A specially crafted URL sent to the ColdFusion server could result in the attacker being able to conduct cross site scripting attacks.]]></description>
	  <category>Auto</category>
	  <category>7.0.2</category>
      <pubDate>Tue, 13 Mar 2007 15:00:00 GMT</pubDate>
      <guid>http://www.adobe.com/support/security/bulletins/apsb07-06.html</guid>
    </item>
	
    <item>
      <title>APSB07-05 Patch available for JRun cross-site scripting issue</title>
      <link>http://www.adobe.com/support/security/bulletins/apsb07-05.html</link>
      <description><![CDATA[http://www.adobe.com/support/security/bulletins/apsb07-05.html\r\n\r\nJRUN only\r\n\r\nA vulnerability in JRun�s administrator console could allow a cross-site scripting attack. A specially crafted URL sent to the JRun administrator application could result in the attacker being able to conduct cross site scripting attacks.]]></description>
	  <category>Manual</category>
	  <category>7.0</category>
      <pubDate>Tue, 13 Feb 2007 20:00:00 GMT</pubDate>
      <guid>http://www.adobe.com/support/security/bulletins/apsb07-05.html</guid>
    </item>
	
    <item>
      <title>APSB07-04 Patch available for ColdFusion MX cross-site scripting issue</title>
      <link>http://www.adobe.com/support/security/bulletins/apsb07-04.html</link>
      <description><![CDATA[http://www.adobe.com/support/security/bulletins/apsb07-04.html\r\n\r\nA vulnerability in ColdFusion�s default error page could allow an attacker to bypass ColdFusion�s cross-site scripting protection. A specially crafted request sent to the ColdFusion server could result in the attacker being able to conduct cross site scripting attacks.]]></description>
	  <category>Manual</category>
	  <category>7.0</category>
      <pubDate>Tue, 13 Feb 2007 20:00:00 GMT</pubDate>
      <guid>http://www.adobe.com/support/security/bulletins/apsb07-04.html</guid>
    </item>
	
    <item>
      <title>APSB07-03 Patch available for ColdFusion MX 7 cross-site scripting issue when Global Script Protection is not enabled</title>
      <link>http://www.adobe.com/support/security/bulletins/apsb07-03.html</link>
      <description><![CDATA[http://www.adobe.com/support/security/bulletins/apsb07-03.html\r\n\r\nA specially crafted URL could be used to create a cross-site scripting attack on ColdFusion when Global Script Protection is not enabled.]]></description>
	  <category>Manual</category>
	  <category>7.0</category>
      <pubDate>Tue, 13 Feb 2007 15:00:00 GMT</pubDate>
      <guid>http://www.adobe.com/support/security/bulletins/apsb07-03.html</guid>
    </item>
	
    <item>
      <title>APSB07-02 Patch available for ColdFusion MX 7 and JRun 4 information disclosure issue</title>
      <link>http://www.adobe.com/support/security/bulletins/apsb07-02.html</link>
      <description><![CDATA[http://www.adobe.com/support/security/bulletins/apsb07-02.html\r\n\r\nA potential vulnerability in ColdFusion and JRun URL parsing could allow an attacker to access directory listings in the ColdFusion and JRun installation directory. A specially crafted command sent to the ColdFusion and JRun server could result in the attacker getting access to the directory listings.]]></description>
	  <category>Manual</category>
	  <category>7.0</category>
      <pubDate>Tue, 09 Jan 2007 15:00:00 GMT</pubDate>
      <guid>http://www.adobe.com/support/security/bulletins/apsb07-02.html</guid>
    </item>
	
    <item>
      <title>APSB06-17 Local privilege escalation in a ColdFusion third party library</title>
      <link>http://www.adobe.com/support/security/bulletins/apsb06-17.html</link>
      <description><![CDATA[http://www.adobe.com/support/security/bulletins/apsb06-17.html\r\n\r\nA potential vulnerability in a third party library could allow a malicious local user to execute arbitrary code with the privilege level of the local SYSTEM. A malicious user must first be able to run code locally on the server to take advantage of the vulnerability.]]></description>
	  <category>Manual</category>
	  <category>7.0</category>
      <pubDate>Tue, 10 Oct 2006 20:00:00 GMT</pubDate>
      <guid>http://www.adobe.com/support/security/bulletins/apsb06-17.html</guid>
    </item>
	
    <item>
      <title>APSB06-12 Denial of service in ColdFusion Flash Remoting Gateway</title>
      <link>http://www.adobe.com/support/security/bulletins/hf701-apsb06-12.zip</link>
      <description><![CDATA[http://www.adobe.com/support/security/bulletins/apsb06-12.html\r\n\r\nA specially crafted command sent to the ColdFusion Flash Remoting Gateway can cause an infinite loop in ColdFusion, resulting in a denial of service attack.]]></description>
	  <category>Auto</category>
	  <category>7.0.1</category>
      <pubDate>Tue, 12 Sep 2006 15:00:00 GMT</pubDate>
      <guid>http://www.adobe.com/support/security/bulletins/apsb06-12.html</guid>
    </item>
	
    <item>
      <title>APSB06-13 ColdFusion Sandbox Security vulnerability</title>
      <link>http://kb2.adobe.com/support/coldfusion/ts/documents/94491491/hf701-61892.zip</link>
      <description><![CDATA[http://www.adobe.com/support/security/bulletins/apsb06-13.html\r\n\r\nUnder certain circumstances, CFML templates outside a sandbox can call components (CFC) within a sandbox.]]></description>
	  <category>Auto</category>
	  <category>7.0.1</category>
      <pubDate>Tue, 12 Sep 2006 15:00:00 GMT</pubDate>
      <guid>http://www.adobe.com/support/security/bulletins/apsb06-13.html</guid>
    </item>
	
    <item>
      <title>APSB06-14 ColdFusion cross-site scripting in error page</title>
      <link>http://kb2.adobe.com/support/coldfusion/ts/documents/dcf966be/hf702-64586.zip</link>
      <description><![CDATA[http://www.adobe.com/support/security/bulletins/apsb06-14.html\r\n\r\nA specially crafted URL can be used to create a cross-site scripting attack via a ColdFusion error page.]]></description>
	  <category>Auto</category>
	  <category>7.0.2</category>
      <pubDate>Tue, 12 Sep 2006 15:00:00 GMT</pubDate>
      <guid>http://www.adobe.com/support/security/bulletins/apsb06-14.html</guid>
    </item>
	
    <item>
      <title>APSB06-10 ColdFusion AdminAPI Authentication Issue</title>
      <link>http://www.adobe.com/support/security/bulletins/apsb06-10.html</link>
      <description><![CDATA[http://www.adobe.com/support/security/bulletins/apsb06-10.html\r\n\r\nThe AdminAPI of ColdFusion MX 7 provides programmatic access to all ColdFusion Administrator functionality.  All calls to the adminAPI require an authentication test before calling any other adminAPI functionality.  The authentication test could be bypassed.]]></description>
	  <category>Manual</category>
	  <category>7.0</category>
      <pubDate>Wed, 09 Aug 2006 01:00:00 GMT</pubDate>
      <guid>http://www.adobe.com/support/security/bulletins/apsb06-10.html</guid>
    </item>
	
    <item>
      <title>MPSB05-03 ColdFusion MX 7 cross-site scripting in default error page</title>
      <link>http://download.macromedia.com/pub/coldfusion/hotfix/chf70-60112.jar</link>
      <description><![CDATA[http://www.adobe.com/devnet/security/security_zone/mpsb05-03.html\r\n\r\nThe default error page in the optional-use JRun Web Server bundled with ColdFusion MX 7 is vulnerable to a cross-site scripting attack.]]></description>
	  <category>Auto</category>
	  <category>7.0.0</category>
      <pubDate>Tue, 10 May 2005 15:00:00 GMT</pubDate>
      <guid>http://www.adobe.com/devnet/security/security_zone/mpsb05-03.html</guid>
    </item>
	

  </channel>
</rss>
