<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Exposure to  CVE-2022-42889 in Qlik Replicate</title>
    <link>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998717#M4048</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/121014"&gt;@Dana_Baldwin&lt;/a&gt;&amp;nbsp;, we also see the same file arep-salesforce.jar in the Attunity/Replicate/endpoint_srv/endpoints/Salesforce folder&lt;/P&gt;
&lt;P&gt;No other files.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you please confirm if this is the affected file?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Vipul&lt;/P&gt;</description>
    <pubDate>Mon, 31 Oct 2022 17:03:20 GMT</pubDate>
    <dc:creator>vipulmisra</dc:creator>
    <dc:date>2022-10-31T17:03:20Z</dc:date>
    <item>
      <title>Exposure to  CVE-2022-42889</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998250#M4035</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;Could you please confirm the impact of&amp;nbsp;&lt;A class="external-link" title="Follow link" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42889" target="_blank" rel="nofollow noopener"&gt;https://nvd.nist.gov/vuln/detail/CVE-2022-42889&lt;/A&gt;&amp;nbsp;on Qlik replicate&lt;/P&gt;
&lt;P&gt;We are currently on version &lt;SPAN&gt;May 2021 (2021.5.0.1133)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Vipul&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2022 21:10:24 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998250#M4035</guid>
      <dc:creator>vipulmisra</dc:creator>
      <dc:date>2022-10-28T21:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: Exposure to  CVE-2022-42889</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998251#M4036</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/152708"&gt;@vipulmisra&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The only place in QDI where apache.commons.text is used is in the Replicate Salesforce incremental-load JREP endpoint (salesforce-source-endpoint.jar). Neither Compose nor QEM use this library.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;The library version currently used there is 1.9 and it is vulnerable. It should be changed to 1.10 in a future service release.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Still, even though the vulnerable JAR exists, there is no use at all of the vulnerable class StringSubstitutor which is a prerequisite to exploiting the vulnerability. Hence, from Qlik perspective, the risk of this CVE for the QDI products is zero. As usual, Qlik will update this library in a service release.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Customers who are not using that endpoint can delete the salesforce-source-endpoint.jar so it does not come up in later scans.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Dana&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2022 21:24:52 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998251#M4036</guid>
      <dc:creator>Dana_Baldwin</dc:creator>
      <dc:date>2022-10-28T21:24:52Z</dc:date>
    </item>
    <item>
      <title>Re: Exposure to  CVE-2022-42889</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998700#M4041</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/121014"&gt;@Dana_Baldwin&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;We are using Replicate version&amp;nbsp;2021.5.0.1272 and QEM version&amp;nbsp;May 2021 (2021.5.0.543). Could you please check and confirm is this version replicate and QEM affected with this&amp;nbsp;security vulnerability CVE-2022-42889.&lt;/P&gt;
&lt;P&gt;The end-points were are using are ;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;source - Oracle and DB2 iSeries&lt;/P&gt;
&lt;P&gt;target - Oracle.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Adersh&lt;/P&gt;
&lt;DIV class="appMainContent AEM_appMainContent withStatusBar"&gt;
&lt;DIV id="contents" class="ng-scope"&gt;
&lt;DIV class="dashboardServersLayout ng-scope"&gt;
&lt;DIV class="mainMessageWrapper"&gt;
&lt;DIV class="serversStatusObjectsListContainer layoutWrapper"&gt;
&lt;DIV class="tableAndSearchAndCounterWrap"&gt;
&lt;DIV id="serversStatusGrid" class="serversStatusObjectsListTable ATTGridControl ng-isolate-scope ng-scope"&gt;
&lt;DIV class="scrollableContainer2"&gt;
&lt;DIV id="scrollAreaID" class="scrollArea"&gt;
&lt;DIV class="tableLogicalContainer"&gt;
&lt;DIV class="tableCanvas"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 31 Oct 2022 16:06:47 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998700#M4041</guid>
      <dc:creator>adershb</dc:creator>
      <dc:date>2022-10-31T16:06:47Z</dc:date>
    </item>
    <item>
      <title>Re: Exposure to  CVE-2022-42889</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998706#M4042</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/143229"&gt;@adershb&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As noted above, t&lt;SPAN&gt;he only place in QDI where apache.commons.text is used is in the Replicate Salesforce incremental-load JREP endpoint (salesforce-source-endpoint.jar). Neither Compose nor QEM use this library.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Version 2021.5 uses the vulnerable version and it will be changed to 1.10 in a future service release of 2022.5 or later.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Still, even though the vulnerable JAR exists, there is no use at all of the vulnerable class StringSubstitutor which is a prerequisite to exploiting the vulnerability. Hence, from Qlik perspective, the risk of this CVE for the QDI products is zero. As usual, Qlik will update this library in a service release.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;If you are not using Salesforce incremental load endpoint, you can delete the salesforce-source-endpoint.jar so it does not come up in later scans.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Dana&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Oct 2022 16:23:33 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998706#M4042</guid>
      <dc:creator>Dana_Baldwin</dc:creator>
      <dc:date>2022-10-31T16:23:33Z</dc:date>
    </item>
    <item>
      <title>Re: Exposure to  CVE-2022-42889</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998708#M4043</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/121014"&gt;@Dana_Baldwin&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Where is the location of&amp;nbsp;&lt;SPAN&gt;salesforce-source-endpoint.jar file. You mean on Replicate server or on QEM server?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Adersh&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Oct 2022 16:35:12 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998708#M4043</guid>
      <dc:creator>adershb</dc:creator>
      <dc:date>2022-10-31T16:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: Exposure to  CVE-2022-42889</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998710#M4044</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/143229"&gt;@adershb&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is on the Replicate server, as noted QEM does not use this library. It is here:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dana_Baldwin_0-1667234291544.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/92530i0486CF52B94DBD36/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Dana_Baldwin_0-1667234291544.png" alt="Dana_Baldwin_0-1667234291544.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Dana&lt;/P&gt;</description>
      <pubDate>Mon, 31 Oct 2022 16:38:24 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998710#M4044</guid>
      <dc:creator>Dana_Baldwin</dc:creator>
      <dc:date>2022-10-31T16:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: Exposure to  CVE-2022-42889</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998711#M4045</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/121014"&gt;@Dana_Baldwin&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;I could see file&amp;nbsp;arep-salesforce.jar in below location. Our Replicate server is Linux.&lt;BR /&gt;replicate-2021.5.0-1272/endpoint_srv/endpoints/Salesforce $&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Adersh&lt;/P&gt;</description>
      <pubDate>Mon, 31 Oct 2022 16:42:03 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998711#M4045</guid>
      <dc:creator>adershb</dc:creator>
      <dc:date>2022-10-31T16:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: Exposure to  CVE-2022-42889</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998716#M4047</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/121014"&gt;@Dana_Baldwin&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you please confirm is it the same vulnerable file (mentioned above on Linux) and If so, for removing it, do we need to restart the replicate service on Linux (stop, remove .jar file and start).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Adersh&lt;/P&gt;</description>
      <pubDate>Mon, 31 Oct 2022 16:58:50 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998716#M4047</guid>
      <dc:creator>adershb</dc:creator>
      <dc:date>2022-10-31T16:58:50Z</dc:date>
    </item>
    <item>
      <title>Re: Exposure to  CVE-2022-42889</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998717#M4048</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/121014"&gt;@Dana_Baldwin&lt;/a&gt;&amp;nbsp;, we also see the same file arep-salesforce.jar in the Attunity/Replicate/endpoint_srv/endpoints/Salesforce folder&lt;/P&gt;
&lt;P&gt;No other files.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you please confirm if this is the affected file?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Vipul&lt;/P&gt;</description>
      <pubDate>Mon, 31 Oct 2022 17:03:20 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998717#M4048</guid>
      <dc:creator>vipulmisra</dc:creator>
      <dc:date>2022-10-31T17:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: Exposure to  CVE-2022-42889</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998805#M4051</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/152708"&gt;@vipulmisra&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/143229"&gt;@adershb&lt;/a&gt;&amp;nbsp;I am checking with my colleagues and will follow up.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Dana&lt;/P&gt;</description>
      <pubDate>Mon, 31 Oct 2022 21:34:45 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1998805#M4051</guid>
      <dc:creator>Dana_Baldwin</dc:creator>
      <dc:date>2022-10-31T21:34:45Z</dc:date>
    </item>
    <item>
      <title>Re: Exposure to  CVE-2022-42889</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1999154#M4057</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/143229"&gt;@adershb&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I see you also have a support case open for this - I've updated the case with this question so the support rep handling the case can research it with our internal support team.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Dana&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 16:31:49 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1999154#M4057</guid>
      <dc:creator>Dana_Baldwin</dc:creator>
      <dc:date>2022-11-01T16:31:49Z</dc:date>
    </item>
    <item>
      <title>Re: Exposure to  CVE-2022-42889</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1999155#M4058</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/152708"&gt;@vipulmisra&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please open a support case for this question so we can confirm with our internal support team.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Dana&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 16:32:41 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1999155#M4058</guid>
      <dc:creator>Dana_Baldwin</dc:creator>
      <dc:date>2022-11-01T16:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: Exposure to  CVE-2022-42889</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1999427#M4081</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/152708"&gt;@vipulmisra&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/143229"&gt;@adershb&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please see the attached screenshot showing the location of arep-salesforce.jar , which you can delete to avoid future scans from triggering&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;The location:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;[root@replicate2 Salesforce]# ls -la&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;total 8100drwxrwxr-x. 2 attunity attunity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;33 Aug 10 11:30 .drwxrwxr-x. 5 attunity attunity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;50 Aug 10 11:30 ..-rwxrwxr-x. 1 attunity attunity 8290718 May&amp;nbsp;&amp;nbsp;7&amp;nbsp;&amp;nbsp;2021 arep-salesforce.jar&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;[root@replicate2 Salesforce]# pwd&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;/opt/attunity/replicate/endpoint_srv/endpoints/Salesforce&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;[root@replicate2 Salesforce]#&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Let me know if that answers your question. &lt;BR /&gt;&lt;BR /&gt;Kind Regards,&lt;BR /&gt;Adam&lt;BR /&gt;&lt;BR /&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/121014"&gt;@Dana_Baldwin&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2022 08:40:40 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/1999427#M4081</guid>
      <dc:creator>Adam_Herman</dc:creator>
      <dc:date>2022-11-02T08:40:40Z</dc:date>
    </item>
    <item>
      <title>Re: Exposure to  CVE-2022-42889</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/2003732#M4189</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;Yes, arep-salesforce.jar is the equivalent file on Linux.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Still, even though the vulnerable JAR exists, there is no use at all of the vulnerable class StringSubstitutor which is a prerequisite to exploiting the vulnerability.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Hence, from Qlik perspective, the risk of this CVE for QDI products is zero.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;We have checked the arep-salesforce.jar in Replicate version 2021.5 and 2022.5 it doesn't contain StringSubstitutor class.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you are not using the Salesforce endpoint, and would like to test removal of this file to ensure it does not have an adverse effect, please do so in a pre production environment and save a backup copy of the file.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Dana&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 22:32:21 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Exposure-to-CVE-2022-42889/m-p/2003732#M4189</guid>
      <dc:creator>Dana_Baldwin</dc:creator>
      <dc:date>2022-11-11T22:32:21Z</dc:date>
    </item>
  </channel>
</rss>

