<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Apache Log4j Core Vulnerability in Qlik Replicate</title>
    <link>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Core-Vulnerability/m-p/2002028#M4135</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/121162"&gt;@A-G&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please create a support case along with the associated CVE information if you would like us to review it. Currently, the latest version of Replicate uses log4j 2.17.1&lt;/P&gt;</description>
    <pubDate>Tue, 08 Nov 2022 22:26:27 GMT</pubDate>
    <dc:creator>Alan_Wang</dc:creator>
    <dc:date>2022-11-08T22:26:27Z</dc:date>
    <item>
      <title>Apache Log4j Core Vulnerability</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Core-Vulnerability/m-p/2002023#M4134</link>
      <description>&lt;P&gt;Do you have a patch to address the latest&amp;nbsp;Apache Log4j Core Vulnerability similar to the upgrade to log4j 2.17 in 2021&lt;/P&gt;
&lt;P&gt;We see a new&amp;nbsp;Vulnerability that has been identified against Replicate host&lt;/P&gt;
&lt;P&gt;New version (patched)&amp;nbsp; 2.19 See&amp;nbsp; &lt;A href="https://logging.apache.org/log4j/2.x/download.html" target="_blank"&gt;https://logging.apache.org/log4j/2.x/download.html&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 21:35:24 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Core-Vulnerability/m-p/2002023#M4134</guid>
      <dc:creator>A-G</dc:creator>
      <dc:date>2022-11-08T21:35:24Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4j Core Vulnerability</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Core-Vulnerability/m-p/2002028#M4135</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/121162"&gt;@A-G&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please create a support case along with the associated CVE information if you would like us to review it. Currently, the latest version of Replicate uses log4j 2.17.1&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 22:26:27 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Core-Vulnerability/m-p/2002028#M4135</guid>
      <dc:creator>Alan_Wang</dc:creator>
      <dc:date>2022-11-08T22:26:27Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4j Core Vulnerability</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Core-Vulnerability/m-p/2002030#M4136</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/121162"&gt;@A-G&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The link you provided is to the download page for log4j. Can you please provide the CVE number for this new vulnerability?&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;
&lt;P&gt;Dana&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 22:39:47 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Core-Vulnerability/m-p/2002030#M4136</guid>
      <dc:creator>Dana_Baldwin</dc:creator>
      <dc:date>2022-11-08T22:39:47Z</dc:date>
    </item>
  </channel>
</rss>

