<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WebP Vulnerability in Management &amp; Governance</title>
    <link>https://community.qlik.com/t5/Management-Governance/WebP-Vulnerability/m-p/2126084#M29818</link>
    <description>&lt;P&gt;Hi Albert,&lt;/P&gt;
&lt;P&gt;Many thanks for the confirmation; that's good news.&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;
&lt;P&gt;Hazel&lt;/P&gt;</description>
    <pubDate>Fri, 06 Oct 2023 13:43:07 GMT</pubDate>
    <dc:creator>jamieNTC</dc:creator>
    <dc:date>2023-10-06T13:43:07Z</dc:date>
    <item>
      <title>WebP Vulnerability</title>
      <link>https://community.qlik.com/t5/Management-Governance/WebP-Vulnerability/m-p/2123853#M29816</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We are on premise users of Qlik Sense and have been made aware of the recent security issues surrounding the w&lt;SPAN&gt;eb P vulnerability (related to CVE-2023-5123/ CVE-2023-5129 / CVE-2023-4863).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Is Qlik vulnerable to this issue at all, and do we need to take any action?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Hazel&lt;/P&gt;</description>
      <pubDate>Fri, 29 Sep 2023 10:10:02 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/WebP-Vulnerability/m-p/2123853#M29816</guid>
      <dc:creator>Hazel_K</dc:creator>
      <dc:date>2023-09-29T10:10:02Z</dc:date>
    </item>
    <item>
      <title>Re: WebP Vulnerability</title>
      <link>https://community.qlik.com/t5/Management-Governance/WebP-Vulnerability/m-p/2126078#M29817</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;
&lt;P&gt;Thanks for your post.&lt;/P&gt;
&lt;P&gt;I can confirm you that Qlik Sense Enterprise for Windows (Qlik Sense Client Managed) has zero impact, so is &lt;STRONG&gt;not&lt;/STRONG&gt; impacted.&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Albert&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2023 13:34:43 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/WebP-Vulnerability/m-p/2126078#M29817</guid>
      <dc:creator>Albert_Candelario</dc:creator>
      <dc:date>2023-10-06T13:34:43Z</dc:date>
    </item>
    <item>
      <title>Re: WebP Vulnerability</title>
      <link>https://community.qlik.com/t5/Management-Governance/WebP-Vulnerability/m-p/2126084#M29818</link>
      <description>&lt;P&gt;Hi Albert,&lt;/P&gt;
&lt;P&gt;Many thanks for the confirmation; that's good news.&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;
&lt;P&gt;Hazel&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2023 13:43:07 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/WebP-Vulnerability/m-p/2126084#M29818</guid>
      <dc:creator>jamieNTC</dc:creator>
      <dc:date>2023-10-06T13:43:07Z</dc:date>
    </item>
  </channel>
</rss>

