<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Is Qlik Sense vulnerable to the Log4Shell exploit? in Management &amp; Governance</title>
    <link>https://community.qlik.com/t5/Management-Governance/Is-Qlik-Sense-vulnerable-to-the-Log4Shell-exploit/m-p/1869323#M30073</link>
    <description>&lt;P&gt;Looks like centralized logging relies on Log4j.&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jan 2025 16:57:53 GMT</pubDate>
    <dc:creator>kswindlehurst</dc:creator>
    <dc:date>2025-01-29T16:57:53Z</dc:date>
    <item>
      <title>Is Qlik Sense vulnerable to the Log4Shell exploit?</title>
      <link>https://community.qlik.com/t5/Management-Governance/Is-Qlik-Sense-vulnerable-to-the-Log4Shell-exploit/m-p/1869323#M30073</link>
      <description>&lt;P&gt;Looks like centralized logging relies on Log4j.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 16:57:53 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Is-Qlik-Sense-vulnerable-to-the-Log4Shell-exploit/m-p/1869323#M30073</guid>
      <dc:creator>kswindlehurst</dc:creator>
      <dc:date>2025-01-29T16:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: Is Qlik Sense vulnerable to the Log4Shell exploit?</title>
      <link>https://community.qlik.com/t5/Management-Governance/Is-Qlik-Sense-vulnerable-to-the-Log4Shell-exploit/m-p/1869363#M30074</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Qlik is aware of the&amp;nbsp;recently&amp;nbsp;published security vulnerability&amp;nbsp;in&amp;nbsp;Apache Log4j, reference&amp;nbsp;CVE-2021-44228&amp;nbsp;(also referred to as&amp;nbsp;&lt;I&gt;Log4Shell&lt;/I&gt;)&lt;I&gt;.&lt;/I&gt;&amp;nbsp;As soon as the vulnerability was published, Qlik immediately began a security investigation to determine if and how Qlik’s products and services are impacted.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Our preliminary investigations have confirmed that&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Client-managed&amp;nbsp;Qlik Sense Enterprise,&amp;nbsp;QlikView,&amp;nbsp;Nprinting&amp;nbsp;are confirmed as not including the vulnerable component. Other Qlik products are still under evaluation and patches will be made available as necessary.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;BR /&gt;Patrick&lt;BR /&gt;Director, CSO Experience Programs&lt;BR /&gt;Qlik&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 14:57:14 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Is-Qlik-Sense-vulnerable-to-the-Log4Shell-exploit/m-p/1869363#M30074</guid>
      <dc:creator>PatrickQ</dc:creator>
      <dc:date>2021-12-11T14:57:14Z</dc:date>
    </item>
    <item>
      <title>Re: Is Qlik Sense vulnerable to the Log4Shell exploit?</title>
      <link>https://community.qlik.com/t5/Management-Governance/Is-Qlik-Sense-vulnerable-to-the-Log4Shell-exploit/m-p/1869392#M30075</link>
      <description>&lt;P&gt;Ongoing updates will be posted to here:&lt;BR /&gt;&lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/bc-p/1869391#M1993" target="_blank"&gt;Vulnerability Testing - &amp;nbsp;Apache Log4j, reference&amp;nbsp;C... - Qlik Community - 1869368&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 17:13:39 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Is-Qlik-Sense-vulnerable-to-the-Log4Shell-exploit/m-p/1869392#M30075</guid>
      <dc:creator>PatrickQ</dc:creator>
      <dc:date>2021-12-11T17:13:39Z</dc:date>
    </item>
  </channel>
</rss>

