<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Vulnerabilities raised by OS Administrator in Management &amp; Governance</title>
    <link>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-raised-by-OS-Administrator/m-p/1845870#M31046</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;The Server Administrator of the Machine where we are running our QlikView Server has provided and&amp;nbsp;Server vulnerability status report&lt;/P&gt;&lt;P&gt;In that report there 2 items related to the Application (QLIKView Server) as listed below&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;No&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Finding&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Comments&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;1&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Commvault 11 &amp;lt; 11 SP7 Multiple Vulnerabilities&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;To be looked at and fixed by application team&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;2&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Microsoft XML Parser (MSXML) and XML Core Services Unsupported&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;To be looked at and fixed by application team&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you advice is any of this are required for QLIKview Server to run properly?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Oscar&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jan 2025 16:57:53 GMT</pubDate>
    <dc:creator>oirc-nswhealth</dc:creator>
    <dc:date>2025-01-29T16:57:53Z</dc:date>
    <item>
      <title>Vulnerabilities raised by OS Administrator</title>
      <link>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-raised-by-OS-Administrator/m-p/1845870#M31046</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;The Server Administrator of the Machine where we are running our QlikView Server has provided and&amp;nbsp;Server vulnerability status report&lt;/P&gt;&lt;P&gt;In that report there 2 items related to the Application (QLIKView Server) as listed below&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;No&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Finding&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Comments&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;1&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Commvault 11 &amp;lt; 11 SP7 Multiple Vulnerabilities&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;To be looked at and fixed by application team&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;2&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Microsoft XML Parser (MSXML) and XML Core Services Unsupported&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;To be looked at and fixed by application team&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you advice is any of this are required for QLIKview Server to run properly?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Oscar&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 16:57:53 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-raised-by-OS-Administrator/m-p/1845870#M31046</guid>
      <dc:creator>oirc-nswhealth</dc:creator>
      <dc:date>2025-01-29T16:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities raised by OS Administrator</title>
      <link>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-raised-by-OS-Administrator/m-p/1847701#M31047</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We haven't found any resources linked to the above vulnerabilites. However we found an article for the MSXML.&lt;/P&gt;
&lt;P&gt;(&lt;A href="https://support.qlik.com/articles/000044137)" target="_blank"&gt;https://support.qlik.com/articles/000044137)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For the remaining vulnerabilites we encourage to create a ticket with Support and provide all the details for them to confirm.&lt;/P&gt;
&lt;P&gt;Best Regards&lt;/P&gt;
&lt;P&gt;Sooraj Suresh&lt;/P&gt;</description>
      <pubDate>Sat, 16 Oct 2021 13:13:16 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Vulnerabilities-raised-by-OS-Administrator/m-p/1847701#M31047</guid>
      <dc:creator>Sooraj_Suresh</dc:creator>
      <dc:date>2021-10-16T13:13:16Z</dc:date>
    </item>
  </channel>
</rss>

