<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Vulnerability found during VAPT run in Management &amp; Governance</title>
    <link>https://community.qlik.com/t5/Management-Governance/Vulnerability-found-during-VAPT-run/m-p/2546953#M32731</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Hi Team,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;The IT infra team run VAPT test on the server on which Qlik Enterprise is installed, they found some Vulnerability, can you please let me know how to mitigate these Vulnerability attaching Vulnerability details as attachment.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 15 Apr 2026 09:31:12 GMT</pubDate>
    <dc:creator>sumitk</dc:creator>
    <dc:date>2026-04-15T09:31:12Z</dc:date>
    <item>
      <title>Vulnerability found during VAPT run</title>
      <link>https://community.qlik.com/t5/Management-Governance/Vulnerability-found-during-VAPT-run/m-p/2546953#M32731</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Team,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;The IT infra team run VAPT test on the server on which Qlik Enterprise is installed, they found some Vulnerability, can you please let me know how to mitigate these Vulnerability attaching Vulnerability details as attachment.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 09:31:12 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Vulnerability-found-during-VAPT-run/m-p/2546953#M32731</guid>
      <dc:creator>sumitk</dc:creator>
      <dc:date>2026-04-15T09:31:12Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability found during VAPT run</title>
      <link>https://community.qlik.com/t5/Management-Governance/Vulnerability-found-during-VAPT-run/m-p/2546964#M32732</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/153626"&gt;@sumitk&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Kindly report any findings to Qlik Support opening a case.&lt;BR /&gt;Please, send the entire report with precise references to the vulnerabilities and indicate the exact version of Qlik you are using (it is possible that the vulnerabilities are fixed in a recent release).&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 10:43:29 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Vulnerability-found-during-VAPT-run/m-p/2546964#M32732</guid>
      <dc:creator>Andrea_Bertazzo</dc:creator>
      <dc:date>2026-04-15T10:43:29Z</dc:date>
    </item>
  </channel>
</rss>

