<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: XIQ-SE components in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xiq-se-components/m-p/93309#M9705</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;QA regularly uses well known security testing tools to scan the different XIQ-SE components to identify vulnerabilities of both Extreme Proprietary software and 3rd party applications used in the suite. These vulnerabilities are regularly patched in maintenance releases.&lt;/P&gt;&lt;P&gt;Information on Vulnerabilities that have been patched can be found in the release notes under the "Vulnerabilities Addresses" section.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.extremenetworks.com/release_notes/NetSight/XIQSE/XIQSE_22.6.13_Release_Notes.pdf?_ga=2.131350863.1188659776.1665578103-1461443537.1656515490" target="_blank"&gt;https://documentation.extremenetworks.com/release_notes/NetSight/XIQSE/XIQSE_22.6.13_Release_Notes.pdf?_ga=2.131350863.1188659776.1665578103-1461443537.1656515490&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;-Ryan&lt;/P&gt;</description>
    <pubDate>Wed, 12 Oct 2022 12:40:04 GMT</pubDate>
    <dc:creator>Ryan_Yacobucci</dc:creator>
    <dc:date>2022-10-12T12:40:04Z</dc:date>
    <item>
      <title>XIQ-SE components</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xiq-se-components/m-p/93302#M9703</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;as XIQ-SE is composed for a set of different&amp;nbsp;tools, and applications built in or in its engines, I would like to ask if there is a document about all of them, used releases, patchs, etc...&lt;/P&gt;&lt;P&gt;My problem is that XIQ-SE is being analyzed for a security team with pentesting tools, and they request info about security holes in their diferents components.&lt;/P&gt;&lt;P&gt;Best!!!&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 11:07:06 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xiq-se-components/m-p/93302#M9703</guid>
      <dc:creator>EF</dc:creator>
      <dc:date>2022-10-12T11:07:06Z</dc:date>
    </item>
    <item>
      <title>Re: XIQ-SE components</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xiq-se-components/m-p/93307#M9704</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;I am not certain what you are asking for.&lt;/P&gt;&lt;P&gt;If you have a vendor performing penetration / vulnerability exposure testing against XIQ-SE and any portfolio product, they should treat the appliances as a black box and perform such scans.&lt;/P&gt;&lt;P&gt;Please elaborate on "request about security holes"? I would not imagine we'd publish a document that outlines security holes in our products.&lt;/P&gt;&lt;P&gt;As for what we have found and fixed in prior releases please refer to release notes and the vulnerabilities remediated sections within. You will see various mentions to CVE and other vulnerability bulletin id's, etc.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 12:35:20 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xiq-se-components/m-p/93307#M9704</guid>
      <dc:creator>Robert_Haynes</dc:creator>
      <dc:date>2022-10-12T12:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: XIQ-SE components</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xiq-se-components/m-p/93309#M9705</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;QA regularly uses well known security testing tools to scan the different XIQ-SE components to identify vulnerabilities of both Extreme Proprietary software and 3rd party applications used in the suite. These vulnerabilities are regularly patched in maintenance releases.&lt;/P&gt;&lt;P&gt;Information on Vulnerabilities that have been patched can be found in the release notes under the "Vulnerabilities Addresses" section.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.extremenetworks.com/release_notes/NetSight/XIQSE/XIQSE_22.6.13_Release_Notes.pdf?_ga=2.131350863.1188659776.1665578103-1461443537.1656515490" target="_blank"&gt;https://documentation.extremenetworks.com/release_notes/NetSight/XIQSE/XIQSE_22.6.13_Release_Notes.pdf?_ga=2.131350863.1188659776.1665578103-1461443537.1656515490&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;-Ryan&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 12:40:04 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xiq-se-components/m-p/93309#M9705</guid>
      <dc:creator>Ryan_Yacobucci</dc:creator>
      <dc:date>2022-10-12T12:40:04Z</dc:date>
    </item>
    <item>
      <title>Re: XIQ-SE components</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xiq-se-components/m-p/93310#M9706</link>
      <description>&lt;P&gt;Hi EF.&lt;/P&gt;&lt;P&gt;we do not publish this information publicly. You can get 3rd party licenses used in the product:/usr/local/Extreme_Networks/NetSight/ThirdPartyLicenses_*.zip&lt;/P&gt;&lt;P&gt;We are working on updating the Open Software Declaration. =&amp;nbsp;&lt;A href="https://www.extremenetworks.com/support/policies/open-source-declaration/" target="_blank"&gt;https://www.extremenetworks.com/support/policies/open-source-declaration/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 13:07:32 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/xiq-se-components/m-p/93310#M9706</guid>
      <dc:creator>Zdeněk_Pala</dc:creator>
      <dc:date>2022-10-12T13:07:32Z</dc:date>
    </item>
  </channel>
</rss>

