Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation  Back up to About Overview 
ContentIndex
  
[+] Expand All
[-] Collapse All

No index entries found.

Resolved Issues in CTPView Release 7.2R1

The following issues have been resolved in CTPView Release 7.2R1:

  • JITC Certification for CTPView 7.1R1. [PR/1029358]
  • JITC: Need Support For SRG-APP-000170-NDM-000329 in CTPView [PR/106874].
  • JITC : Need support for rule SRG-APP-000001-NDM-000200 of NDM STIG [PR/1073126]
  • JITC: Web Apache Rules (WA000-WWA064, WA000-WWA066, WA00500, WA00505, WA00510, WA00520, WA00525, WA00540, WA00545, WA00515 and WG360) are failed during JITC Testing [PR/1043953]
  • JITC : Unix STIG rules (GEN003660 and GEN007960) are failed during JITC testing [PR/1047561]
  • JITC : Unix STIG rules (GEN000450 and GEN000454) are failed during JITC testing [PR/1049038]
  • JITC : Unix STIG rules (GEN005515, GEN005519, GEN005520, GEN005524,GEN005525, GEN005526 and GEN005533) are failed during JITC testing [PR/1050254]
  • JITC : Unix STIG rules (GEN002719, GEN002750, GEN002751, GEN002752, GEN002800 and GEN002825) are failed during JITC testing. [PR/1050265]
  • Need analysis of CVEs for CTPview and CTP susceptibility [PR/ 1052156]
  • JITC : Unix STIG rules GEN003500 is failed during JITC testing [PR/ 1053882]
  • JITC : Unix STIG rules GEN000590 and GEN000595 are failed during JITC testing [PR/ 1055529]
  • JITC : Unix STIG rules (GEN001780, GEN002753, GEN002870 and GEN007850) are failed during JITC testing. [PR/ 1055541]
  • CTPView upgrade from 4.6R1 to 7.0R1 failed [PR/ 1055729]
  • JITC : Unix STIG rule GEN000588 is failed during JITC testing. [PR/ 1056694]
  • Report of Vulnerabilities affecting CTPView software. [PR/ 1056715]
  • JITC : Need support for Unix STIG rule GEN005495. Need to have a FIPS based OPENSSH. [PR/ 1057141]
  • JITC : Unix STIG rules (GEN000251, GEN000750 and GEN003060) are failed during JITC testing. [PR/1041703]
  • JITC : Unix STIG rules (GEN001720, GEN001740, GEN001820, GEN003780 and GEN005320) are failed during JITC testing. [PR /1041677]
  • JITC : Unix STIG rules (GEN003600, GEN003603, GEN003609, GEN003610, GEN003611, GEN005610 and GEN007920) are failed during JITC testing. [PR/1046671]
  • JITC : Unix STIG rules (GEN005506, GEN005510, GEN005511, GEN005512 and GEN005521) are failed during JITC testing. [PR/1043918]
  • JITC : Unix STIG rules (GEN005536, GEN005538 and GEN005539) are failed during JITC testing. [PR/1045659]
  • JITC : Unix STIG rules GEN007940 is failed during JITC testing. [PR/1050302]
  • JITC : Unix STIG rules GEN000590 and GEN000595 are failed during JITC testing. [PR/1055529]
  • You can enter incorrect IP addresses for NTP client and peer fields on CTPView admin page. [PR/1079115]
  • Retina Scanner shows vulnerability in libgcc package in CTPView. [PR/1081226]
  • Subgraph Vega shows multiple CAT I SQL Injection and Integer Overflow Vulnerabilities. [PR/1080681]
  • Subgraph Vega shows multiple CAT I Cross Site Scripting Vulnerabilities. [PR/1080683]
  • Kernel security update vulnerability found in Retina scan. [PR/1083557]

Modified: 2015-11-22