Pega has identified the following hot fixes as critical for ensuring a productive and secure development experience on our Pega Platform 7.X releases. If you are developing applications on any of the release versions listed below, we strongly encourage you to verify the corresponding hot fixes are installed in your environments and, if not, then submit a hot fix request in My Support Portal to receive the necessary download files for installation.
Pega Platform 7.4
Pega Platform 7.3.1
Pega Platform 7.3
Pega Platform 7.2.2
- HFIX-36537: Reflected XSS and unauthorized access
- HFIX-33318: Authentication Issue
- HFIX-32364: Section rules not rendering correctly after snapshot restore
- HFIX-32879: Cross-site scripting vulnerability in Java Bean Viewer gadget
- HFIX-59635
Pega Platform 7.2.1
- HFIX-33062: Unauthorized Access Issue
- HFIX-32454: Authentication Issue
- HFIX-34998: Cross-site scripting vulnerability in Java Bean Viewer gadget
- HFIX-36547: Reflected XSS and unauthorized access
- HFIX-62250
Pega Platform 7.2
- HFIX-34999: Cross-site scripting vulnerability in Java Bean Viewer gadget
- HFIX-33063: Unauthorized Access Issue
- HFIX-32455: Authentication Issue
- HFIX-36549: Reflected XSS and unauthorized access
Pega Platform 7.1.9
- HFIX-36226: XSS security issue in Java Bean Viewer
- HFIX-32457: Authentication Issue
- HFIX-36550: Reflected XSS and unauthorized access
- HFIX-33066: Unauthorized Access Issue
- HFIX-62248
Pega Platform 7.1.8
- HFIX-36486: Cross-site scripting vulnerability in Java Bean Viewer gadget
- HFIX-32459: Authentication Issue
- HFIX-36541: Reflected XSS and unauthorized access
- HFIX-62249
Pega Platform 7.1.7
- HFIX-36538: Reflected XSS and unauthorized access
- HFIX-36483: Cross-site scripting vulnerability in Java Bean Viewer gadget
- HFIX-63180
Pega Platform 7.1.6
- HFIX-36551: Reflected XSS and unauthorized access
- HFIX-36484: Cross-site scripting vulnerability in Java Bean Viewer gadget
- HFIX-63526
Pega Platform 7.1.5
- HFIX-36552: Reflected XSS and unauthorized access
- HFIX-36485: Cross-site scripting vulnerability in Java Bean Viewer gadget
- HFIX-63183
Pega Platform 7.1.4
Hi,
In either prpcServiceUtils or Pega Designer Studio HotFix Scan there is no status for critical hotFixes and we need to get this information to be sure we do not miss criticals.
So can I rely on this URL to build a robot script ?
I mean will this URL always be keeped uptodate and always in the same html code source format (with UL tags for versions and LI tags for hotfixes or something I can retrieve) so that I am sure to retrieve the informations on critical hotfixes ?
If not how can we open a request to get a such a link or/and a feature in hotfix scan so it provide a status critical on critical hotfixes ?
I am using Pega 7.2.2
Regards.