Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Is Macrosuite

...

affected by the remote code execution (RCE) vulnerability

...

of Log4j?

Cp panel macro
data%7B%22components%22%3A%5B%5D%2C%22titleAlignment%22%3A%22left%22%2C%22contentAlignment%22%3A%22left%22%2C%22title%22%3A%22Is%20Macrosuite%20effaced%20by%20the%20remote%20code%20execution%20(RCE)%20vulnerability%20affecting%20Log4j%3F%22%2C%22titleColor%22%3A%22%23172b4d%22%2C%22titleContainerColor%22%3A%22%23ffffff%22%2C%22background%22%3A%22%23ffffff%22%2C%22borderColor%22%3A%22%230052CC%22%2C%22borderRadius%22%3A4%2C%22borderType%22%3A%22solid%22%2C%22icon%22%3A%22%22%7D

No, Caelor customers are not vulnerable, and no action is required. This vulnerability has been mitigated for all Caelor cloud products previously using vulnerable versions of Log4j.

Security is a very important topic for CalorCaelor. Therefore we try to comply Caelor complies with the highest security standards. That's why Marcosuite is Cloud Fortified Certified. This is Atlassian's highest standard for cloud apps. More Information about Cloud Fortified can you find be found here.

Which sort of data is collected and what happens with that data?

...