Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Cp panel macro
data%7B%22components%22%3A%5B%5D%2C%22titleAlignment%22%3A%22left%22%2C%22contentAlignment%22%3A%22left%22%2C%22title%22%3A%22Is%20Macrosuite%20effaced%20by%20the%20remote%20code%20execution%20(RCE)%20vulnerability%20affecting%20Log4j%3F%22%2C%22titleColor%22%3A%22%23172b4d%22%2C%22titleContainerColor%22%3A%22%23ffffff%22%2C%22background%22%3A%22%23ffffff%22%2C%22borderColor%22%3A%22%230052CC%22%2C%22borderRadius%22%3A4%2C%22borderType%22%3A%22solid%22%2C%22icon%22%3A%22%22%7D

No, Caelor customers are not vulnerable, and no action is required. This vulnerability has been mitigated for all Caelor cloud products previously using vulnerable versions of Log4j.

Security is a very important to Caelor. Therefore Caelor complies with the highest security standards. That's why Marcosuite is Cloud Fortified Certified. This is Atlassian's highest standard for cloud apps. More Information about Cloud Fortified can be found here.

...