![]() Our team is continuing to investigate and validate additional information about this vulnerability and its impact. While discovery and research is evolving, we’re posting the facts we’ve gathered and updating guidance as new information becomes available. If you are like many in the cybersecurity industry, any mention of a zero-day in an open-source software (OSS) library may cause a face-palm or audible groans, especially given the fast-follow from the Log4j vulnerability. For further information and updates about our internal response to Spring4Shell, please see our post here. ![]() Rapid7 has completed remediating the instances of Spring4Shell (CVE-2022-22965) and Spring Cloud (CVE-2022-22963) vulnerabilities that we found on our internet-facing services and systems.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |