Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Yes. See the table below for details.

After publication of thisit was published, we immediately started checking all our products for exposure to this vulnerability. As was to be feared, many of our products use Log4j (or include third-party components that do), are therefore vulnerable, and need to be updated.

...