A high-severity vulnerability was found on a web application and introduced to the enterprise. The vulnerability could allow an unauthorized user to utilize an open- source library to view privileged user information. The enterprise is unwilling to accept the risk, but the developers cannot fix the issue right away.
Which of the following should be implemented to reduce the risk to an acceptable level until the issue can be fixed?
blacksheep6r
2 months, 2 weeks ago23169fd
9 months, 2 weeks agocyspec
9 months, 3 weeks agoDelab202
1 year, 3 months agowizwiz
1 year, 5 months agoBiteSize
1 year, 9 months agolifeblood12005
1 year, 9 months agoDJK667
1 year, 11 months agomargomi86
2 years agoFOURDUE
2 years, 3 months agoFOURDUE
2 years, 3 months agoFOURDUE
2 years, 3 months agoAndre876
2 years, 5 months agoangryelvis
2 years, 4 months agoryanzou
2 years, 5 months agoMeraz
2 years, 9 months agoRevZig67
2 years, 11 months agodgfhyjfghfgfkfhd
3 years ago