...
Audit/Monitor application logs for unexpected system errors or messages including inappropriate access.
Configured firewall rules to intercept and drop malicious web requests
The WAF team is actively monitoring these CVEs and has have already deployed a number of new managed mitigation rules.
...