Published Advisories

All published security advisories are available here.

Impact Key

CriticalVulnerabilities that allow arbitrary code execution by unauthenticated users.
HighVulnerabilities that allow unauthorized users to escalated permissions or gather sensitive data that should otherwise only be available to authorized users.
ModerateVulnerabilities that would otherwise be Critical or High but only work in rare or unlikely scenarios.
LowVulnerabilities that are minor, and pose little or no consequence to the security and operation of the system.
  • No labels