All published security advisories are available here.
|Critical||Vulnerabilities that allow arbitrary code execution by unauthenticated users.|
|High||Vulnerabilities that allow unauthorized users to escalated permissions or gather sensitive data that should otherwise only be available to authorized users.|
|Moderate||Vulnerabilities that would otherwise be Critical or High but only work in rare or unlikely scenarios.|
|Low||Vulnerabilities that are minor, and pose little or no consequence to the security and operation of the system.|