You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Current »

Published Advisories

All published security advisories are available here.

Impact Key

RatingDescription
CriticalVulnerabilities that allow arbitrary code execution by unauthenticated users.
HighVulnerabilities that allow unauthorized users to escalated permissions or gather sensitive data that should otherwise only be available to authorized users.
ModerateVulnerabilities that would otherwise be Critical or High but only work in rare or unlikely scenarios.
LowVulnerabilities that are minor, and pose little or no consequence to the security and operation of the system.
  • No labels