Security Advisories
Published Advisories
All published security advisories are available here.
Impact Key
| Rating | Description |
|---|---|
| Critical | Vulnerabilities that allow arbitrary code execution by unauthenticated users. |
| High | Vulnerabilities that allow unauthorized users to escalated permissions or gather sensitive data that should otherwise only be available to authorized users. |
| Moderate | Vulnerabilities that would otherwise be Critical or High but only work in rare or unlikely scenarios. |
| Low | Vulnerabilities that are minor, and pose little or no consequence to the security and operation of the system. |