...
More information about our Vulnerability Management process can be found here.
CVE IDs
We use CVE IDs to uniquely identify and publicly define vulnerabilities in our products. CVEs will always be obtained for critical and high-severity vulnerabilities, while medium and low vulnerabilities will have their relevance evaluated before requesting a CVE.
...