Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

More information about our Vulnerability Management process can be found here.

CVE IDs

We use CVE IDs to uniquely identify and publicly define vulnerabilities in our products. CVEs will always be obtained for critical and high-severity vulnerabilities, while medium and low vulnerabilities will have their relevance evaluated before requesting a CVE.

...