Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Any 3rd party/Open Source software versions which appear on the Known Exploited Vulnerabilities Catalog | CISA

  2. Any defect found in MAK Products which ONE products that, after internal assessment, is deemed to present cybersecurity vulnerabilities for customers. These would include vulnerabilities that may allow nefarious actors to gain access to data, systems, or services to which they are not entitled.

...