This topic lists exploits discovered and reported in MAK ONE products and third-party versions and/or Open-Source software used by MAK ONE products. Known Vulnerabilities come from multiple sources including but not limited to:
Any 3rd party/Open Source license software versions which appears appear on the Known Exploited Vulnerabilities Catalog | CISA
Any defect found in MAK Products which ONE products that, after internal assessment, is deemed to present cybersecurity vulnerabilities for customers. These would include vulnerabilities that may allow nefarious actors to gain access to data, systems, or services to which they are not entitled.
To receive email alerts about any changes to the Known Vulnerabilities list, please visit here.
At the current time there are no known vulnerabilities.
Related Topics
Filter by label (Content by label) | ||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
...