Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

This topic lists exploits discovered and reported in third-party versions used by MAK ONE products. Known Vulnerabilities come from multiple sources:

  1. Any 3rd party/Open Source license which appears on the Known Exploited Vulnerabilities Catalog | CISA

  2. Any defect found in MAK Products which after internal assessment is deemed to present cybersecurity vulnerabilities for customers

At the current time there are no known vulnerabilities.

Related Topics

  • No labels