This topic lists exploits discovered and reported in third-party versions used by MAK ONE products. Known Vulnerabilities come from multiple sources:
Any 3rd party/Open Source software versions which appear on the Known Exploited Vulnerabilities Catalog | CISA
Any defect found in MAK Products which after internal assessment is deemed to present cybersecurity vulnerabilities for customers. These would include vulnerabilities that may allow nefarious actors to gain access to data, systems, or services which they are not entitled.
At the current time there are no known vulnerabilities.