This topic lists exploits discovered and reported in third-party versions used by MAK ONE products. Known Vulnerabilities come from multiple sources:
Any 3rd party/Open Source license which appears on the Known Exploited Vulnerabilities Catalog | CISA
Any defect found in MAK Products which after internal assessment is deemed to present cybersecurity vulnerabilities for customers
At the current time there are no known vulnerabilities.