Skip to content

Security

We take security seriously and use various measures to ensure the safety of our products. Our security policies include:

  • Regular vulnerability scanning using industry-standard tools.
  • We treat vulnerabilities reports as our priority. This means that we attempt to fix them as quickly as possible, therefore, we will release a hotfix for any major security vulnerability found in the most recent version of our SDK/server.
  • We only use reputable 3rd party libraries and update them regularly

Reporting a Vulnerability

If you discover a security vulnerability, please report it to us by submitting a request in our Service Desk Portal. Include the details of the vulnerability, affected versions, and any known mitigations.

Vulnerability Scanning

We run vulnerability scans periodically on all components of our product, including:

  • C++ SDK
  • Python SDK
  • Java Wrapper
  • API Server

We use both open-source and proprietary vulnerability scanners such as Trivy and Veracode.

CVE History

Below is a table of the latest CVEs we have fixed:

CVE Priority Type Fixed Version
CVE-2024-12133 Medium System 3.1.1
CVE-2021-33503 High System 3.0.2
CVE-2023-43804 High System 3.0.2
CVE-2024-3651 High System 3.0.2
CVE-2020-26137 Medium System 3.0.2
CVE-2023-32681 Medium System 3.0.2
CVE-2023-45803 Medium System 3.0.2
CVE-2024-12133 Medium System 3.0.2
CVE-2024-11053 Low System 3.0.1
CVE-2024-50602 Medium System 3.0.1
CVE-2024-52533 Medium System 3.0.1
CVE-2024-47606 Medium System 3.0.1
CVE-2024-11168 Medium System 3.0.1
CVE-2024-9287 Medium System 3.0.1
CVE-2024-52530 Medium System 3.0.1
CVE-2024-12798 Medium Java 3.0.1
CVE-2024-12801 Low Java 3.0.1
CVE-2024-38819 High Java 3.0.1
CVE-2024-38827 Medium Java 3.0.1
CVE-2024-50379 High Java 3.0.1
CVE-2024-56337 High Java 3.0.1
CVE-2013-4235 Low System 3.0.0
CVE-2016-2568 Low System 3.0.0
CVE-2016-2781 Low System 3.0.0
CVE-2022-3219 Low System 3.0.0
CVE-2022-41409 Low System 3.0.0
CVE-2023-7008 Low System 3.0.0
CVE-2023-25193 Low System 3.0.0
CVE-2023-26604 Low System 3.0.0
CVE-2023-29383 Low System 3.0.0
CVE-2023-34969 Low System 3.0.0
CVE-2023-45918 Low System 3.0.0
CVE-2023-50495 Low System 3.0.0
CVE-2024-2236 Medium System 3.0.0
CVE-2024-11168 Medium System 3.0.0
CVE-2024-21208 Low System 3.0.0
CVE-2024-21210 Low System 3.0.0
CVE-2024-21217 Low System 3.0.0
CVE-2024-21235 Medium System 3.0.0
CVE-2024-26461 Low System 3.0.0
CVE-2024-26462 Medium System 3.0.0
CVE-2024-52533 Medium System 3.0.0
CVE-2024-52615 Medium System 3.0.0
CVE-2024-52616 Medium System 3.0.0
CVE-2024-37891 Low System 2.5.1
CVE-2024-47175 Medium System 2.5.1
CVE-2024-38820 Medium Java 2.5.1
CVE-2024-38821 Critical Java 2.5.1
CVE-2016-1585 Medium System 2.5.0
CVE-2023-7216 Medium System 2.5.0
CVE-2023-27043 Medium System 2.5.0
CVE-2024-0397 Medium System 2.5.0
CVE-2024-2511 Low System 2.5.0
CVE-2024-4032 Low System 2.5.0
CVE-2024-4741 Low System 2.5.0
CVE-2024-5535 Low System 2.5.0
CVE-2024-6232 Medium System 2.5.0
CVE-2024-6345 Medium System 2.5.0
CVE-2024-6923 Medium System 2.5.0
CVE-2024-7264 Medium System 2.5.0
CVE-2024-7592 Low System 2.5.0
CVE-2024-8088 Medium System 2.5.0
CVE-2024-8096 Medium System 2.5.0
CVE-2024-21131 Medium System 2.5.0
CVE-2024-21138 Medium System 2.5.0
CVE-2024-21140 Medium System 2.5.0
CVE-2024-21145 Medium System 2.5.0
CVE-2024-21147 Medium System 2.5.0
CVE-2024-37370 Medium System 2.5.0
CVE-2024-37371 Medium System 2.5.0
CVE-2024-45490 Medium System 2.5.0
CVE-2024-45491 Medium System 2.5.0
CVE-2024-45492 Medium System 2.5.0
CVE-2024-38809 Medium Java 2.5.0
CVE-2024-38816 High Java 2.5.0
CVE-2024-7254 High Java 2.5.0