Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Use of Unmaintained Third Party Components

The product relies on third-party components that are not actively supported or maintained by the original developer or a trusted proxy for the original developer.