. . "The company has implemented a ranking system similar to that used by Microsoft and other software suppliers, designating vulnerabilities as critical, important, moderate and low." . .