Vulnerability report

Security vulnerability refers to the defect or weakness that can be exploited to violate the system security policy in the system design, deployment, operation or management.

The security vulnerability reporter can submit Uniview relevant potential security vulnerabilities by email (security@uniview.com). In order to verify and locate the vulnerability, please try to include but not limited to the following contents in the email:

  1. Organization and contact information
  2. Reference information
  3. The affected product or solution and its version
  4. Description of the potential vulnerability
  5. Technical details (such as system configuration, location method, description of exploit, sample capture packet, POC, steps of problem reproduction, etc.)
  6. Information about the public exploit
  7. Possible vulnerability disclosure plans