Overview
At Kenoxis, our undertaking is to keep our customers' structures and devices secured and guarded towards all kinds of cyber threats with products that run the modern day and present day era. Our engineering crew institutes a couple of fail-secure practices and strategies, and the products undergo rigorous tests before they're launched to the marketplace. Having said that, there might occur sure rare situations in which unintended safety flaws are said in our products and services. With the assist of this phase, we intend to offer a discussion board in which capacity vulnerabilities can be said and we can work closely with you to mitigate the associated dangers.
What is a security vulnerability?
A protection vulnerability (also called a security hollow) is a protection flaw detected in a product which could depart it open to assaults through hackers and malware. A treatment for this kind of vulnerability is known as a patch, applying which leaves fewer options for hackers to make the most the affected gadget.
Report a security vulnerability
If you're a protection researcher and feature determined a safety vulnerability in a Kenoxis product, please ship us an email at support@kenoxisav.com describing the under-listed facts. Please note that, the extra statistics you provide the higher our crew may be capable to analyze the vulnerability and tool an answer for it.
- Description and type (Buffer Overflow, XSS, Access Control, and many others.) of the issue
- Severity and effect of the issue
- Product and version
- Instructions and manner to reproduce the problem consisting of any extra data which includes:
- Operating System information including service packs, safety updates, or different updates for the product you have
- mounted anywhere relevant
- Any special configurations required to breed the issue
In reaction to your vulnerability file acquired on support@kenoxisav.com, you should obtain a reply from us inside 5 enterprise days.
We recognize the time and effort invested by way of you in our challenge to make our products and services freed from protection flaws and the dangers associated with them. And besides expressing our gratitude, we would like to acknowledge your contribution with a praise post validation/confirmation of the stated vulnerability.