Mailbox
info@zdenergy.com
The email should include at least the following information:
- Your organization and contact information
- Products and versions affected
- Description of the potential vulnerability
- Information about known exploits
- Disclosure plans
- Additional information, if any
Attention
Although we encourage investigation of potential security breaches, we cannot tolerate any activity that may interfere with legitimate users or may violate applicable computer abuse, cyber security and data protection regulations. Therefore, the following activities are prohibited:
- Modification or destruction of data
- Service disruption or degradation, such as DoS
- Disclosure of personal, proprietary or financial information
Response Time
We'll respond within 48 hours to the vulnerabilities you submit.
* Note: Actual vulnerability response time may vary depending on the risk level and complexity of the vulnerability.