HERRING TECHNOLOGY SERVICES PTE. LTD.
Sign In
HERRING TECHNOLOGY SERVICES PTE. LTD.
Home
Subject Access Request
Report Vulnerability
Policy
Subject Access Request Form
Name
*
Email
*
Contact Number
*
Address
*
How would you like your subject access request disclosure to be delivered?
*
Email
By post to the mentioned address
Identify yourself
*
Authorized Users of the Customer
Clients/consumers of the Customer
Category of data
*
Personal details (including IP address) of Customer’s Authorized Users of the Services include first and last name, email address, and phone numbers.
Information provided by client or customer of Customer. This information may include any information that is manually / automatically fed into our application, including source code.
Data Collected to fulfill our application obligations.
What is your request?
*
Know the categories of personal information collected about you in the prior 12 months and its sources and business purpose
Know whether your personal information is sold or disclosed, and to whom, in the prior 12 months
Opt out of the sale or sharing of your personal information
Access and then delete your personal information (subject to exceptions)
Equal service and price (non-discrimination) if you exercise your privacy rights
Limit the use of your sensitive personal information
Correct your personal information
Remarks
Submit
Report Vulnerability Form
VULNERABILITY SUMMARY
Report Title
*
Product/Website Concerned
*
CVSS(4.0) Score
None
0
CVSS:4.0/AC:L/AT:N/AV:N/PR:N/SA:N/SC:N/SI:N/UI:N/VA:N/VC:N/VI:N
Exploitability Metrics
Attack Vector (AV)
Attack Complexity (AC)
Attack Requirements (AT)
Privileges Required (PR)
User Interaction (UI)
Vulnerable System Impact
Confidentiality (VC)
Integrity (VI)
Availability (VA)
Subsequent System Impact
Confidentiality (SC)
Integrity (SI)
Availability (SA)
REPORTER INFORMATION
Your Name
Your Mail
Your PGP public key
TECHNICAL DETAILS
Endpoint
*
Vulnerable Part
*
Part Name
*
Payload
*
Technical Environment
*
Technical Details
*
Upload Files
I agree with
Disclosure policy
By submitting a report, security researcher warrants that the report and any attachments do not violate the intellectual property rights of any third party and the security researcher assigns free of charge to the receiving company who accepts all intellectual property rights.
Submit