1. Home
  2. About Us
  3. Contact Us
  4. Century Systems Co., Ltd. - Vulnerability Disclosure Report Form

 

Century Systems Co., Ltd. - Vulnerability Disclosure Report Form

Introduction

Please use this form to report potential security vulnerabilities identified in Century Systems products.
We appreciate responsible disclosure and will review all submissions in accordance with our vulnerability disclosure policy.
Please review our Privacy Policy to understand how your personal data will be collected, used, and protected.

Fields marked with an asterisk ( * ) are required.

Safe Harbor

Century Systems will not pursue legal action against security researchers who:

- Act in good faith
- Comply with this policy
- Do not exploit vulnerabilities for malicious purposes

We consider such activities to be authorized and lawful.

Important Notice:

- Do not include sensitive personal data unless it is strictly necessary.
- Do not perform testing that could disrupt services or violate applicable laws.
- By submitting this form, you confirm that your report complies with all applicable laws and regulations.

Reporter Information

Full Name *
Company Name *
Department /
Organization 
Contact Email Address *

Product Details

Product Category /
Name *
Please select or specify the applicable product category:
If you have two or more products, or if the product is not on the list, please enter the details here.
Firmware /
Software Version

Vulnerability Information

Type of Vulnerability *
Please describe the type of vulnerability.
(e.g., SQL Injection, Cross-Site Scripting (XSS), Buffer Overflow, OS Command Injection, etc.)
Impact *
Please describe the potential impact of this vulnerability.
(e.g., Information Disclosure, Denial of Service, Privilege Escalation)
Vulnerability Details /
Description *
Please provide a detailed description of the vulnerability.
Steps to Reproduce
(Proof of Concept) *
Please provide clear and detailed steps, including any proof-of-concept (PoC), to reproduce the issue.
Reproducibility*
Additional Information
on Reproducibility

CVE Information

CVE ID (if assigned)
Please enter the ID if already assigned (e.g., CVE-2025-XXXXX).
Mitigation /
Workaround *
Please describe any known workaround or mitigation.
PoC Availability *
     
Attachment (Optional)
You may upload supporting files (e.g., PoC, logs, or screenshots).
- Accepted format: ZIP
- Maximum file size: 5 MB
Privacy Notice
Your personal data will be processed solely for the purpose of handling and responding to your vulnerability report.
Your information may be transferred to and processed in countries outside your jurisdiction in accordance with our Privacy Policy.
Please do not include unnecessary sensitive personal data in your submission.

Submission
By submitting this form, you agree to the following:
- Your submission will be used for security assessment and remediation purposes.
- You grant Century Systems the right to use, reproduce, and modify the submitted information for resolving the issue.
- You represent that the information provided is accurate to the best of your knowledge.
- You have read and agree to our Privacy Policy.

ページトップ