By accessing Bruffers Tech or any of its associate/group sites, you have read, understood and agree to be legally bound by the terms and conditions of the following disclaimer and user agreement: This site is owned and operated by Bruffers Tech and contains material which is derived in whole or in part from material supplied by the company, various new agencies and other sources, and is protected by international copyright and trademark laws. The restrictions on use of the material and content on this Bruffers Tech by the Subscriber are specified below. Except where specifically authorized, the subscriber may not modify, copy, reproduce, republish, upload, post, transmit or distribute in any way any material from this site including code and software.
REPORT AN ISSUE
HOW TO REPORT AN ISSUE?
If you happen to have identified a vulnerability on any of our web properties, we request you to follow the steps outlined below:
1. Please contact us immediately by sending an email to [email protected] with the necessary details to recreate the vulnerability scenario. This may include screenshots, videos or simple text instructions.
2. If possible, share with us your contact details (email, phone number), so that our security team can reach out to you if further inputs are needed to identify or close the problem.
3. If you intend to make the information public for educational or other such needs, please give us reasonable time to appropriately fix the problem before making such information public. Our security team will work with you to estimate and commit to such time frame.
4. If the identified vulnerability can be used to potentially extract information of our customers or systems, or impair our systems’ ability to function normally, then please refrain from actually exploiting such a vulnerability. This is absolutely necessary for us to consider your disclosure a responsible one. While we appreciate the inputs of White hat hackers, we may take legal recourse if the identified vulnerabilities are exploited for unlawful gains or getting access to restricted customer or system information or impairing our systems.