Step 3: Review
The report is ready to submit. Please review your privacy options and
summary, attach any supporting documents, and then click to
submit.
You can click on the links above to amend any data.
Supporting documents
Upload any supporting documents as a single ZIP, PDF or Word Document (Max 10MB).
You can only upload
ZIP, PDF or Word Documents
The uploaded document must be a maximum of 10MB in size
Your vulnerability report
The product
- Company or manufacturer:
- {data['product:manufacturer']}
- Link to Company of Manufacturer's main website
- {data.product:manufacturer-url}
- Company email address
- {data.product:manufacturer-email}
- Name of product:
- {data['product:name']}
- Model, version or revision number:
- {data['product:model']}
- Category of IoT:
- {data['product:type']}
- {data['product:type-other']}
- Location of vulnerability:
-
, {item}
- {data['product:where-other']}
- Web page:
- {data.product:link | ternary data.product:link 'Not Supplied'}
The vulnerability
- Discovery date:
- {data['vulnerability:date']}
- Technical description:
- {data['vulnerability:description']}
- Connected devices:
- {data['vulnerability:devices']}
- System configuration:
- {data.vulnerability:configuration | ternary data.vulnerability:configuration 'Not Supplied'}
- Were other parties involved?
- {data['vulnerability:third-parties']}
- {data['vulnerability:third-parties-other']}
- Potential Threats:
-
, {item}
- {data['vulnerability:threat-other']}
- Risk level:
- {data['vulnerability:risk']}
- Is the exploit publicly available now?
- {data['vulnerability:exploit']}
- Link to the exploit
- {data.vulnerability:exploitlink | ternary data.vulnerability:exploitlink 'Not Supplied'}
- Do you believe it is being exploited now?
- {data['vulnerability:exploited']}
Please help us to improve the Vulnerable Things service
This following information is collected so that we may better understand use of the
Vulnerable Things service. Data will be anonymised and will not be shared or sold to third
parties.
Please complete the
captcha
By clicking Submit I confirm that I submit this IoT Vulnerability Report
in accordance with the
Terms and Conditions.