To report a security vulnerability, you can contact ARC Informatique using the point of contact described in the Contact section. When submitting a vulnerability report, we expect the finder to provide at least the following information:
- Name of the Product with its build number and the affected component
- Detailed description of the potential vulnerability and its impact
- Installation or configuration prerequisites
- Proof-of-concept or exploit code if available
- Step-by-step instructions
- Any other relevant information
ARC Informatique handles the reported information securely and applies industry standards to keep the information confidential.
The finder’s personal data is only used to undertake actions regarding the reported security vulnerabilities. We will not disclose your personal information to third parties without permission, unless required by law.