You are here:
Please note that when reporting vulnerabilities, you must observe legal provisions or other obligations, especially confidentiality obligations or export control regulations.PI will in many cases contact the manufacturer of the component or the manufacturer of any technology components (e.g. protocol stacks) used to clarify the vulnerability report.
We use cookies on our website. Some of them are technically necessary, while others help us to improve this website or provide additional functionality.
Necessary cookies enable basic functions and are necessary for the proper functioning of the website.
In order to be able to display content from video platforms and social media platforms, cookies are set by these external media.