[NEW] HikCentral Professional V2.4.1
[NEW] HikCentral Connect V1.2.0
[NEW] HikCentral Access Control V2.0.1
HikCentral Access Control V2.0
HikCentral Professional V2.4.0
HikCentral Professional V2.3.1
HikCentral Professional V2.3.0
HikCentral Professional V2.2.2
HikCentral Professional V2.2.1
HikCentral Professional V2.2.0
HikCentral Access Control V1.3.0
HikCentral Access Control V1.2.0
Explosion-Proof and Anti-corrosion Series
Vulnerability Reporting and Response Process：
Hikvision attaches great importance on cybersecurity of its products and solution. We promise that for every problem reported, there is a specially assigned person to follow up, analyze and give feedback in time.
Hikvision supports responsible vulnerability reporting procedures, and respect the research results of every white hat, who will be welcomed to report the vulnerability to Hikvision. Hikvision request the vulnerability reporter keep the vulnerability confidential until Hikvision releases the public Security Advisory.
HSRC uses CVSSv3.1 to give the Base Score, Temporal Score and attack vector of each vulnerability in the security advisory. For the CVSSv3.1 standard, please refer to: https://www.first.org/cvss/specification-document
HSRC uses CVE (Common Vulnerability and Exposures) to quote the vulnerabilities outside of Hikvision vulnerability disclosure websites.