Skip to main content
HEMA Information Security HEMA Information Security


Table of Contents

responsible disclosure acknowledgements for security researchers who succesfully identified and reported vulnerabilities to HEMA.

acknowledgements #

On this page we acknowledge those who successfully identified and reported vulnerabilities on HEMA systems. Mentions on this webpage are reserved for those who reported qualified vulnerabilities and followed the responsible disclosure process.

Being mentioned on this webpage is voluntarily and at the discretion of the security researcher. As such, not all individuals are listed. Naturally, our gratitude also extents to them.

hall of fame #

A big thanks to the following individuals, who responsible disclosed vulnerabilities to us:

HEMA is grateful for your investigation and for sharing your technical knowledge with us. As such, you help us and other organizations becoming more secure.