Send
Section 1 of 2
Desana Vulnerability Disclosure Program (VDP) Reporting Form
Desana Network Limited welcomes feedback from security researchers and the general public to help improve our security and we value the input of hackers acting in good-faith to help us maintain a high standard for the security and privacy for our users. This includes encouraging responsible vulnerability research and disclosure. If you believe you have discovered a vulnerability, privacy issue, exposed data, or other security issues in any of our assets, we want to hear from you. Our Vulnerability Disclosure Policy (VDP) outlines steps for reporting vulnerabilities to us, our definition of good-faith in the context of finding and reporting vulnerabilities, what we expect from you and what you can expect from us.  You can view our Full Vulnerability Disclosure Policy (VDP) on our website and here: https://drive.google.com/file/d/13nh1Nrlj8PWsYKhZWVY1AX8JX6nAIAkz
Email
This form is collecting emails.Change settings
Please enter your name so we know who we are talking to and can address you correctly.
Question Type
Loading image…
Answer key
(0 points)
Loading...
Loading…
Section 2 of 2
Bug Details
If you have found a security or an abuse risk related bug in a Desana System and want to report it to us, you've come to the right place. Please fill out the following form and we'll be in touch shortly.
If this is a valid vulnerability report, please select the option below which best identifies the system involved.
Question Type
Loading image…
Desana Android App
Desana iOS App
Desana Web App
Desana API
Desana Website
Desana server and hosting environment
Desana Internal systems
Other:
Add option
Answer key
(0 points)
Loading...
Loading…
Please describe the technical details of the vulnerability
Question Type
It's very important to let us know how we can reproduce your findings. Videos: Just upload an unlisted video to Youtube. Keep in mind that videos are rarely needed. File attachments: We don't support file attachments. You'll get an email after submission, just reply with the files attached. Alternatively, upload the files and paste the link below. E.g. you may upload to Google Drive and use a shareable link feature.
Loading image…
Answer key
(0 points)
Loading...
Loading…
Please briefly explain who can exploit the vulnerability, and what they gain when doing so - write an attack scenario. This will help us greatly to quickly evaluate your report, especially if the issue is complex.
Question Type
Loading image…
Answer key
(0 points)
Loading...
Loading…
Is this vulnerability public or known to third parties?
Question Type
Loading image…
Yes, this vulnerability is public or known to third parties.
No, this vulnerability is private.
Add option
or
add "Other"
Answer key
(0 points)
Loading...
Loading…
Link to Sheets
Message for respondents
This form is no longer accepting responses
Insights
Total points distribution
Loading...
Loading responses…
Please enter your name so we know who we are talking to and can address you correctly.
Copy chart
No responses yet for this question.
Bug Details
If this is a valid vulnerability report, please select the option below which best identifies the system involved.
Copy chart
No responses yet for this question.
Please describe the technical details of the vulnerability
No responses yet for this question.
Please briefly explain who can exploit the vulnerability, and what they gain when doing so - write an attack scenario. This will help us greatly to quickly evaluate your report, especially if the issue is complex.
No responses yet for this question.
Is this vulnerability public or known to third parties?
Copy chart
No responses yet for this question.
Settings
Responses
Manage how responses are collected and protected
Presentation
Manage how the form and responses are presented
Defaults
Form defaults
Settings applied to this form and new forms
Question defaults
Settings applied to all new questions
.