Desana Vulnerability Disclosure Program (VDP) Reporting Form
Form description
Desana Network Limited welcomes feedback from security researchers and the general public to help improve our security and we value the input of hackers acting in good-faith to help us maintain a high standard for the security and privacy for our users. This includes encouraging responsible vulnerability research and disclosure. If you believe you have discovered a vulnerability, privacy issue, exposed data, or other security issues in any of our assets, we want to hear from you. Our Vulnerability Disclosure Policy (VDP) outlines steps for reporting vulnerabilities to us, our definition of good-faith in the context of finding and reporting vulnerabilities, what we expect from you and what you can expect from us. You can view our Full Vulnerability Disclosure Policy (VDP) on our website and here: https://drive.google.com/file/d/13nh1Nrlj8PWsYKhZWVY1AX8JX6nAIAkz
Email*
Valid email
This form is collecting emails.Change settings
Please enter your name so we know who we are talking to and can address you correctly.
*
Question
Please enter your name so we know who we are talking to and can address you correctly.
*
Question Type
Short answer
Paragraph
Multiple choice
Checkboxes
Dropdown
File upload
Linear scale
Rating
New
Multiple choice grid
Checkbox grid
Date
Time
Description
Loading image…
Caption
Short answer text
Response validation has been added.
Remove
Number
Text
Length
Regular expression
Greater than
Greater than or equal to
Less than
Less than or equal to
Equal to
Not equal to
Between
Not between
Is number
Whole number
Number
and
Number
Custom error text
Answer key
(0 points)
Loading...
Loading…
Section 2 of 2
Section title (optional)
Bug Details
Description (optional)
If you have found a security or an abuse risk related bug in a Desana System and want to report it to us, you've come to the right place. Please fill out the following form and we'll be in touch shortly.
If this is a valid vulnerability report, please select the option below which best identifies the system involved.
*
Question
If this is a valid vulnerability report, please select the option below which best identifies the system involved.
*
Question Type
Short answer
Paragraph
Multiple choice
Checkboxes
Dropdown
File upload
Linear scale
Rating
New
Multiple choice grid
Checkbox grid
Date
Time
Description
Loading image…
Caption
Desana Android App
Desana iOS App
Desana Web App
Desana API
Desana Website
Desana server and hosting environment
Desana Internal systems
Other:
Other:
Add option
or
add "Other"
…
Answer key
(0 points)
Loading...
Loading…
Please describe the technical details of the vulnerability
*
Question
Please describe the technical details of the vulnerability
*
Question Type
Short answer
Paragraph
Multiple choice
Checkboxes
Dropdown
File upload
Linear scale
Rating
New
Multiple choice grid
Checkbox grid
Date
Time
Description
It's very important to let us know how we can reproduce your findings. Videos: Just upload an unlisted video to Youtube. Keep in mind that videos are rarely needed. File attachments: We don't support file attachments. You'll get an email after submission, just reply with the files attached. Alternatively, upload the files and paste the link below. E.g. you may upload to Google Drive and use a shareable link feature.
Loading image…
Caption
Long answer text
Length
Regular expression
Maximum character count
Minimum character count
Number
Custom error text
Answer key
(0 points)
Loading...
Loading…
Please briefly explain who can exploit the vulnerability, and what they gain when doing so - write an attack scenario. This will help us greatly to quickly evaluate your report, especially if the issue is complex.
*
Question
Please briefly explain who can exploit the vulnerability, and what they gain when doing so - write an attack scenario. This will help us greatly to quickly evaluate your report, especially if the issue is complex.
*
Question Type
Short answer
Paragraph
Multiple choice
Checkboxes
Dropdown
File upload
Linear scale
Rating
New
Multiple choice grid
Checkbox grid
Date
Time
Description
Loading image…
Caption
Long answer text
Length
Regular expression
Maximum character count
Minimum character count
Number
Custom error text
Answer key
(0 points)
Loading...
Loading…
Is this vulnerability public or known to third parties?
*
Question
Is this vulnerability public or known to third parties?
*
Question Type
Short answer
Paragraph
Multiple choice
Checkboxes
Dropdown
File upload
Linear scale
Rating
New
Multiple choice grid
Checkbox grid
Date
Time
Description
Loading image…
Caption
Yes, this vulnerability is public or known to third parties.
No, this vulnerability is private.
Other:
Add option
or
add "Other"
…
Answer key
(0 points)
Loading...
Loading…
Link to Sheets
The number of responses collected by this form may exceed the limit supported by Sheets. If you're having trouble viewing your responses in Sheets, try downloading a .CSV instead.
Message for respondents
This form is no longer accepting responses
Summary
Question
Individual
Insights
Total points distribution
Loading...
Loading responses…
This form is approaching the response limit. Once surpassed, the summary of responses will no longer be displayed. Learn more
Close
This form has exceeded 50,000 responses and the summary of responses can no longer be displayed. You can still download responses as a .csv file. Learn more
Please enter your name so we know who we are talking to and can address you correctly.
Copy chart
No responses yet for this question.
Bug Details
If this is a valid vulnerability report, please select the option below which best identifies the system involved.
Copy chart
No responses yet for this question.
Please describe the technical details of the vulnerability
No responses yet for this question.
Please briefly explain who can exploit the vulnerability, and what they gain when doing so - write an attack scenario. This will help us greatly to quickly evaluate your report, especially if the issue is complex.
No responses yet for this question.
Is this vulnerability public or known to third parties?
Copy chart
No responses yet for this question.
Waiting for responses
of
6
This form is approaching the response limit. Once surpassed, the question view will no longer be displayed. Learn more
Close
of
1
Loading...
Loading response…
This form is approaching the response limit. Once surpassed, the individual view will no longer be displayed. Learn more
Close
Grades from previous versions of this form are hidden. Learn more
Settings
Release grades
Respondent settings
Global quiz defaults
Default question point value
Point values for every new question
points
Responses
Manage how responses are collected and protected
Collect email addresses
Required by Locked mode
Required to send response copies
Respondents will manually enter their email response
Do not collect
Verified
Responder input
Send responders a copy of their response
Disabled by Locked mode
Requires Collect email addresses
Off
When requested
Always
Requires sign in
File upload
Total size limit for all uploaded files
This limit is smaller than the max size of a single response.
Responses will not be accepted after the limit is reached. Learn more
1 GB
10 GB
100 GB
1 TB
Presentation
Manage how the form and responses are presented
Form presentation
After submission
Confirmation message
Thank you for your report, our team will review this urgently. If for any reason you do not receive a response in a time scale you feel is appropriate please reach out to Desana via DM on your favorite Social Media channel.