YOU’RE NOT VIEWING PANDA SECURITY USA. CLICK TO IMPROVE YOUR EXPERIENCE
VISIT PANDA SECURITY USA
x
AANBIEDING 48 uur geldig
Als u op dit moment klant bent
van onze producten voor
thuisgebruik, kunt u nu
verlengen en 50% besparen
NU VERLENGEN
x
AANBIEDING 48 UUR GELDIG
50%
VERLENGINGEN Alleen voor thuisgebruikers
VERLENGEN MET KORTING
x
SPECIAL OFFER
Als u op dit moment klant bent
van onze producten voor
thuisgebruik, kunt u nu
verlengen en 50% besparen
NU VERLENGEN
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
KOOP NU EN KRIJG 50% KORTING
x
SPECIAL OFFER
Koop de beste antivirus
aan de beste prijs
KOOP NU EN KRIJG 50% KORTING
x
SPECIAL OFFER
Koop de beste antivirus
aan de beste prijs
KOOP NU EN KRIJG 50% KORTING
x
TOT
-60%
NU KOPEN
x
TOT
-60%
NU KOPEN

Technische Ondersteuning

Wat kunnen we voor u betekenen?

 

How to report a security vulnerability to Panda Security

Informatie van toepassing op:

Products
Todos los productos

Introduction
Panda Security is committed to resolving security vulnerabilities in our products in a quick and efficient manner. We very much appreciate and encourage the collaboration with researchers who report vulnerabilities to us. The following article explains how to report a Panda Security vulnerability to the Panda Security Response Team.


Responsible Disclosure
Please follow the responsibility disclosure norms to ensure a safe and successful procedure:
  • Notify Panda Security Reponse Team privately
  • Only disclose the findings after Panda Security makes the vulnerability and solution public.
  • Respect the disclosure coordination procedure. This is vital to avoid attacks.

How to report a security vulnerability
If you are a security researcher and believe you have found a Panda Security security vulnerability, we would like to work with you to investigate it. Please contact the Panda Security Response Team at: secure@pandasecurity.com

The exchange of emails between Panda Security and the investigators must always be encrypted with PGP and GPG in order to protect the confidentiality of vulnerability reports. Find the Panda Security PGP public key here: Panda Security Response Key

To help us better understand the nature and characteristics of the possible vulnerability, please provide us with a detailed Proof of Concept (PoC) and make sure the issue can be replicated. Please, include the information below:

  • Product name and version number
  • Date the vulnerability was detected
  • Description of the vulnerability
  • Instructions to replicate the vulnerability (sequence of steps, a video, screenshots, etc.)
  • Your name and the company name
  • Your contact details (email address, telephone number, anonymous)
  • Your PGP or GPG public key to allow for encrypted communication (if available)

The Panda Security Response Team will confirm receipt of your report within two business days. We will work with our teams to verify the finding and respond in a timely manner with an update or request for additional information.

Remediation of the reported vulnerability
If the finding is confirmed as valid, the Panda Security will provide mitigation or remediation of the reported vulnerability accordingly and will keep the reporter informed at all times.

Artikelnummer- 20190320 100061 EN

Hebt u een antwoord op uw vraag kunnen vinden in dit artikel?

JA NEE

Hartelijk dank voor uw antwoord


Hoe zou u dit artikel verbeterd willen zien?




Wilt u contact opnemen met onze technische ondersteuning?

ALTIJD ONLINE OM U TE HELPEN TWITTER FORUM BEOORDEEL ONS
ALTIJD ONLINE OM U TE HELPEN TWITTER FORUM BEOORDEEL ONS