
Experian
External Program
Submit bugs directly to this organization
Maintaining the security of our networks and applications is a priority at Experian. The security community regularly makes valuable contributions to the security of organizations and Experian recognizes that fostering a close relationship with the community will help improve our own security. So if you have information about a vulnerability in an Experian system or web application, we want to hear from you! Information submitted to Experian under this program will be used for defensive purposes – to mitigate or remediate vulnerabilities in our networks or applications, or the applications of our vendors. As part of this program, you must review, understand, and agree to the following terms and conditions before conducting any testing of Experian networks and before submitting a report. Thank you.
The following assets and subdomains within are out-of-scope: SmartBusinessReports.com, ContactorCheck.com, SupplierCheck.com, SmallBusiness.Experian.com, BusinessCreditFacts.com
This policy is intended to give security researchers and other participants in the security community clear guidelines under the Experian Vulnerability Disclosure Program for conducting vulnerability discovery activities directed at web properties owned or operated by Experian Inc., its affiliates, or subsidiaries ("Experian"), and submitting discovered vulnerabilities to Experian. Your participation in the program is voluntary and subject to the terms and conditions set forth on this page. By submitting a report, you acknowledge and agree to the terms and conditions contained in this Policy. You also acknowledge that, to the extent they are not inconsistent with this Policy, you are subject to:
Experian will make a best effort to meet the following response targets for hackers participating in our program:
We will investigate reports based on information available and may contact you for further information. Please note that reports marked as triaged are subject to change pending our team's final analysis. We'll try to keep you informed about our progress throughout the process.
As this is a private program, please do not discuss this program or any vulnerabilities (even resolved ones) outside of the program without express written consent from the organization. Follow HackerOne's disclosure guidelines.
Any public-facing system owned, operated, or controlled by Experian, including web applications hosted on those sites. Qualifying vulnerabilities may include cross-site scripting, cross-site request forgery, authentication or authorization flaws, server-side code execution bugs, and other issues that impact user data or system integrity.
When reporting vulnerabilities, please consider (1) attack scenario / exploitability, and (2) security impact of the bug. The following issues are considered out of scope:
You must comply with Experian's Terms of Use, security industry best practices, and all applicable Federal, State, and local laws in connection with your security research activities or other participation in this vulnerability disclosure program. You agree that any and all information acquired or accessed as part of this exercise is confidential to Experian and you shall hold all such information in strict confidence and shall not copy, reproduce, sell, assign, license, market, transfer or otherwise dispose of, give, or disclose such information to third parties or use such information for any purposes other than for the performance of your work or expressly authorized in writing by Experian.
Experian does not authorize, permit, or otherwise allow (expressly or impliedly) any person, including any individual, group of individuals, consortium, partnership, or any other business or legal entity to engage in any security research or vulnerability or threat disclosure activity that is inconsistent with this policy or the law. If you engage in any activities that are inconsistent with this policy or the law, you may be subject to criminal and/or civil liabilities. To the extent that any security research or vulnerability disclosure activity involves the networks, systems, information, applications, products, or services of a non-Experian entity (e.g., Federal departments or agencies; State, local, or tribal governments; other private sector companies or persons; employees or personnel of any such entities; or any other such third party), that non-Experian third party may independently determine whether to pursue legal action or remedies related to such activities. By submitting a report to Experian, you grant to Experian Inc., its subsidiaries and its affiliates, a perpetual, irrevocable, no charge license to all intellectual property rights licensable by you in or related to the use of information or material submitted. You must notify us if any part of your report is not your own work or is the intellectual property of a third-party.
Experian may modify the terms of this policy or terminate the policy at any time.
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
Thank you for helping keep Experian and our users safe!