52235 policies in database
Link to program      
2016-12-21
2019-07-14
Constant Contact, Inc. logo
Thank
Gift
HOF
Reward

Constant Contact, Inc.

At Constant Contact the safety, privacy, and security of the data our customers entrust to us is very important to us. We welcome the reporting of security vulnerabilities in our product and services and encourage researchers to reach out to us when they find issues

Disclosure

We operate under the concept of responsible disclosure and require any researcher to follow the following process:

  • The researcher shares the issue with us first before he or she shares it publicly
  • We get a reasonable amount of time to address the issue before the researcher makes the information public
  • The researcher provides all the details to validate and reproduce the issue
  • The researcher makes a good faith effort to avoid impacting the service or the data contained in it
  • The researcher must not violate any laws

There are some things we explicitly ask you not to do:

  • When experimenting, please use only test accounts you control.
  • Do not run automated scans without checking with us first.
  • Do not test the physical security of our offices
  • Do not test using social engineering techniques
  • Do not perform DoS or DDoS attacks.
  • In any way disrupt our customers

Sign-up

To sign-up to participate, please head over to <https://bugcrowd.com/user/sign_up>

Security is a constantly evolving field and we enjoy collaborating with the best and brightest in the security community. We always appreciate your taking the time to help us find and fix security flaws so they don't pose a serious risk to our customers.

Report Formatting

In the Description of a Vulnerability Report, please format the replication process as an Ordered List. Valid reports, formatted the following way, will be prioritized and accepted faster by Newfold Digital:

> Steps To Reproduce: (Add details for how we can reproduce the issue) > >
> >
> > 2. [add step 1] > > 4. [add step 2] > > 6. [add step 3]... > >
> >
> >

Scope

Program rules

This program follows Bugcrowd’s standard disclosure terms.

For any testing issues (such as broken credentials, inaccessible application, or Bugcrowd Ninja email problems), please email support@bugcrowd.com. We will address your issue as soon as possible.

Learn more about Bugcrowd’s VRT.

This program follows Bugcrowd’s standard disclosure terms.

In Scope

Scope Type Scope Name
ios_application

Constant Contact mobile applications [iOS and Android]

undefined

All API SDKs

web_application

All Constant Contact websites - *.constantcontact.com

web_application

All Constant Contact APIs - api.constantcontact.com

Out of Scope

Scope Type Scope Name
undefined

Any asset not explicitly listed as 'In Scope' above is explicitly out of scope


This program feature scope type like web_application, undefined, ios_application.

FireBounty © 2015-2024

Legal notices | Privacy policy