Accessibility statement

Vulnerability disclosure policy

Protecting our systems and data from security vulnerabilities is integral to what we do. We aim to identify and address any weaknesses that could allow an attacker to compromise the integrity, availability, or confidentiality of any University product, service or system.

We also value the vital work done by security researchers in making the Internet a safer and more secure space, and have developed this policy using guidance from ISO 29147:2018. If you have identified a security vulnerability in our products, services or systems we would like to work with you to improve our systems.

Please review this policy before attempting to test or report a vulnerability.

University employees and contractors

If you are an employee or contractor of the University of York please contact CERT (Computer Emergency Response Team) prior to taking any action under this policy:

You can report any vulnerability you discover in our systems by contacting CERT (Computer Emergency Response Team):

See Communicating with us for more details on how to contact us, including how to secure your communications.

In all cases, you must:

  • Respect privacy. Contact us immediately if you access anyone else’s data - personal or otherwise. This includes usernames, passwords and other credentials. You must not save, store or transmit this information.
  • Act in good faith. You should report the vulnerability to us with no conditions attached.
  • Work with us. Promptly report any findings to us, stop after you find the first vulnerability and request permission to continue testing. Allow us a reasonable amount of time (at least 90 days) to resolve the vulnerability before publicly disclosing it.

You must not:

  • Exfiltrate data - instead use a proof of concept to demonstrate a vulnerability
  • Use a vulnerability to disable further security controls
  • Perform social engineering
  • Perform any testing of physical security
  • Break the law, or any agreements you may have with the University of York or third parties.

Credits and thanks

The University of York thanks the following people for their help with vulnerability reports:

  • Syed Muhammad Asim
  • Lütfü Mert Ceylan
  • Ash Holland (two reports)
  • Serji Lacroute
  • Hoggervr
  • Marks Polakovs
  • Shripad Rachha
  • Mehedi Hasan Remon
  • Bhargab Kaushik
  • Tayfun Akyildiz
  • Harshal S. Sharma
  • Chirag Ketan Prajapati
  • Sndp Giri
  • Tri Wanda Septian
  • Deepak Kumar Singh
  • Ismail Tasdelen
  • niggy
  • Alana Witten
  • Selvavinayagan Babiharan
  • Prince Prafull
  • Abhith Damodaran
  • Rakan Abdulrahman Al-Khaled
  • Emily Dennison
  • Younghun Lee
  • Akash Rajendra Patil
  • Rakesh Sharma
  • Dzmitry Smaliak
  • Nimmagadda Sai Krishna
  • Vinayak Sakhare
  • Felipe Gabriel Renzi
  • Joshua Arulsamy
  • Urvesh Shankar Waghela
  • Adrian Tirado Garcia
  • Ayushi Poreddiwar 
  • Steven n0tst3 Black (two reports)
  • Yasser Alenazi - Twitter (@firfox20)
  • Karan Rathod
  • Navreet (Country: India)
  • Aviv Keller (@RedYetiDev)
  • Mohamed Akees (Country: Sri Lanka)
  • Everton Silva - Instagram (@hydd3n.sec)
  • Jitendra Behera
  • Ori Levi
  • Mahbub Rahman Sharaf