Unilever Vulnerability Disclosure Program

  • Safe harbor
  • No collaboration

New Target added

The following targets have been added and some old URL are updated:
https://www.zest.com.mx/
yulaenergy.com/es/en
https://www.yumos.com/home.html
https://www.xedex-centroamerica.com/home.html
https://www.winnenmetunilever.nl/
https://www.weis.com.au/
https://webmail.unileverservices.com/
https://www.weareul.com/
https://www.wallsthailand.com/home.html
wallsicecream.com/uk
https://www.wallsicecream.com/id/home.html
https://www.wallsicecream.com/uk/home.html
https://www.walls.com.my/home.html
https://www.wallpaintingunilever.com/WP/
https://www.visopises.com/
https://www.via.se/home.html
https://www.vasenol.com.br/
https://www.vaseline.jp/
https://www.vaseline.com/za/en
https://www.vaseline.com/us/es
https://www.vaseline.com/th/th
https://www.vaseline.com/my/en
https://www.vaseline.com/lk/en
https://www.vaseline.com/in/en
https://www.vaseline.com/id/id
https://www.vaseline.com/ca/fr
https://www.vaseline.com/ca/en
https://www.vaseline.com/arabia/en
https://www.vaseline.com.tr/

As always, please see the program brief for the full details around testing. If you have any questions, please reach out to support@bugcrowd.com.