72452 policies in database
Link to program      
2025-04-04
arvato.com logo
Thank
Gift
HOF
Reward

arvato.com

A vulnerability disclosure policy (VDP), also referred to as a responsible disclosure policy, describes how an organization will handle reports of vulnerabilities submitted by ethical hackers. A VDP must thus be easily identifiable via a simple way, a security.txt notice.

# Our canonical URL
Canonical: https://www.arvato.com/.well-known/security.txt
# Our security address
Contact: mailto: security@arvato.om
Expires: 2025-06-26T23:42:00.000Z
# Our preferred languages
Preferred-Languages: en, de, pl
Hiring: https://career.arvato.com/
# --- For the Humans ---
#
# Arvato operates in multiple countries. A detailed list can be found at https://arvato.com/about/locations
# We host some E-Commerce websites for our customes as part of our business. Identifiable customer systems
# (e.g. by domain or publicly hosted content) are out of scope for this vulnerability management program.
#
# --------------------------------------------------------- Responsible Disclosure Information ---------------------------------------------------------
#
# Arvato's Responsible Disclosure Information
#
# Security is important to Arvato. Despite our efforts we assume that vulnerabilities are still present.
# Currently Arvato does not run a formal bug bounty program and does to reward payouts. You can still report to us.
# Thank you all for your help in keeping us and our customers safe.
#
# What to do to report a vulnerability:
#
#  * E-mail your findings to security@arvato.com
#
#  * Please provide sufficient information to reproduce the problem, so we will be able to evaluate and resolve the
#    problem as quickly as possible. The IP-address or the URL of the affected system and a description of the
#    vulnerability are usually sufficient. Complex vulnerabilities may require a more detailed explanation.
#
#
# We are primarily interested in hearing about the following vulnerability categories:
#  * Sensitive data exposure - Cross Site Scripting (XSS), SQL Injection, etc.
#  * Authentication or Session Management related issues - IDOR (Insecure Direct Object References), use of hard-coded
#    credentials, missing/insufficient MFA etc.
#  * Application logic misconfiguration that could lead to data leakage or not properly validated requests, etc.
#  * Remote Code Execution - Vulnerabilities giving direct access to Arvato Systems Group assets/servers
#  * Other types of clever vulnerabilities or unique issues that do not fall into explicit categories, but still pose a
#    threat to our systems or customers personal information, financial information and brand reputation.
#
#
# What not to do:
#  * Do not test the physical security of Arvato offices, warehouses, employees, equipment, etc.
#  * Do not test using social engineering techniques (phishing, vishing, etc.)
#  * Do not perform DoS or DDoS (Distributed Denial of Services) attacks.
#  * In any way attack our end users or engage in trade of stolen user credentials.
#  * When testing, please only do so on accounts belonging to you. Do not use leaked or compromised accounts belonging to other users.
#  * Do not take advantage of the vulnerability or problem you have discovered, for example by downloading more data than necessary,
#    or deleting or modifying other people's data to demonstrate the vulnerability.
#  * Do not reveal your findings to third party. We try our best to remediate your findings within 90 days.
#
#
# What we promise:
#  * We will respond to your report as fast as possible (normally within 10 working days but it could be considerably longer
#    during vacation periods) with our evaluation of the report.
#  * We will handle your report with strict confidentiality, and not pass on your personal details to third parties without your permission.
#  * We will keep you informed of the progress towards resolving the problem.
#
#
#----------------------------------------------------- End of Responsible Disclosure Information ------------------------------------------------------

This policy crawled by Onyphe on the 2025-04-04 is sorted as securitytxt.

FireBounty © 2015-2025

Legal notices | Privacy policy