Programm zur verantwortungsvollen Offenlegung

Ostrom's Vulnerability Disclosure Policy


Vulnerability Disclosure Philosophy
Ostrom believes effective disclosure of security vulnerabilities requires mutual trust, respect, transparency and common good between Ostrom and Security Researchers. Together, our vigilant expertise promotes the continued security and privacy of Ostrom customers, products, and services.


Security Researchers
Ostrom accepts vulnerability reports from all sources such as independent security researchers, industry partners, vendors, customers and consultants. Ostrom defines a security vulnerability as an unintended weakness or exposure that could be used to compromise the integrity, availability or confidentiality of our products and services.


Scope
This policy applies to any digital assets owned, operated, or maintained by Ostrom, including public facing websites.


Our Commitment to Researchers


What We Ask of Researchers


Submission form
All fields are required unless marked optional.


Summary title
Help us get an idea of what this vulnerability is about.


Target
Select the vulnerable target
Targets that are not explicitly in scope may not be eligible for acceptance.


Vulnerability details
URL / Location of vulnerability (optional)
For example: https://www.ostrom.de/en/compliance
Description
Describe the vulnerability and its impact.
Provide a proof of concept or replication steps.
Maximum 25,000 characters.
Attachments (optional)
Attach proof-of-concept scripts, screenshots, screen recordings, etc.
Max file size 10MB.
Uploading...
fileuploaded.jpg
Upload failed. Max size for files is 10 MB.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.