Security of data entrusted to us by our clients has the highest priority. This is why we have decided to implement a bug bounty program and invite independent security researchers to help us further improve the security of our systems.
Solely the web applications within the authenticated area processing customer data (i.e. the products like email, calendar or file storage, including the authentication systems) are currently within scope of the bug bounty program.
All other systems are out of scope. Of course we still accept vulnerability reports for those systems, but we do not reward the reports.
If you have found a vulnerability on a system but you are not sure whether it belongs to the above mentioned systems in scope, you can send us an email to the address listed below with the fully qualified domain name of the system. We will reply to you shortly.
We are interested solely in reports of exploitable security issues which put confidentiality or integrity of our customers' data at risk.
The exact amount paid out depends on the impact of the identified vulnerability.
The following common examples of vulnerabilities are generally not qualified as relevant:
If you have found a vulnerability on our system (both of them being in scope of the bug bounty program), you can send your report to the following address: report@bugbounty.gmx.net
The report has to contain the following:
We will get in touch with you shortly after receiving the report.
You are eligible for the bug bounty if you: