Meta tags:
description= ;
Headings (most frequently used words):
vulnerability, we, reporting, and, report, ask, the, following, what, promise, responsible, guidelines, respect, professionalism, compliance, with, laws, response, expectations, priorities, reward,
Text of the page (most frequently used words):
the (29), and (22), your (16), report (12), will (11), you (11), our (11), #vulnerability (10), within (9), #reward (8), issue (7), this (7), possible (7), that (7), conduct (6), not (6), systems (6), for (5), new (5), security (5), with (5), information (5), days (4), vulnerabilities (4), wil (4), research (4), send (4), conclusion (4), can (3), take (3), business (3), weeks (3), reports (3), soon (3), ask (3), reporting (3), after (2), confirmation (2), via (2), expectations (2), timespan (2), all (2), share (2), required (2), law (2), may (2), appreciate (2), cooperation (2), about (2), what (2), actions (2), laws (2), compliance (2), have (2), measures (2), address (2), during (2), respectful (2), communication (2), provide (2), reproduce (2), test (2), only (2), attacks (2), quickly (2), more (2), use (2), confidential (2), protect (2), data (2), mett (2), customers (2), weak (2), spot (2), would (2), like (2), naar (2), kwetsbaarheid, melden, toegankelijkheid, privacy, cookies, gebruikersvoorwaarden, token, appreciation, assistance, offer, every, aof, determine, size, basis, severity, leak, quality, minimum, payment, working, paypal, processing, longer, holidays, urgent, high, normal, three, months, low, informative, priorities, treats, confidentially, without, permission, unless, confidentiality, request, additional, properly, addressing, keep, informed, progress, resolving, collaboration, respond, later, than, prioritize, first, based, priority, handle, respons, confirm, receipt, timely, response, promise, ensure, comply, applicable, regulations, accept, resulting, from, activities, violate, legal, right, investigate, verify, appropriate, patience, trust, process, responsibility, always, communicate, team, professional, manner, give, two, warnings, eventually, add, black, list, behavior, respect, professionalism, clear, thorough, much, allow, own, account, environment, perform, tests, could, disrupt, availability, service, dos, carefulness, sufficient, resolve, usually, url, affected, system, description, enough, but, complex, completeness, guidelines, disclose, any, personal, obtained, investigation, submit, discovering, speed, carry, out, limit, strictly, necessary, demonstrate, avoid, causing, damage, act, ethically, secure, channels, responsible, following, agree, making, services, safer, look, forward, constructive, contributions, code, above, partners, great, importance, despite, concern, there, found, one, hear, work, better, known, issues, home, hoofdmenu, hoofdinhoud,
Text of the page (random words):
report vulnerability security naar hoofdinhoud naar hoofdmenu home known issues report vulnerability the security of our systems and above all the data of our customers and partners is of great importance to us despite our concern for the security of our systems it is possible that there is a weak spot if you have found a weak spot in one of our systems we would like to hear about it so that we can take measures as quickly as possible we would like to work with you to better protect our customers and our systems by reporting a vulnerability to mett you agree to our code of conduct we appreciate your cooperation in making our services safer and look forward to your constructive contributions we ask the following responsible reporting use secure channels report vulnerabilities only via security mett nl act ethically do not carry out attacks on our systems limit your actions to what is strictly necessary to demonstrate the vulnerability and avoid causing damage to data or systems speed submit the report as soon as possible after discovering the vulnerability protect confidential information do not use share or disclose any personal or confidential information obtained during your investigation vulnerability reporting guidelines completeness provide sufficient information to reproduce the issue so that we can resolve it as quickly as possible usually the ip address or url of the affected system and a description of the vulnerability is enough but more may be required for more complex vulnerabilities carefulness test the vulnerability only in your own account or in a test environment do not perform tests that could disrupt the availability of the service e g dos attacks communication be clear and thorough in your communication provide as much information as possible to allow us to reproduce the vulnerability respect and professionalism respectful behavior we ask that you always communicate with our team in a respectful and professional manner if not we we will give you two warnings and eventually add you on a black list responsibility we have the right to investigate and verify reports and to take appropriate measures to address vulnerabilities we ask for your patience and trust during this process compliance with laws legal compliance ensure that your actions comply with applicable laws and regulations we do not accept reports resulting from activities that violate the law what we promise response and expectations timely confirmation we will confirm receipt of your report as soon as possible respons we will respond to your report as soon as possible no later than 5 business days we will prioritize your report first based on the priority we will handle your report collaboration we may request additional information we appreciate your cooperation in properly addressing the vulnerability we will keep you informed about the progress of resolving the issue confidentiality we treats all reports confidentially and will not share your report without your permission unless required by law priorities low informative we wil conduct research and send a conclusion within three months if this is a new issue we will reward you within this timespan normal we wil conduct research and send a conclusion within 4 weeks if this is a new issue we will reward you within this timespan high we wil conduct research and send a conclusion within 2 weeks if this is a new issue we will reward you within 2 weeks urgent we wil conduct research and send a conclusion within 2 business days if this is a new issue we will reward you within 5 business days the processing of vulnerabilities can take longer on holidays reward reward expectations as a token of appreciation for your assistance we offer a reward for every report of aof a new security issue we determine the size of the reward on the basis of the severity of the leak and the quality of the report with a minimum of 10 payment within 5 working days after confirmation and conduct of a report via paypal f f gebruikersvoorwaarden cookies privacy toegankelijkheid kwetsbaarheid melden
|