We are happy to work with you to resolve this situation as soon as possible. And request you share information with us via info<a>accss.nl. To prevent a potential vulnerability being abused by others, we ask you use the following guidelines:
Provide sufficient information (for example, a detailed description including IP addresses, logs, how to reproduce the vulnerability, screenshots, etc.) so that we can handle your message as effectively as possible.
Once a vulnerability is reported, we will contact you within 5 workdays to make arrangements for a reasonable period of recovery and a possible coordinated publication of the vulnerability.