Any Proof of Concept (PoC) setup details
Description of steps to reproduce the issue
Perceived impact and severity if the vulnerability were to be exploited
Any perceived impact on other products, services, vendors etc.
Any intended further actions by the Reporter, their expectations from the Vendor etc.
Other relevant information
Does this form look suspicious? Report