a description of the vulnerability and how it could be exploited to affect users
a proof of concept or relevant logs/screenshots
any custom configurations, non-default settings that are required to reproduce the issue
which product, version, platform etc. you are using for your test environment
More information regarding the guidelines to respect, can be found in our Disclosure Policy.