To report a vulnerability, please include as much information as possible to
help us understand the nature of the suspected vulnerability, including:
a description of the vulnerability and how it could be exploited to affect users
a proof of concept or relevant logs/screenshots
any custom configurations, non-default settings that are required to reproduce the issue
which product, version, platform etc. you are using for your test environment