We confirm that all information provided by the reporter (e.g. identity and
personal information) is treated confidentially
A clear and concise title includes the type of vulnerability and the impacted asset.
Full URL, IP address or Mobile Application Link
Select the type of the potential issue you have discovered. Cant pick just one? Select the best match or submit a separate report for each distinct weakness.
The proof of concept is the most important part of your report submission. Clear, reproducible steps will help us validate this issue as quickly as possible.
What security impact could an attacker achieve?
What is the vulnerability? In clear steps, how do you reproduce it? Please replace all the [square] sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to triage and respond quickly, so be sure to take your time filling out the report!
Loading ...
What is your recommendations to address the findings
Upload your attachments here
Choose or Drag & Drop Files