A clear and concise title includes the type of vulnerability and the impacted asset.
Select the type of the potential issue you have discovered. Cant pick just one? Select the best match or submit a separate report for each distinct weakness.
The proof of concept is the most important part of your report submission. Clear, reproducible steps will help us validate this issue as quickly as possible.