The name you wish to be credited with for this discovery. You may use a pseudonym or leave blank for anonymity.
Your contact email address. We will use this to follow up with questions or status updates about your submission.
Specify the product, service, or component affected by the vulnerability. Include version numbers, platforms, or configurations if relevant.
List the exact software versions, builds, or environments where you confirmed the vulnerability. This helps us reproduce the issue.
Clearly describe the vulnerability, its impact, and how it can be exploited. Include step-by-step reproduction instructions and, if possible, a proof of concept.