Any information required by PROGRAM, like 'keywords' used by Concrete5, Phabricator etc.
summary of the vulnerability - where, what, why :)
detailed PoC with screenshots, listings etc.
how I could use vulnerability to harm users/service/company
System:
details of testing environment if applicable (eg. when locally installed)
This vulnerability was tested on macOS Sierra 10.12.5 with following browsers:
- Chrome 59.0.3071.115
- Chromium build 61.0.3161.0
- Opera 46.0.2597.32 (list of all browsers where vulnerability can be reproduced)
I hope my report will help keep [PROGRAM] safe in the future.
Best Regards,
Rafal 'bl4de' Janicki