Summary
Short summary of the problem. Make the impact and severity as clear as possible. For example: An unsafe deserialization vulnerability allows any unauthenticated user to execute arbitrary code on the server._
Details
Give all details on the vulnerability. Pointing to the incriminated source code is very helpful for the maintainer._
PoC
Complete instructions, including specific configuration details, to reproduce the vulnerability._
Impact
What kind of vulnerability is it? Who is impacted?_
Summary
Short summary of the problem. Make the impact and severity as clear as possible. For example: An unsafe deserialization vulnerability allows any unauthenticated user to execute arbitrary code on the server._
Details
Give all details on the vulnerability. Pointing to the incriminated source code is very helpful for the maintainer._
PoC
Complete instructions, including specific configuration details, to reproduce the vulnerability._
Impact
What kind of vulnerability is it? Who is impacted?_