Reporting Security Vulnerabililties
Please include as much of the below information as possible to help us to better understand the nature and scope of the potential vulnerability.
- Product name and version that contains the issue
- Type of issue (XSS, buffer overflow, etc.)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code
- Impact of the issue, including how an attacker could exploit the issue