[SECURITY VULNERABILITY] -
Summary
Short summary of the problem. Make the impact and severity as clear as possible. For example: An unsafe deserialization vulnerability allows any unauthenticated user to execute arbitrary code on the server.
Product
[product]
Details
Give all details on the vulnerability. Pointing to the incriminated source code is very helpful for the maintainer.
PoC
Complete instructions, including specific configuration details, to reproduce the vulnerability
Impact
[impact]
Remediation
Propose a remediation suggestion if you have one. (This is just a suggestion, as the maintainer might have a better idea to fix the issue.)
Credit
List all researchers who contributed to this disclosure. If you found the vulnerability with a specific tool, you can also credit this tool.
Contact
[contact]