Software/Product(s) containing the vulnerability:
How may an attacker exploit this vulnerability?
(Proof of Concept)
What is the impact of exploiting this vulnerability?
(What does an attacker gain that the attacker didn't have before?)
How did you find the vulnerability?
(Be specific about tools and versions you used.)
When did you find the vulnerability?
I have already reported this vulnerability to the following vendors and organizations:
Is this vulnerability being publicly discussed? YES/NO
If yes then provide URL.
Is there evidence that this vulnerability is being actively exploited? YES/NO
If yes, then provide URL/evidence.
I plan to publicly disclose this vulnerability YES/NO
...on this date: (Please include your time zone.)
...at this URL:
|Reporter Contact Information|
PGP Public Key (ASCII Armored or a URL):
May we provide your contact information to third parties? YES/NO
Do you want to be publicly acknowledged in a disclosure? YES/NO
Vendor Tracking ID, CERT Tracking ID, or CVE ID if known:
< Appendix B - Traffic Light Protocol | Appendix D – Sample Vulnerability Disclosure Document >