Skip to main content

Vulnerability Report Template

Fields

  • Title.
  • Reporter and contact.
  • Affected asset or component.
  • Authorization basis.
  • Environment and version.
  • Summary.
  • Impact.
  • Minimal evidence.
  • Reproduction notes, if safe and authorized.
  • Suggested remediation.
  • Disclosure timeline.
  • Sensitive material inventory.

Handling Note

Use the sensitive material inventory to track what must be removed before public release.

Review Notes

The private working version of a vulnerability report may contain richer evidence than the public version. Before publication, remove credentials, customer data, live target identifiers, raw traces, exploit construction detail, and unnecessary payload material. Keep enough information for impact, remediation, and credibility.