Vulnerability Report Template
Fields
- Title.
- Reporter and contact.
- Affected asset or component.
- Authorization basis.
- Environment and version.
- Summary.
- Impact.
- Minimal evidence.
- Reproduction notes, if safe and authorized.
- Suggested remediation.
- Disclosure timeline.
- Sensitive material inventory.
Handling Note
Use the sensitive material inventory to track what must be removed before public release.
Review Notes
The private working version of a vulnerability report may contain richer evidence than the public version. Before publication, remove credentials, customer data, live target identifiers, raw traces, exploit construction detail, and unnecessary payload material. Keep enough information for impact, remediation, and credibility.