Any additional information - network data, usage examples, specs or videos are all welcome. Report should be submitted in English.
- Overview: Short technical description
- Proof Of Concept: Detailed steps on how to reproduce the vulnerability
- Impact: Explanation of how the attack could be executed in a real world scenario
- Suggested Fix: how this vulnerability should be addressed
- Allowed file extensions as attachment: .jpg, .png, .gif, .txt, .csv, .wav, .mp4, .webm, .flv, .ogg, .wmv or link to the uploaded file in cloud storage