Send security vulnerability alerts

    Warning Information





    Hackerone / Twitter / Bugcrowd / Intergrity ...
    This information is used to honor you, as well as to be invited to VSEC's private bug bounty programs.

    Vulnerability Information




    Proof of Concept


    Proof of concept is the most important part of your vulnerability report.
    With a clear, concise presentation will help us confirm the problem as quickly as possible


    Briefly, clearly include the name of the vulnerability and the affected content
    Example: Store XSS on xxx.com/abc could lead to a user's account being stolen


    Steps to find the vulnerability:
    Details on how we can reproduce the issue
    Steps to reimplement the vulnerability:Details on how to reimplement the vulnerability so that VSEC can confirm this warning
    1. Steps 1
    2. Step 2


    Attachments / Evidence
    You can upload images, documents to online storage such as: Google Drive, OneDrive, Dropbox, file.io,... Then Share the link with us here.



    All information about the alert person is kept strictly confidential by us