Vulnerability
Type:
Severity:
Source Code
If applicable, include source code. e.g. a sample size of code around the injected XSS. This helps identify the location of the vulnerability in their templating or project source code.
Additional Information
Include relevant information such as stipulations that are good to know that are not included in the steps and/or OWASP articles explaining vulnerability and possible solutions.