- E-mail your findings to [email protected];
- Do not take advantage of the vulnerability or problem you have discovered;
- Do not reveal the problem to others until it has been resolved;
- Do not use attacks on physical security, social engineering, distributed denial of service, spam, or applications of third parties;
- Do provide sufficient information to reproduce the problem, so we will be able to resolve it as quickly as possible. Usually, a short description of the vulnerability will be sufficient, but complex vulnerabilities may require further explanation;