introducing the reader to your finding. - Steps to Reproduce: Step performed in order to regenerate the vulnerability - Proof of Concept: Screenshots or Video of performed attack. - Impact: if this bug were exploited, what could happen? - Supporting Material: Any logs, reference links etc. - Severity: To show how severe the vulnerability is.