# Date: # Vulnerability Name: # Brief description(Overview) # Number of bug(s) to exploit: # Target Software / version / architecture(s) # Architecture [ ] x86 [ ] x64 [ ] ARM [ ] MIPS [ ] SPARC [ ] POWERPC [ ] Others (please specify) # OS [ ] Windows [ ] Linux [ ] iOS [ ] Android [ ] MacOS [ ] AIX [ ] Others (please specify) # Exclusive [ ] Yes [ ] No # Price # Vulnerable Hardware(s) # Vulnerability class [ ] Stack corruption [ ] Heap overflow [ ] Use-after-free [ ] Type Confusion [ ] Race Condition [ ] Design/Logic flaw [ ] Input validation flaw(XSS, CSRF..) [ ] Misconfiguration [ ] Cryptographic bug [ ] Other ( ) # Exploit Type [ ] Remote code execution [ ] Privilege escalation [ ] Sandbox escape [ ] Information disclosure [ ] Code signing bypass [ ] Denial of Service [ ] VM Escape [ ] Other ( ) # Mitigation Bypassing [ ] ASLR/KASLR [ ] GS/Stack Cookie [ ] SafeSEH / SEHOP [ ] DEP / W ^ X [ ] CFI [ ] CFG [ ] EMET Version [ ] SMEP/PXN [ ] ETC ( ) [ ] N/A # Security bypassing [ ] Antivirus [ ] Other ( ) # Exploitation Vector [ ] Via web page [ ] Via file [ ] Via network protocol [ ] LPE [ ] Other ( ) # Obtained privilege after exploitation [ ] As logged in user (Select Integrity level below for Windows) [ ] Web Browser's default (IE - Low, Others - Med) [ ] Low [ ] Medium [ ] High [ ] Root, Admin or System [ ] Ring 0/Kernel [ ] Other # Reliability (0~100%) > % # Exploit time (second) # Continuation of execution [ ] Yes [ ] No ( ) # Exploit Stealthiness [ ] No user interaction [ ] User interaction required (2-click) [ ] No visible crash [ ] No WER [ ] Others (please specify) # specific configuration or setup [ ] Yes ( ) [ ] No # User interaction [ ] Yes [ ] No # Crashing system [ ] Yes [ ] No # Alerting target user [ ] Yes [ ] No # Memory consumption [ ] Yes [ ] No # Exploit Tested On Windows 7 [ ] x86 [ ] x64 Windows 8 [ ] x86 [ ] x64 Windows 8.1 [ ] x86 [ ] x64 Windows 10 [ ] x86 [ ] x64 Windows 11 [ ] x86 [ ] x64 Windows Server 2012 [ ] x86 [ ] x64 Windows Server 2016 [ ] x86 [ ] x64 Windows Server 2019 [ ] x86 [ ] x64 Windows Server 2022 [ ] x86 [ ] x64 Linux (kernel version) [ ] x86 [ ] x64 AIX (specify details) iOS (specify version) Android (specify version) MacOS (specify details) Others # Forensic footprint after exploitation [ ] Yes [ ] No # What will you provide? [ ] document (bug details, step-by-step of exploitation, etc) [ ] exploit source code [ ] video [ ] Other ( ) # Delivery [ ] Immediately [ ] 1-5 days [ ] 6-10 days [ ] More ( ) # Anything else?