Privately and confidentially send us a description of the vulnerability that you have discovered. Our contact information is given below.
In your report, please include as much information as you can, including:
- a description of the vulnerability and how it could be exploited
- its potential impact (e.g. theft of funds, denial of service)
- steps or code for reproducing it
- a proposed patch for remedying it