Network Security Vulnerability Report Form
Reporter Name
Contact Email
Department/Organization
Vulnerability Title
System/Asset Affected
Vulnerability Type
Unauthorized Access
Misconfiguration
Outdated Software
Data Exposure
Malware
Other
Detailed Description
Steps to Reproduce
Potential Impact
Evidence (Logs, Screenshots, etc.)
Additional Information